Tue.Feb 18, 2025

article thumbnail

How Phished Data Turns into Apple & Google Wallets

Krebs on Security

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.

Phishing 278
article thumbnail

A New Hope for Threat Modeling, on The CyberTuesday Podcast

Adam Shostack

Adam was on the CyberTuesday podcast I recently had the pleasure of joining Simon Whittaker on the CyberTuesday podcast for a wide-ranging discussion about threat modeling and organizational culture. I wanted to share some key themes we explored. One of the core messages I emphasized is how we can make threat modeling more accessible. If youve read my recent blog post on Hoarding, Debt and Threat Modeling , youll hear me reiterate how people often try to model everything at once and get overwhel

130
130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Story About Medical Device Security

Schneier on Security

Ben Rothke relates a story about me working with a medical device firm back when I was with BT. I don’t remember the story at all, or who the company was. But it sounds about right.

271
271
article thumbnail

Hard drives containing sensitive medical data found in flea market

Malwarebytes

Somebody bought a batch of 15 GB hard drives from a flea market, and during a routine check of the contents they found medical data about hundreds of patients. After some more investigation in the Netherlands, it turned out the data came from a software provider in the medical industry which had gone bankrupt. Under Dutch law, storage media with medical data must be professionally erased with certification.

Marketing 107
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

AI Cybersecurity Firm Raises $100 Million to Strengthen National Security

eSecurity Planet

Dream, an AI cybersecurity startup, has raised $100 million in a Series B funding round led by Bain Capital Ventures to bolster its mission of defending nations and critical infrastructure from cyber threats. Other investors include Group 11, Tru Arrow, Tau Capital, and Aleph, pushing Dreams valuation to $1.1 billion. Sophisticated cyber-attacks on our critical infrastructure are increasing in both prevalence and complexity,” Sebastian Kurz, co-founder and president of Dream, said in a pre

article thumbnail

Juniper Networks fixed a critical flaw in Session Smart Routers

Security Affairs

Juniper Networks has addressed a critical vulnerability, tracked as CVE-2025-21589, impacting the Session Smart Router. Juniper Networks addressed a critical authentication bypass vulnerability, tracked as CVE-2025-21589 (CVSS score of 9.8), affecting its Session Smart Router product. “An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router may allow a network-based attacker to bypass authentication and take administrative control

LifeWorks

More Trending

article thumbnail

Xerox VersaLink C7025 Multifunction printer flaws may expose Windows Active Directory credentials to attackers

Security Affairs

Xerox VersaLink C7025 Multifunction printer flaws could allow attackers to capture authentication credentials via pass-back attacks via LDAP and SMB/FTP services. Rapid7 researchers discovered vulnerabilities in Xerox Versalink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via LDAP and SMB/FTP services.

article thumbnail

New Mac Malware Poses as Browser Updates

Tech Republic Security

Researchers warn of rising macOS-targeted attacks as hackers exploit fake updates to bypass security. FrigidStealer malware highlights growing enterprise risks.

Malware 165
article thumbnail

U.S. CISA adds SonicWall SonicOS and Palo Alto PAN-OS flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SonicOS and Palo Alto PAN-OS vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple iOS and iPadOS and Mitel SIP Phones vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

Facts, Schmacts – Meta Joins X in Ceasing Content Moderation

Security Boulevard

On January 6, 2025, Meta, formerly known as Facebook, formally announced that it would cease its fact-checking operations, and allow the internet itself, through comments posted, to be the final arbiter of what is true and false. The post Facts, Schmacts – Meta Joins X in Ceasing Content Moderation appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Download your Kindle books ASAP - before Amazon kills this feature next week

Zero Day

The clock is ticking for Kindle users. After February 2025, a long-standing feature disappears. Will this change how you buy and store digital books? Read on to find out.

145
145
article thumbnail

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now

The Hacker News

Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions.

143
143
article thumbnail

Windows 11 update breaks File Explorer - among other glitches

Zero Day

Microsoft's latest Patch Tuesday fixed several bugs but triggered several problems. Some users are struggling just to install the security update.

134
134
article thumbnail

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

The Hacker News

The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor's malicious payload into an external process, waitfor.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Elon Musk’s DOGE Is Being Sued Under the Privacy Act: What to Know

WIRED Threat Level

At least eight ongoing lawsuits related to the so-called Department of Government Efficiencys alleged access to sensitive data hinge on the Watergate-inspired Privacy Act of 1974. But its not airtight.

article thumbnail

Debunking the AI Hype: Inside Real Hacker Tactics

The Hacker News

Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs Red Report 2025 which analyzed over one million malware samples, there's been no significant surge, so far, in AI-driven attacks.

article thumbnail

Knowledge management takes center stage in the AI journey

Zero Day

Without a strong knowledge management ability, customer experience leaders will be unable to realize the potential of AI.

121
121
article thumbnail

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

The Hacker News

Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to set up 2FA for Linux desktop logins for added security

Zero Day

If you want to add an extra layer of security to your Linux desktop operating system, it can be done in just a couple of minutes.

121
121
article thumbnail

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

The Hacker News

The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024.

article thumbnail

CVE-2024-52577 (CVSS 9.5): Apache Ignite Vulnerability Could Allow Remote Code Execution

Penetration Testing

A high-severity vulnerability has been discovered in Apache Ignite, a popular open-source distributed database for high-performance computing. The The post CVE-2024-52577 (CVSS 9.5): Apache Ignite Vulnerability Could Allow Remote Code Execution appeared first on Cybersecurity News.

article thumbnail

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below - CVE-2025-0108 (CVSS score: 7.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

US Military, Defense Contractors Infected with Infostealers: Hudson Rock

Security Boulevard

A report by cybersecurity firm Hudson Rock says hundreds of computers from the U.S. Army and Navy and defense contractors like Honeywell and Boeing are infected with infostealer malware, endangering the security of the systems and threatening third-party players. The post US Military, Defense Contractors Infected with Infostealers: Hudson Rock appeared first on Security Boulevard.

Malware 118
article thumbnail

My new favorite Android smartwatch outperforms Google and Samsung in a crucial way

Zero Day

The OnePlus Watch 3 is one of the best Google Wear OS watches available today, thanks to its improved battery life, design, and utility.

116
116
article thumbnail

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates

The Hacker News

Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher).

Malware 111
article thumbnail

How to format USB drives on Linux, MacOS, and Windows

Zero Day

If you need to format a USB flash drive, here's how it's done on all three major operating systems.

115
115
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

No, you’re not fired – but beware of job termination scams

We Live Security

Some employment scams take an unexpected turn as cybercriminals shift from hiring to firing staff.

Scams 103
article thumbnail

Why rebooting your phone daily is your best defense against zero-click attacks

Zero Day

Phone hacking technologies are becoming more and more inconspicuous. That's why you should treat your phone like a computer, according to this cybersecurity expert.

article thumbnail

PirateFi Removed: Malware Found in Steam Game

Penetration Testing

Valve has removed the video game PirateFi from its Steam platform after the discovery of embedded malicious software. The post PirateFi Removed: Malware Found in Steam Game appeared first on Cybersecurity News.

Malware 99
article thumbnail

I tried using the Galaxy S25 Ultra as my only computer - and it redefined my workflow

Zero Day

A hidden Samsung feature lets you turn your phone into a desktop by connecting it to a monitor or TV - just ensure your favorite apps are supported.

111
111
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!