Tue.Dec 24, 2024

article thumbnail

Spyware Maker NSO Group Found Liable for Hacking WhatsApp

Schneier on Security

A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using it. Jon Penney and I wrote a legal paper on the case.

Spyware 310
article thumbnail

CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices

Penetration Testing

Northwave Cyber Security has identified a sophisticated backdoor, LITTLELAMB.WOOLTEA, targeting Palo Alto Networks firewalls. The backdoor was uncovered during a forensic investigation into a compromised Palo Alto Networks device. Attackers... The post CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices appeared first on Cybersecurity News.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Cybersecurity Trends to Expect in 2025

Hacker's King

As the digital landscape evolves, cybersecurity remains a critical concern for businesses, governments, and individuals alike. With the advent of new technologies and rising cyber threats , 2025 promises significant shifts in the cybersecurity domain. Here are the top 10 trends to watch out for in 2025: Rise of AI-Driven Cyberattacks Cybercriminals are increasingly leveraging artificial intelligence (AI) to develop sophisticated attack methods.

article thumbnail

CVE-2024-45387 (CVSS 9.9): Critical SQL Injection Vulnerability Found in Apache Traffic Control

Penetration Testing

A critical-severity security flaw has been uncovered in Apache Traffic Control, a popular open-source platform used to build large-scale content delivery networks (CDNs). This vulnerability, identified as CVE-2024-45387 and assigned... The post CVE-2024-45387 (CVSS 9.9): Critical SQL Injection Vulnerability Found in Apache Traffic Control appeared first on Cybersecurity News.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Adobe is aware that ColdFusion bug CVE-2024-53961 has a known PoC exploit code

Security Affairs

Adobe released out-of-bandsecurity updates to address a critical ColdFusion vulnerability, experts warn of a PoC exploit code available for it. Adobe released out-of-bandsecurity updates to address a critical vulnerability, tracked as CVE-2024-53961 (CVSS score 7.4), in ColdFusion. Experts warn of the availability of a proof-of-concept (PoC) exploit code for this vulnerability.

Hacking 66
article thumbnail

North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin

The Hacker News

Japanese and U.S. authorities have formerly attributed the theft of cryptocurrency worth $308 million from cryptocurrency company DMM Bitcoin in May 2024 to North Korean cyber actors. "The theft is affiliated with TraderTraitor threat activity, which is also tracked as Jade Sleet, UNC4899, and Slow Pisces," the agencies said.

LifeWorks

More Trending

article thumbnail

Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts

The Hacker News

Cybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs. The packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down.

article thumbnail

The best Linux distribution of 2024 is MacOS-like but accessible to all

Zero Day

I've used and covered Linux for nearly 30 years. Here's my top pick for my favorite open-source distro in 2024.

138
138
article thumbnail

CISA Adds Acclaim USAHERDS Vulnerability to KEV Catalog Amid Active Exploitation

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched high-severity security flaw impacting Acclaim Systems USAHERDS to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The vulnerability in question is CVE-2021-44207 (CVSS score: 8.

article thumbnail

This Linux laptop has a brilliant display and performance that rivals my MacBook

Zero Day

If you're looking for a laptop with Linux pre-installed, Tuxedo Computers' Infinity Book Pro 14 (Gen 9) has a gorgeous display and impressive performance.

137
137
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

DEF CON 32 – What To Expect When You’re Exploiting: 0Days, Baby Monitors & Wi-Fi Cams

Security Boulevard

Authors/Presenters: Mark Mager, Eric Forte Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – What To Expect When You’re Exploiting: 0Days, Baby Monitors & Wi-Fi Cams appeared first on Security Boulevard.

article thumbnail

This Android phone made my Pixel 9 Pro look boring - and its battery life is truly impressive

Zero Day

If you're a mobile gamer, the Redmagic 10 Pro was designed specifically for you, and I highly recommend it.

Mobile 133
article thumbnail

DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access Control Systems

Security Boulevard

Authors/Presenters: Chad Shortman Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Your Smartcard Is Dumb: A Brief History Of Hacking Access Control Systems appeared first on Security Boulevard.

Hacking 52
article thumbnail

This free Google AI tool turns complex research papers into concise conversations

Zero Day

Need a research assistant to help you distill dense, complex material? AI-powered Illuminate transforms published papers into audio discussions.

130
130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Unmasking the Risks: Auditing Your Web Pixel Usage

Security Boulevard

In our last post, we discussed the powerful, yet potentially risky nature of web pixels. Now, lets dive into how you can assess your organizations use of these digital trackers and uncover potential privacy vulnerabilities. Conducting a Thorough Audit Think of this audit as a detective investigation, where you need to gather all the clues [] The post Unmasking the Risks: Auditing Your Web Pixel Usage appeared first on Feroot Security.

Risk 52
article thumbnail

Why I no longer recommend this Windows-like Linux distro

Zero Day

I learned a troubling lesson that points to a growing issue within the open-source community.

122
122
article thumbnail

Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated

Security Boulevard

Reading Time: 7 min Resolve "550 5.7.26 This Mail is Unauthenticated" Gmail error in 2024. Learn why Gmail is blocking your emails and fix email authentication issues. The post Best of 2024: Gmail Error: Email Blocked Because Sender is Unauthenticated appeared first on Security Boulevard.

article thumbnail

I changed these 6 Samsung TV settings to give the picture quality an instant boost

Zero Day

Most people never change their TV's default settings. But if you have a Samsung model, try these modifications to improve its visual output.

98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

5 Common DNS Vulnerabilities and How to Protect Your Network

Security Boulevard

Explore the top 5 DNS vulnerabilities and learn how to protect your network from threats like spoofing and cache poisoning. The post 5 Common DNS Vulnerabilities and How to Protect Your Network appeared first on Security Boulevard.

DNS 59
article thumbnail

The 3 most Windows-like Linux distros to try because change is hard

Zero Day

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

97
article thumbnail

Randall Munroe’s XKCD ‘D Roll’

Security Boulevard

via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroes XKCD D Roll appeared first on Security Boulevard.

52
article thumbnail

How to buy Casio's tiny digital watch for your finger in the US this week

Zero Day

If you like your watches extra little and maybe not-so smart, Casio has something for you.

92
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

PowerDMARC in 2024: A Year in Review

Security Boulevard

Explore PowerDMARC's 2024 Annual Review: A year of global achievements, groundbreaking events, and advancements in email security. The post PowerDMARC in 2024: A Year in Review appeared first on Security Boulevard.

52
article thumbnail

One of my favorite open-ear headphones just hit an all-time low price

Zero Day

Shokz' OpenFit Air earbuds improve on the previous model with new colors and a comfortable, lightweight design. And now they're available for less than $100.

85
article thumbnail

Best of 2024: An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections

Security Boulevard

Readmore The post An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections appeared first on Deepfactor. The post Best of 2024: An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections appeared first on Security Boulevard.

52
article thumbnail

My favorite bone conduction headphones just got a waterproof upgrade - and they're very comfortable

Zero Day

The Shokz OpenSwim Pro bone conduction headphones sound fantastic even when underwater. The best part is that they're on sale for the holiday season.

81
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Weaponizing Windows Defender: New Attack Bypasses EDR

Penetration Testing

Researchers Jonathan Beierle and Logan Goins have uncovered a novel offensive tactic leveraging Microsofts Windows Defender Application Control (WDAC). Their research highlights how adversaries can weaponize WDAC to disable Endpoint... The post Weaponizing Windows Defender: New Attack Bypasses EDR appeared first on Cybersecurity News.

article thumbnail

I tested a 9,000,000mAh battery pack from eBay that cost $10 - here's my verdict

Zero Day

I often get asked about cheap power banks on the internet that have extravagant claims. Well, I bought one, and here's my buying advice.

Banking 81
article thumbnail

CVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability

Penetration Testing

Renowned for cyber espionage activities targeting critical sectors in the Middle East, OilRig, also known as APT34 or Helix Kitten operates with precision, exploiting vulnerabilities and employing advanced techniques to... The post CVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability appeared first on Cybersecurity News.

article thumbnail

Stop plugging these 7 devices into extension cords - even if they sound like a good idea

Zero Day

Extension cords and power strips are often safe for home and office electronics. But for these common appliances, they can be a dangerously bad idea.

81
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!