Tue.Dec 24, 2024

article thumbnail

Spyware Maker NSO Group Found Liable for Hacking WhatsApp

Schneier on Security

A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using it. Jon Penney and I wrote a legal paper on the case.

Spyware 224
article thumbnail

North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin

The Hacker News

Japanese and U.S. authorities have formerly attributed the theft of cryptocurrency worth $308 million from cryptocurrency company DMM Bitcoin in May 2024 to North Korean cyber actors. "The theft is affiliated with TraderTraitor threat activity, which is also tracked as Jade Sleet, UNC4899, and Slow Pisces," the agencies said.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apache Foundation fixed a severe Tomcat vulnerability

Security Affairs

The Apache Software Foundation fixed a Tomcat server software flaw that could lead to remote code execution under certain conditions. The Apache Software Foundation (ASF) addressed an important vulnerability, tracked as CVE-2024-56337 , in its Tomcat server software. The researchers warn that exploiting this vulnerability could result in remote code execution under certain conditions.

Software 110
article thumbnail

Generative AI is now an must-have tool for technology professionals

Zero Day

In just two years, AI has gone from hype to essential skill, offering massive productivity gains and increasing creativity among teams who use it. Here's how.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched high-severity security flaw impacting Acclaim Systems USAHERDS to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The vulnerability in question is CVE-2021-44207 (CVSS score: 8.

article thumbnail

This Linux laptop has a brilliant display and performance that rivals my MacBook

Zero Day

If you're looking for a laptop with Linux pre-installed, Tuxedo Computers' Infinity Book Pro 14 (Gen 9) has a gorgeous display and impressive performance.

99

More Trending

article thumbnail

The best Linux distribution of 2024 is MacOS-like but accessible to all

Zero Day

I've used and covered Linux for nearly 30 years. Here's my top pick for my favorite open-source distro in 2024.

98
article thumbnail

Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts

The Hacker News

Cybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs. The packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down.

article thumbnail

Why I no longer recommend this Windows-like Linux distro

Zero Day

I learned a troubling lesson that points to a growing issue within the open-source community.

98
article thumbnail

Top 10 Cybersecurity Trends to Expect in 2025

Hacker's King

As the digital landscape evolves, cybersecurity remains a critical concern for businesses, governments, and individuals alike. With the advent of new technologies and rising cyber threats , 2025 promises significant shifts in the cybersecurity domain. Here are the top 10 trends to watch out for in 2025: Rise of AI-Driven Cyberattacks Cybercriminals are increasingly leveraging artificial intelligence (AI) to develop sophisticated attack methods.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

I changed these 6 Samsung TV settings to give the picture quality an instant boost

Zero Day

Most people never change their TV's default settings. But if you have a Samsung model, try these modifications to improve its visual output.

98
article thumbnail

CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices

Penetration Testing

Northwave Cyber Security has identified a sophisticated backdoor, LITTLELAMB.WOOLTEA, targeting Palo Alto Networks firewalls. The backdoor was uncovered during a forensic investigation into a compromised Palo Alto Networks device. Attackers... The post CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices appeared first on Cybersecurity News.

article thumbnail

This free Google AI tool turns complex research papers into concise conversations

Zero Day

Need a research assistant to help you distill dense, complex material? AI-powered Illuminate transforms published papers into audio discussions.

97
article thumbnail

Adobe is aware that ColdFusion bug CVE-2024-53961 has a known PoC exploit code

Security Affairs

Adobe released out-of-bandsecurity updates to address a critical ColdFusion vulnerability, experts warn of a PoC exploit code available for it. Adobe released out-of-bandsecurity updates to address a critical vulnerability, tracked as CVE-2024-53961 (CVSS score 7.4), in ColdFusion. Experts warn of the availability of a proof-of-concept (PoC) exploit code for this vulnerability.

Hacking 65
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Bye bye, Wi-Fi: How to add a wired network to your home without running Ethernet

Zero Day

Running Ethernet wiring can be messy and expensive. If you have cable outlets, you can use a cheap adapter to set up a high-speed wired connection with minimal effort. And it works no matter where you get your internet.

article thumbnail

Critical Vulnerabilities Found in Gogs Self-Hosted Git Service: Urgent Update Required

Penetration Testing

Multiple critical security vulnerabilities have been discovered in Gogs, a popular open-source self-hosted Git service. These vulnerabilities, with CVSS scores ranging from 7.7 to 9.9, could allow attackers to execute... The post Critical Vulnerabilities Found in Gogs Self-Hosted Git Service: Urgent Update Required appeared first on Cybersecurity News.

article thumbnail

The 3 most Windows-like Linux distros to try because change is hard

Zero Day

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

75
article thumbnail

CVE-2024-45387 (CVSS 9.9): Critical SQL Injection Vulnerability Found in Apache Traffic Control

Penetration Testing

A critical-severity security flaw has been uncovered in Apache Traffic Control, a popular open-source platform used to build large-scale content delivery networks (CDNs). This vulnerability, identified as CVE-2024-45387 and assigned... The post CVE-2024-45387 (CVSS 9.9): Critical SQL Injection Vulnerability Found in Apache Traffic Control appeared first on Cybersecurity News.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to buy Casio's tiny digital watch for your finger in the US this week

Zero Day

If you like your watches extra little and maybe not-so smart, Casio has something for you.

74
article thumbnail

CVE-2024-23945: Serious Vulnerability in Apache Hive and Spark Could Lead to Exploitation

Penetration Testing

A newly disclosed vulnerability, CVE-2024-23945, with a CVSS score of 8.7, has been identified in Apache Hive and Apache Spark, two widely used systems for large-scale data processing and analytics.... The post CVE-2024-23945: Serious Vulnerability in Apache Hive and Spark Could Lead to Exploitation appeared first on Cybersecurity News.

article thumbnail

One of the loudest Bluetooth speakers I've tested is also one of the most affordable

Zero Day

If you just want big sound, the Treblab HD77 is a durable Bluetooth speaker that's right up your alley. Amazon is offering a 20% coupon with a code and qualifying purchase.

72
article thumbnail

CVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability

Penetration Testing

Renowned for cyber espionage activities targeting critical sectors in the Middle East, OilRig, also known as APT34 or Helix Kitten operates with precision, exploiting vulnerabilities and employing advanced techniques to... The post CVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

The best phones for battery life in 2024: Expert tested and reviewed

Zero Day

After extensive hands-on testing of dozens of phones this year, these stand out as the best for battery life -- while also delivering impressive cameras, sleek designs, and strong overall performance.

66
article thumbnail

WPA3 Security Cracked? Researchers Bypass Advanced Encryption with Social Engineering

Penetration Testing

A recent study reveals a novel attack that compromises the security of Wi-Fi Protected Access 3 (WPA3) networks. Conducted by researchers Kyle Chadee, Wayne Goodridge, and Koffka Khan from the... The post WPA3 Security Cracked? Researchers Bypass Advanced Encryption with Social Engineering appeared first on Cybersecurity News.

article thumbnail

I tested a 9,000,000mAh battery pack from eBay that cost $10 - here's my verdict

Zero Day

I often get asked about cheap power banks on the internet that have extravagant claims. Well, I bought one, and here's my buying advice.

Banking 62
article thumbnail

Cloud Atlas Deploys VBCloud backdoor in Latest Cyber Espionage Campaign

Penetration Testing

The notorious cyber-espionage group Cloud Atlas, active since 2014, has been observed leveraging a new arsenal in its ongoing campaigns against Eastern Europe and Central Asia, according to a detailed... The post Cloud Atlas Deploys VBCloud backdoor in Latest Cyber Espionage Campaign appeared first on Cybersecurity News.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

LG's G4 OLED is my pick for best picture quality TV in 2024 - and it's $700 off right now

Zero Day

If you want a TV with the best visual fidelity that money can buy, the LG G4 OLED is it. The G4 offers the best color and contrast I've seen yet.

62
article thumbnail

Randall Munroe’s XKCD ‘D Roll’

Security Boulevard

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroes XKCD D Roll appeared first on Security Boulevard.

52
article thumbnail

One of my favorite open-ear headphones just hit an all-time low price

Zero Day

Shokz' OpenFit Air earbuds improve on the previous model with new colors and a comfortable, lightweight design. And now they're available for less than $100.

59
article thumbnail

Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated

Security Boulevard

Reading Time: 7 min Resolve "550 5.7.26 This Mail is Unauthenticated" Gmail error in 2024. Learn why Gmail is blocking your emails and fix email authentication issues. The post Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated appeared first on Security Boulevard.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.