Tue.Nov 26, 2024

article thumbnail

What Graykey Can and Can’t Unlock

Schneier on Security

This is from 404 Media : The Graykey, a phone unlocking and forensics tool that is used by law enforcement around the world, is only able to retrieve partial data from all modern iPhones that run iOS 18 or iOS 18.0.1, which are two recently released versions of Apple’s mobile operating system, according to documents describing the tool’s capabilities in granular detail obtained by 404 Media.

Media 274
article thumbnail

Australia Passes Groundbreaking Cyber Security Law to Boost Resilience

Tech Republic Security

Australia's landmark Cyber Security Act has been passed, setting new standards for incident reporting, ransomware payments, and critical infrastructure protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

macOS Vulnerability (CVE-2023-32428) Grants Root Access, PoC Published

Penetration Testing

Security researcher Gergely Kalman has detailed a high-severity vulnerability in Apple’s MallocStackLogging framework that could allow attackers to gain local privilege escalation (LPE) on macOS systems. The flaw, designated CVE-2023-32428... The post macOS Vulnerability (CVE-2023-32428) Grants Root Access, PoC Published appeared first on Cybersecurity News.

article thumbnail

The source code of Banshee Stealer leaked online

Security Affairs

Banshee Stealer, a MacOS Malware-as-a-Service, shut down after its source code leaked online. The code is now available on GitHub. In August 2024, Russian hackers promoted BANSHEE Stealer, a macOS malware targeting x86_64 and ARM64, capable of stealing browser data, crypto wallets, and more. BANSHEE Stealer supports basic evasion techniques, relies on the sysctl API to detect debugging and checks for virtualization by running a command to see if “Virtual” appears in the hardware model identifier

Malware 145
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

The Hacker News

The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security flaws, one in Mozilla Firefox and the other in Microsoft Windows, as part of attacks designed to deliver the eponymous backdoor on victim systems.

145
145
article thumbnail

Emergency Vehicle Lights Can Screw Up a Car's Automated Driving System

WIRED Threat Level

Newly published research finds that the flashing lights on police cruisers and ambulances can cause “digital epileptic seizures” in image-based automated driving systems, potentially risking wrecks.

Risk 138

More Trending

article thumbnail

U.S. CISA adds Array Networks AG and vxAG ArrayOS flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Array Networks AG and vxAG ArrayOS flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Array Networks AG and vxAG ArrayOS flaw CVE-2023-28461 (CVSS score: 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

VPN 120
article thumbnail

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

The Hacker News

An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089 malicious infrastructures and networks as part of a coordinated effort to disrupt cybercrime in the continent.

article thumbnail

Software firm Blue Yonder providing services to US and UK stores, including Starbucks, hit by ransomware attack

Security Affairs

Blue Yonder, a supply chain software provider, suffered a ransomware attack, impacting operations for clients like Starbucks and grocery stores. A ransomware attack on Blue Yonder disrupted operations for several customers, including Starbucks and U.K. grocery chain Sainsbury. “A ransomware attack has disrupted a third-party software system that Starbucks uses to track and manage its baristas’ schedules, forcing the coffee chain to shift to manual mode to ensure its employees get paid pro

Software 126
article thumbnail

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

The Hacker News

A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet.

IoT 139
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers

Security Boulevard

Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two UK grocery chains also were impacted. The post Supply Chain Ransomware Attack Hits Starbucks, UK Grocers appeared first on Security Boulevard.

article thumbnail

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

The Hacker News

Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0.

Firewall 136
article thumbnail

AWS re:Invent 2024: Optimize Your Kubernetes with Fairwinds and NetApp

Security Boulevard

AWS re:Invent 2024 is next week, right after a late Thanksgiving when we’re kicking off the last few weeks of a busy year. For many organizations, now is the time to review costs and plan budgets. For many, that means taking a hard look at cloud spend and thinking about how to optimize it. If you’re using Kubernetes and thinking about how to make sure your infrastructure is optimized and you're attending re:Invent, come by the NetApp booth to learn how Spot by NetApp helps you control costs and

116
116
article thumbnail

Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

The Hacker News

When CVEs go viral, separating critical vulnerabilities from the noise is essential to protecting your organization. That’s why Intruder, a leader in attack surface management, built Intel - a free vulnerability intelligence platform designed to help you act fast and prioritize real threats. What is Intel?

127
127
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Explained: the Microsoft connected experiences controversy

Malwarebytes

Recently we’ve seen some heated discussion about Microsoft’s connected experiences feature. As in many discussions lately there seems to be no room for middle ground, but we’re going to try and provide it anyway. First of all, it’s important to understand what the “connected experiences” are. Microsoft describes it like this: “Connected experiences that analyze your content are experiences that use your Office content to provide you with design recommendations, editing suggestions, d

article thumbnail

Operation Serengeti: Major Cybercrime Sweep Across Africa Nets 1,006 Suspects

Penetration Testing

Interpol and Afripol recently concluded Operation Serengeti, a joint operation spanning 19 African countries. This massive crackdown resulted in the arrest of 1,006 suspects and the dismantling of 134,089 malicious... The post Operation Serengeti: Major Cybercrime Sweep Across Africa Nets 1,006 Suspects appeared first on Cybersecurity News.

article thumbnail

I tested 9 AI content detectors - and these 2 correctly identified AI text every time

Zero Day

Two of the seven AI detectors I tested correctly identified AI-generated content 100% of the time. This is up from zero during my early rounds, but down from my last round of tests.

108
108
article thumbnail

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

Cisco Security

Cisco has integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance.

105
105
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Most companies will increase IT spending in 2025. But there's a twist in the tale

Zero Day

Nearly two-thirds of companies plan to boost their IT budgets next year. Yet cost-saving measures are also on the agenda.

107
107
article thumbnail

Human-AI Teaming in the Age of Collaborative Intelligence

SecureWorld News

This article explores the evolving landscape of human-AI teaming, focusing on its transformative impact, adaptive intelligence in mixed-reality environments, collective intelligence, transparency challenges, and the transition toward collaboration. Introduction to human-AI teaming (understanding the shift, key concepts, and examples of collaborative intelligence) Expanding the definition of collaboration (moving beyond traditional AI roles, emphasizing real-time adaptability and dynamic role cha

article thumbnail

5 things successful managers do to earn respect and build trust

Zero Day

You can't manage your staff well if you're not respected, and the path to respect is paved with humble stones. Five business leaders explain how to lead with humility.

105
105
article thumbnail

PCI Mobile Payments on COTS (MPoC) Standard Version 1.1 Now Available

PCI perspectives

The PCI Security Standards Council (PCI SSC) has published version 1.1 of the PCI Mobile Payments on COTS (MPoC) Standard, designed to support the evolution of mobile payment acceptance solutions. PCI MPoC builds on the existing PCI Software-based PIN entry on COTS (SPoC) and PCI Contactless Payments on COTS (CPoC) Standards, addressing security requirements for solutions that enable merchants to accept cardholder PINs or contactless payments using a smartphone or other commercial off-the-shelf

Mobile 98
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

The $30 Blink Video Doorbell is one of the best smart home Black Friday deals

Zero Day

When can you buy a video doorbell for the price of a trip to a fast-food restaurant? The Blink Video Doorbell is 50% off at Amazon through Black Friday.

98
article thumbnail

The Different Facets of MSP Security

CompTIA on Cybersecurity

The biggest challenge many MSPs must overcome is simply surviving the current business climate.

93
article thumbnail

This 2TB Samsung 990 Pro M.2 SSD is on sale for $160 this Black Friday

Zero Day

Upgrade your PC with this super-fast 2 TB M.2 SSD for 36% off thanks to Amazon's Black Friday sale.

95
article thumbnail

Video: Cybersecurity Tips for Small Businesses

eSecurity Planet

Are you doing enough to protect your small business from hackers? In this video, our expert explores common cyber threats and shares actionable cybersecurity tips to safeguard your small business, from securing your network to keeping your software up to date. Read more: Complete Guide to Cybersecurity for Small Businesses The post Video: Cybersecurity Tips for Small Businesses appeared first on eSecurity Planet.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

How to use Bluesky starter packs to find greener social media pastures

Zero Day

Starting over on a new social media site can be a hassle. For that, Bluesky has starter packs. Here's how to use them.

Media 92
article thumbnail

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday

Thales Cloud Protection & Licensing

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday josh.pearson@t… Tue, 11/26/2024 - 08:01 As Black Friday and Cyber Monday loom, the stakes for retailers extend far beyond enticing deals and record sales. With retail sales during 2024 set to grow to between $5.23 trillion and $5.28 trillion, the risk of a data breach extends beyond immediate financial losses.

Retail 71
article thumbnail

Instagram just added a location sharing feature. Here's how to use it

Zero Day

Finding your friends in a crowd is about to get a lot easier thanks to this new feature.

88
article thumbnail

RomCom Exploits Zero-Days in Firefox (CVE-2024-9680) & Windows (CVE-2024-49039) with No User Interaction

Penetration Testing

In a recent cybersecurity report, ESET researchers have unveiled a coordinated attack by the Russia-aligned threat actor RomCom, exploiting zero-day vulnerabilities in both Mozilla Firefox and Microsoft Windows. These vulnerabilities—previously... The post RomCom Exploits Zero-Days in Firefox (CVE-2024-9680) & Windows (CVE-2024-49039) with No User Interaction appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.