Tue.Mar 18, 2025

article thumbnail

News alert: SquareX’s “Year of Browser Bugs” project exposes critical cybersecurity blind spots

The Last Watchdog

Palo Alto, Calif., Mar. 18, 2025, CyberNewswire — SquareX , a pioneer in Browser Detection and Response (BDR) space, announced the launch of the “Year of Browser Bugs” (YOBB) project today, a year-long initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors – the browser.

article thumbnail

ChatGPT SSRF bug quickly becomes a favorite attack vector

Security Affairs

Threat actors exploit a server-side request forgery (SSRF) flaw, tracked as CVE-2024-27564, in ChatGPT, to target US financial and government organizations. Cybersecurity firm Veriti reports that threat actors are exploiting a server-side request forgery (SSRF) vulnerability, tracked as CVE-2024-27564 (CVSS score of 6.5), in ChatGPT to target financial and government organizations in the US.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

My Take: Here’s why Google’s $32B Wiz grab is the latest Big Tech leap sure to further erode privacy

The Last Watchdog

Weve seen this movie before. Alphabet, Googles parent company’s, $32 billion bid for Wiz isnt just about security and privacy. Its the latest round in Big Techs long-running game of business leapfrogwhere each giant keeps lunging into the next guys home turf, trying to reshape the battlefield in its favor. Think about it. Google tried to unseat Microsoft Office with Google Apps.

CISO 130
article thumbnail

U.S. CISA adds Fortinet FortiOS/FortiProxy and GitHub Action flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Fortinet FortiOS/FortiProxyand GitHub Actionflaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability CVE-2025-30066 tj-actions/changed-files GitHub Action Embedded Malicious Code Vulnerability In Fe

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Amazon disables option to store Echo voice recordings on your device

Malwarebytes

Amazon has announced its Echo devices will no longer have the option to store and process requests on the device itself, meaning your voice recordings will now be sent to the cloud for processing. In an email sent to customers, Amazon explained that the feature “Do Not Send Voice Recordings” will no longer be available beginning March 28, 2025.

Internet 109
article thumbnail

New StilachiRAT uses sophisticated techniques to avoid detection

Security Affairs

Microsoft discovered a new remote access trojan (RAT), dubbed StilachiRAT, that uses sophisticated techniques to avoid detection. In November 2024, Microsoft researchers discovered StilachiRAT, a sophisticated remote access trojan (RAT) designed for stealth, persistence, and data theft. Analysis of its WWStartupCtrl64.dll module revealed that the malware supports sophisticated functionalities to steal credentials from browsers, digital wallet data, clipboard content, and system information.

Malware 106

LifeWorks

More Trending

article thumbnail

The Future of Enterprise Security: AI-powered Lateral Defense in a Dynamic Threat Landscape

Security Boulevard

Attackers increasingly leverage AI-powered exploitation and can quickly identify vulnerable systems, infiltrate networks unnoticed and move laterally to compromise critical assets. The post The Future of Enterprise Security: AI-powered Lateral Defense in a Dynamic Threat Landscape appeared first on Security Boulevard.

article thumbnail

Nation-state actors and cybercrime gangs abuse malicious.lnk files for espionage and data theft

Security Affairs

11 state-sponsored APTs exploit malicious.lnk files for espionage and data theft, with ZDI uncovering 1,000 such files used in attacks. At least 11 state-sponsored threat groups have been abusing Windows shortcut files for espionage and data theft, according to an analysis by Trend Micros Zero Day Initiative (ZDI). Trend ZDI researchers discovered 1,000 malicious.lnk files used by nation-state actors and cybercrime groups to execute hidden malicious commands on a victims machine by exploiting th

article thumbnail

Prompt Security Adds Ability to Restrict Access to Data Generated by LLMs

Security Boulevard

Prompt Security today extended its platform to enable organizations to implement policies that restrict the types of data surfaced by a large language model (LLM) that employees are allowed to access. The post Prompt Security Adds Ability to Restrict Access to Data Generated by LLMs appeared first on Security Boulevard.

article thumbnail

Road Tolls Scams Rise on FBI's Radar; Public Warned Against Smishing

SecureWorld News

In recent months, a sophisticated scam has emerged, targeting drivers across the United States with fraudulent text messages about unpaid road tolls. These "smishing" scamsphishing attempts conducted via SMSaim to deceive recipients into divulging personal and financial information. The FBI, along with state authorities and cybersecurity experts, have issued warnings to the public to remain vigilant against these deceptive tactics.

Scams 68
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

“My Vas Pokhoronim!”

Security Boulevard

CISA, in collaboration with the FBI and NSA, identified and attributed multiple attacks to Russian entities, emphasizing the risks posed by state-backed Advanced Persistent Threats (APTs). The post “My Vas Pokhoronim!” appeared first on Security Boulevard.

Risk 80
article thumbnail

Thales OneWelcome Identity Platform and HIPAA Compliance in 2025

Thales Cloud Protection & Licensing

Thales OneWelcome Identity Platform and HIPAA Compliance in 2025 madhav Wed, 03/19/2025 - 05:58 The Health Insurance Portability and Accountability Act (HIPAA) has undergone significant changes in 2025, introducing enhanced requirements to address growing cyber threats and ensure comprehensive data protection. The Thales OneWelcome Identity Platform is fully HIPAA compliant, offering robust Customer Identity and Access Management (CIAM) solutions tailored to meet these updated regulations.

article thumbnail

GitHub Action tj-actions/changed-files was compromised in supply chain attack

Security Affairs

The GitHub Action tj-actions/changed-files was compromised, enabling attackers to extract secrets from repositories using the CI/CD workflow. Researchers reported that threat actors compromised the GitHub Action tj-actions/changed-files , allowing the leak of secrets from repositories using the continuous integration and continuous delivery CI/CD workflow.

Hacking 58
article thumbnail

Alphabet’s $32B Wiz Acquisition Boosts Cloud Security

eSecurity Planet

In a landmark move set to reshape the cybersecurity landscape, Alphabet, the parent company of Google, has agreed to acquire Israeli cybersecurity startup Wiz in a deal valued at approximately $32 billion. The acquisition, which underscores Alphabets ambition to strengthen its cloud security offerings, marks one of the largest investments in cybersecurity to date.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Tech Show London: Making Dating Scams Less Attractive

IT Security Guru

Technology has transformed so many areas of our lives and relatively quickly in the grand scheme of things. From tech used to make education more accessible, for example, to the ever talked about artificial intelligence (AI) shaping many sectors, the way tech has integrated with the modern world both seamlessly and speedily is notable. One area where technology has reshaped experience is online dating.

Scams 57
article thumbnail

What is Infrastructure Intelligence?

Security Boulevard

Cyber threats are growing in sophistication, and adversaries are continually evolving their methods, targeting businesses, governments, and individuals with precision. For network defenders and fraud prevention teams, understanding this evolving landscape is critical to preempt attacks, mitigate risks, and protect key assets. But how do you stay ahead of these relentless attackers?

DNS 59
article thumbnail

CVE-2024-27564: Attackers Exploit OpenAI Vulnerability in the Wild

Penetration Testing

A newly disclosed server-side request forgery (SSRF) vulnerability, tracked as CVE-2024-27564, has become a significant target for cybercriminals, The post CVE-2024-27564: Attackers Exploit OpenAI Vulnerability in the Wild appeared first on Cybersecurity News.

article thumbnail

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

The Hacker News

Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to Take Control of Your Online Presence

Security Through Education

Many of us dont realize just how much we share about ourselves on the internet. Social media provides us with a fast, efficient, and exciting way to share our interests and experiences with our friends, but who outside of our sphere REALLY needs to know all this information about us? The internet never forgetsold accounts, personal information, and forgotten posts can linger for years.

article thumbnail

You have 4 days to update Firefox before everything breaks

Zero Day

This upgrade isn't optional.

132
132
article thumbnail

Silk Typhoon: Unmasking the Cyber Espionage Threat Targeting the U.S. Supply Chain

Approachable Cyber Threats

Category News, Vulnerabilities Risk Level Hackers are setting their sights on the IT supply chain, and your data is the prize. Meet Silk Typhoonthe latest cyber threat you need to know about. If youre part of the US IT supply chain, you know theres no shortage of malicious actors trying to break into your networks and steal your proprietary information.

article thumbnail

Transforming Security Operations With Generative AI 

Security Boulevard

Organizations that adopt these AI-driven strategies will not only improve the accuracy and efficiency of their threat detection but also gain a competitive edge by making smarter, faster decisions in every aspect of their operations. The post Transforming Security Operations With Generative AI appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

The Hacker News

An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017.

128
128
article thumbnail

Breaking Down Risks in Cybersecurity

Security Boulevard

Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity A great conversation on the Cyber Crime Junkies podcast with David Mauro! We covered so many different topics that the CISOs are struggling with: Generative vs Agentic AI risks and opportunities How cyber attackers leverage powerful tools like AI Why defenders are slower than attackers in using AI How attackers adapt with AI advantages Why the value of security is a blind spot The difficulty of cybe

Risk 52
article thumbnail

How a researcher with no malware-coding skills tricked AI into creating Chrome infostealers

Zero Day

Anyone can become a zero-knowledge threat actor now, thanks to AI.

Malware 121
article thumbnail

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

The Hacker News

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data.

Malware 121
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Penetration Testing vs. Vulnerability Assessment: What’s the Difference and Which One Do You Need?

Security Boulevard

Discover the differences between pen testing and vulnerability assessments, and how both can boost your cybersecurity defenses. The post Penetration Testing vs. Vulnerability Assessment: Whats the Difference and Which One Do You Need? appeared first on Scytale. The post Penetration Testing vs. Vulnerability Assessment: Whats the Difference and Which One Do You Need?

article thumbnail

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

The Hacker News

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code.

article thumbnail

Finally, a Linux distro for power users with a refreshing approach to OS design

Zero Day

NixOS is a well-designed OS with a fantastic array of layouts and features, but I recommend it to Linux users who aren't afraid of a little learning curve.

118
118
article thumbnail

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

The Hacker News

Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. "This acquisition represents an investment by Google Cloud to accelerate two large and growing trends in the AI era: improved cloud security and the ability to use multiple clouds (multicloud)," the tech giant said today.

114
114
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!