Wed.Nov 20, 2024

article thumbnail

Closer to the Edge: Hyperscaling Have I Been Pwned with Cloudflare Workers and Caching

Troy Hunt

I've spent more than a decade now writing about how to make Have I Been Pwned (HIBP) fast. Really fast. Fast to the extent that sometimes, it was even too fast: The response from each search was coming back so quickly that the user wasn’t sure if it was legitimately checking subsequent addresses they entered or if there was a glitch. Over the years, the service has evolved to use emerging new techniques to not just make things fast, but make them scale more under load, increase avail

article thumbnail

Steve Bellovin’s Retirement Talk

Schneier on Security

Steve Bellovin is retiring. Here’s his retirement talk, reflecting on his career and what the cybersecurity field needs next.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package

The Hacker News

Multiple decade-old security vulnerabilities have been disclosed in the needrestart package installed by default in Ubuntu Server (since version 21.04) that could allow a local attacker to gain root privileges without requiring user interaction.

130
130
article thumbnail

AI just gave us the Star Trek farewell we always wanted - watch it here

Zero Day

William Shatner and Leonard Nimoy reunite in a powerful short film using AI and deepfake technology to give fans the emotional farewell they deserve.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

The Hacker News

Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim's funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment services such as Google Pay or Apple Pay and relaying NFC traffic.

Mobile 122
article thumbnail

AI transformation is the new digital transformation. Here's why that change matters

Zero Day

Your boss has read about the power of generative AI and wants you to stop dithering about potential risks and start delivering results.

More Trending

article thumbnail

Microsoft Adds Raft of Zero-Trust Tools and Platforms

Security Boulevard

Microsoft this week launched a raft of cybersecurity initiatives that address everything from making Windows platforms more secure to adding platforms that are more secure by design. The post Microsoft Adds Raft of Zero-Trust Tools and Platforms appeared first on Security Boulevard.

article thumbnail

NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

The Hacker News

Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims' Facebook Ads Manager accounts and harvest credit card data stored in web browsers.

article thumbnail

This HP laptop is $900 off ahead of Black Friday

Zero Day

Black Friday is a week away, and early deals are showing up. Over on B&H Photo Video, the HP Envy has received a big discount, dropping down to $1,100.

110
110
article thumbnail

Securing the Software Supply Chain: Checkmarx One Expands its Offerings

Security Boulevard

The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to robust strategies to safeguard their supply chains, including tools like SCA scanning, AI and container security, secrets detection and repository health monitoring.

Software 102
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Update now! Apple confirms vulnerabilities are already being exploited

Malwarebytes

Apple has released security patches for most of its operating systems, including iOS, Mac, iPadOS, Safari, and visionOS. The updates for iOS and Intel-based Mac systems are especially important, as they tackle vulnerabilities that are being actively exploited by cybercriminals. You should make sure you update as soon as you can. To check if you’re using the latest software version, go to Settings > General > Software Update.

article thumbnail

Five Critical Privilege Escalation Vulnerabilities Found in Ubuntu’s Default Utility, needrestart

Penetration Testing

Qualys Threat Research Unit uncovers five local privilege escalation flaws, enabling unprivileged users to gain root access. The Qualys Threat Research Unit (TRU) has disclosed five critical vulnerabilities in the... The post Five Critical Privilege Escalation Vulnerabilities Found in Ubuntu’s Default Utility, needrestart appeared first on Cybersecurity News.

article thumbnail

AI Granny Daisy takes up scammers’ time so they can’t bother you

Malwarebytes

A mobile network operator has called in the help of Artificial Intelligence (AI) in the battle against phone scammers. Virgin Media O2 in the UK has built an AI persona called Daisy with the sole purpose of keeping scammers occupied for as long as possible. Basically, until the scammers give up, because Daisy won’t. Daisy uses several AI models that work together listening to what scammers have to say, and then responding in a lifelike manner to give the scammers the idea they are working on an

Scams 94
article thumbnail

CVE-2024-10220: Kubernetes Vulnerability Allows Arbitrary Command Execution

Penetration Testing

A high-severity vulnerability has been discovered in Kubernetes, potentially allowing attackers to execute arbitrary commands outside of container boundaries. Tracked as CVE-2024-10220 and assigned a CVSS score of 8.1, the... The post CVE-2024-10220: Kubernetes Vulnerability Allows Arbitrary Command Execution appeared first on Cybersecurity News.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

NHIs Are the Future of Cybersecurity: Meet NHIDR

The Hacker News

The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure. When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes.

article thumbnail

10 tiny tools and gadgets I keep on my keychain and why

Zero Day

These handy gadgets make for useful gifts during the holidays. If your loved one likes to be prepared for anything, you can't go wrong with these EDC essentials.

98
article thumbnail

Tax Fraud Reporting and Protection: International Fraud Awareness Week

SecureWorld News

As International Fraud Awareness Week (November 17–23) unfolds, the U.S. Internal Revenue Service ( IRS) is highlighting the critical role taxpayers, businesses, and professionals play in combating tax fraud. With tax scams on the rise, the IRS Office of Fraud Enforcement and IRS Criminal Investigation are amplifying efforts to educate the public on recognizing and reporting fraudulent schemes.

Scams 87
article thumbnail

8 Bluesky tips every new user should know

Zero Day

Freely available to anyone, Bluesky offers key advantages over X, Threads, and other social networks. Here are 8 ways to achieve social nirvana.

134
134
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CVE-2024-42450 (CVSS 10): Versa Networks Addresses Critical Vulnerability in Versa Director

Penetration Testing

Versa Networks has issued a security advisory addressing a critical vulnerability (CVE-2024-42450) affecting its Versa Director software. The vulnerability, which carries a CVSS score of 10, could allow unauthenticated attackers... The post CVE-2024-42450 (CVSS 10): Versa Networks Addresses Critical Vulnerability in Versa Director appeared first on Cybersecurity News.

article thumbnail

Update your iPhone, iPad, and Mac now to patch these serious zero-day security flaws

Zero Day

The emergency updates resolve two zero-day flaws that may have already been exploited in the wild.

116
116
article thumbnail

Microsoft Veeps Ignite Fire Under CrowdStrike

Security Boulevard

BSODs begone! Redmond business leaders line up to say what’s new in Windows security. The post Microsoft Veeps Ignite Fire Under CrowdStrike appeared first on Security Boulevard.

article thumbnail

Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects

The Hacker News

Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26 vulnerabilities in various open-source code repositories, including a medium-severity flaw in the OpenSSL cryptographic library.

82
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How Google turns Android into a desktop OS in 5 steps

Zero Day

Merging Android and ChromeOS is a bold first step, but turning Android into a true alternative to MacOS, iPadOS, and Windows requires Google to make some big moves.

114
114
article thumbnail

Inside the Booming ‘AI Pimping’ Industry

WIRED Threat Level

AI-generated influencers based on stolen images of real-life adult content creators are flooding social media.

Media 100
article thumbnail

One of the best budget smartwatches I've tested provides a ton of health data (and it's on sale)

Zero Day

The Amazfit BIP 5 provides an exhaustive list of health and fitness metrics through Zepp, the same app that much more expensive smartwatches use. Right now, it's on sale for $69.

81
article thumbnail

“Sad announcement” email leads to tech support scam

Malwarebytes

Tech support scammers are again stooping low with their email campaigns. This particular one hints that one of your contacts may have met an untimely end. It all starts with an email titled “Sad announcement” followed by a full name of someone you know. The email may appear to come from the person themselves. A co-worker who received such an email pointed it out to our team.

Scams 73
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The best web hosting services of 2024: Expert tested and reviewed

Zero Day

Do you want to build a website, but you're unsure where to start? You should start with a reputable hosting service. We've tested the top web hosting services that offer solid customer service and good value for the money.

81
article thumbnail

Ford data breach involved a third-party supplier

Security Affairs

Ford investigates a data breach linked to a third-party supplier and pointed out that its systems and customer data were not compromised. Ford investigation investigated a data breach after a threat actors claimed the theft of customer information on the BreachForums cybercrime. On November 17, threat actors IntelBroker and EnergyWeaponUser published a post on BreachForums announcing they have stolen 44,000 Ford customer records.

article thumbnail

Black Friday Scammers are Hard at Work: Security Experts

Security Boulevard

Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season gets underway, according to cybersecurity firms. The post Black Friday Scammers are Hard at Work: Security Experts appeared first on Security Boulevard.

article thumbnail

iPhone 16 Pro vs. iPhone 14 Pro: Should you upgrade to the latest model?

Zero Day

Apple's latest iPhone 16 Pro sees major improvements, but do they warrant upgrading from the two-year-old iPhone 14 Pro? We'll help you decide.

89
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!