Sun.Apr 06, 2025

article thumbnail

Expert used ChatGPT-4o to create a replica of his passport in just 5 minutes bypassing KYC

Security Affairs

A researcher used ChatGPT-4o to create a replica of his passport in just five minutes, realistic enough to deceive most automated KYC systems. Polish researcher Borys Musielak ( @michuk ) used ChatGPT-4o to generate a fake passport in just five minutes. The document is realistic enough to bypass automated Know Your Customer (KYC) checks, the expert states. “You can now generate fake passports with GPT-4o.

article thumbnail

Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published

Penetration Testing

A security researcher has recently disclosed technical details and proof-of-concept (PoC) exploit code for a vulnerability in the Linux kernel’s Performance Events system component. This flaw, identified as CVE-2023-6931, carries a CVSS score of 7.8, indicating a high severity risk. The vulnerability is described as a heap out-of-bounds write, which can be exploited to achieve […] The post Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published appeare

Risk 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Oracle privately notifies Cloud data breach to customers

Security Affairs

Oracle confirms a cloud data breach, quietly informing customers while downplaying the impact of the security breach. Oracle confirms a data breach and started informing customers while downplaying the impact of the incident. A threat actor using the moniker rose87168 claimed to possess millions of data lines tied to over 140,000 Oracle Cloud tenants, including encrypted credentials.

article thumbnail

CVE-2025-31115: XZ Utils Hit Again with High-Severity Multithreaded Decoder Bug

Penetration Testing

XZ Utils is a widely used suite of tools and libraries that provide data compression functionality. Known for its efficient compression, XZ Utils is often preferred for creating smaller files than gzip. The native file format is.xz, but it also supports the legacy.lzma format. However, anewly discovered vulnerability, CVE-2025-31115, impacts XZ Utils versions […] The post CVE-2025-31115: XZ Utils Hit Again with High-Severity Multithreaded Decoder Bug appeared first on Daily CyberSecurity.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 40

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor Advancements in delivery: Scripting with Nietzsche Analyzing New HijackLoader Evasion Tactics Malicious Python packages target popular Bitcoin library New version of Triada steals cryptocurre

Malware 76
article thumbnail

MinIO Urgently Patches High-Severity Incomplete Signature Validation Vulnerability

Penetration Testing

MinIO, a high-performance object storage server compatible with Amazon S3, has released a patch to address a critical security vulnerability. The vulnerability, tracked as CVE-2025-31489, involves incomplete signature validation for unsigned-trailer uploads, posing a significant risk to users. The core issue lies in how MinIO handles authorization. The “signature component of the authorization may be […] The post MinIO Urgently Patches High-Severity Incomplete Signature Validation Vu

Risk 107

LifeWorks

More Trending

article thumbnail

PoisonSeed Campaign: Uncovering a Web of Cryptocurrency and Email Provider Attacks

Penetration Testing

Silent Push Threat Analysts have uncovered a sophisticated campaign targeting enterprise organizations, VIP individuals, and cryptocurrency holders, dubbed “PoisonSeed.” This campaign involves a two-pronged approach: compromising CRM and bulk email providers and deploying a novel “crypto seed phrase” phishing attack. The PoisonSeed campaign has targeted a range of significant platforms.

article thumbnail

BSidesLV24 – HireGround – How Living And Quilting History Made Me A Better Cybersecurity Professional

Security Boulevard

Author/Presenter: Mea Clift Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – HireGround – How Living And Quilting History Made Me A Better Cybersecurity Professional appeared first on Security Boulevard.

article thumbnail

New Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoader

Penetration Testing

Netskope Threat Labs has uncovered a new malicious campaign that employs deceptive tactics to distribute the LegionLoader malware. This campaign leverages fake CAPTCHAs and CloudFlare Turnstile to trick victims into downloading malware, which ultimately leads to the installation of a malicious browser extension. Since February 2025, Netskope Threat Labs has been monitoring various phishing and […] The post New Evasive Campaign Uses Fake CAPTCHAs to Deliver LegionLoader appeared first on Da

Malware 93
article thumbnail

Microsoft is offering free AI skills training for everyone - how to sign up

Zero Day

Microsoft's 50-day AI Skills Fest is open to beginners and pros. Register now for free access to AI lessons and help Microsoft win a Guinness World Record (seriously).

111
111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

pgAdmin 4 Vulnerabilities Expose Databases to Remote Code Execution and XSS

Penetration Testing

The widely utilized PostgreSQL administration tool, pgAdmin 4, has recently addressed two significant security vulnerabilities that pose substantial risks to database environments. The latest release, version 9.2, patches critical flaws that could enable remote code execution (RCE) and cross-site scripting (XSS) attacks, demanding immediate attention from users.

Risk 81
article thumbnail

This secret Pixel camera feature makes your photos look more vibrant - how to turn it on

Zero Day

Google Pixel phones are renowned for their exceptional cameras - a feature that takes your photos and videos to the next level.

105
105
article thumbnail

Lazarus Group Expands Malicious Campaign on npm, Targets Developers with New Malware

Penetration Testing

A new report from the Socket Research Team reveals that North Korean threat actors, known for the “Contagious Interview” operation, have intensified their malicious activities within the npm ecosystem. The threat actors are deploying new npm packages that deliver the previously identified BeaverTail malware and are introducing new packages with remote access trojan (RAT) loader […] The post Lazarus Group Expands Malicious Campaign on npm, Targets Developers with New Malware app

Malware 73
article thumbnail

Achieving Independent Control Over NHIs

Security Boulevard

Is Independent Control over Non-Human Identities Possible? The challenge of managing Non-Human Identities (NHIs) effectively is significantly increasing. With the rapid expansion of cloud technologies and the multiplying scale of machine identities, organizations are left grappling with the implications of changing. But what if there was a way to achieve independent control over these NHIs, [] The post Achieving Independent Control Over NHIs appeared first on Entro.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Unpatched Dell PowerProtect Systems Vulnerable to Remote Compromise

Penetration Testing

A significant security vulnerability has been identified in Dell Technologies PowerProtect Data Domain systems, posing a risk of unauthorized system compromise. The vulnerability, tracked as CVE-2025-29987, exists within Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions prior to 8.3.0.15. The core issue is an “Insufficient Granularity of Access Control vulnerability“ This […] The post Unpatched Dell PowerProtect Systems Vulnerable to Remote Compro

article thumbnail

NHI Solutions That Fit Your Budget

Security Boulevard

Why Non-Human Identities (NHIs) and Secrets Management Matter? Have you ever considered how seemingly non-interactive entities can pose a significant threat to your business security? NHIs and secrets management are two terms that are gaining critical importance in safeguarding the digital assets of organizations. Here, we delve deep into understanding the significance of NHIs and [] The post NHI Solutions That Fit Your Budget appeared first on Entro.

52
article thumbnail

OKX Fined $1.2M: Malta Exposes AML Failures

Penetration Testing

Cryptocurrency exchange OKX’s European subsidiary, Okcoin Europe Ltd, has been fined $1.2 million (approximately 1.05 million) by Maltas Financial Intelligence Analysis Unit (FIAU), which uncovered significant deficiencies in the companys risk assessment procedures. The FIAU initially launched a compliance review of OKX in 2023. According to its newly released findings, OKXs anti-money laundering (AML) risk […] The post OKX Fined $1.2M: Malta Exposes AML Failures appeared first on Da

article thumbnail

Why neglecting AI ethics is such risky business - and how to do AI right

Zero Day

Companies that combine innovation and trust have a competitive edge. Discover the best practices that ensure ethical, sustainable deployment.

102
102
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Android Installs Accelerated: Google’s Cloud Compilation Plan

Penetration Testing

The Android operating system utilizes Android Runtime (ART) to execute application code. When a new application is installed, Android employs a tool called dex2oat to process the APK’s.dex files, which contain the compiled bytecode of the application. The dex2oat tool then generates one or more application artifacts from this file. These artifacts play a […] The post Android Installs Accelerated: Google’s Cloud Compilation Plan appeared first on Daily CyberSecurity.

article thumbnail

Clicked on a phishing link? 7 steps to take immediately to protect your accounts

Zero Day

Phishing scams are becoming brutally effective, and even technically sophisticated people can be fooled. Here's how to limit the damage immediately and what to do next.

article thumbnail

Major Cybersecurity Events (31st March – 6th April 2025)

Penetration Testing

In the past week, several significant cybersecurity incidents have made headlines including high-impact data breaches, and newly discovered or exploited vulnerabilities. Below is a structured summary of the most notable events, with key details: CISA Alert Resurge Malware Exploiting Ivanti ZeroDay (CVE-2025-0282) The U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued an alert […] The post Major Cybersecurity Events (31st March 6th April 2025) appeared first on Daily C

article thumbnail

Finally, a battery-powered outdoor camera that gets bright enough for darker spaces

Zero Day

The Blink Outdoor 4 with a Floodlight mount is the perfect security camera for the unlit side of my yard.

87
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Free DeepSearch: ChatGPT’s Powerful AI Goes Public

Penetration Testing

DeepSearch is a recently introduced feature in ChatGPT that leverages artificial intelligence to scour the entire internet and compile tailored reports for usersa process that may take anywhere from several minutes to nearly an hour to complete. In a bid to remain competitive, OpenAI now plans to extend the DeepSearch feature to users of the […] The post Free DeepSearch: ChatGPT’s Powerful AI Goes Public appeared first on Daily CyberSecurity.

article thumbnail

You should probably clear your TV cache right now (and why it makes such a big difference)

Zero Day

Clearing your TV's cache can boost performance, fix annoying glitches, and even sharpen your streaming experience. Here's how to do it the right way.

75
article thumbnail

EU Targets Musk’s X with Potential $1B Fine for Violating Digital Services Act

Penetration Testing

Following prior investigations and penalties under the Digital Markets Act against companies including Google, the European Union has now turned its attention to Elon Musks platform, X, which may become the first online platform to face fines under the Digital Services Act (DSA). The potential penalty is estimated to exceed $1 billion and may also […] The post EU Targets Musks X with Potential $1B Fine for Violating Digital Services Act appeared first on Daily CyberSecurity.

article thumbnail

I tested a smart tracker that's thinner than Apple AirTags - and they're even more versatile

Zero Day

This SmartCard is sleek, lightweight, and designed to slip seamlessly into your wallet.

73
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Bitdefender GravityZone Console Hit by Critical PHP Deserialization Vulnerability

Penetration Testing

A critical-severity vulnerability has been discovered in the Bitdefender GravityZone Console, posing a significant risk to affected systems. The flaw, tracked as CVE-2025-2244 (CVSSv4 9.5), is an insecure PHP deserialization issue. The vulnerability resides within the sendMailFromRemoteSource method in Emails.php. The Bitdefender GravityZone Console “unsafely uses php unserialize()on user-supplied input without validation“ This lack of […] The post Bitdefender GravityZone Conso

Risk 52
article thumbnail

The 23andMe Collapse, Signal Gate Fallout

Security Boulevard

In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the companys potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of [] The post The 23andMe Collapse, Signal Gate Fallout appeared first on Shared Security Podcast.

article thumbnail

OpenAI Delays GPT-5 Launch, Will Release GPT-o3 and o4-mini

Penetration Testing

Back in February, OpenAI unveiled its roadmap for future AI models, stating at the time that GPT-4.5 would be the companys final non-reasoning-chain model. GPT-5, according to OpenAI, was intended to integrate both non-chain-of-thought architecture and advanced reasoning models like o3. To simplify the user experience, OpenAI also announced that models such as o3 would […] The post OpenAI Delays GPT-5 Launch, Will Release GPT-o3 and o4-mini appeared first on Daily CyberSecurity.

article thumbnail

GTC 2025: AI, Security & The New Blueprint

Trend Micro

From quantum leaps to AI factories, GTC 2025 proved one thing: the future runs on secure foundations.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!