Fri.Apr 11, 2025

article thumbnail

AI Vulnerability Finding

Schneier on Security

Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer overflows in filesystem parsers, command flaws, and a side-channel in cryptographic comparison. Additionally, 9 buffer overflows in parsing SquashFS, EXT4, CramFS, JFFS2, and symlinks were discovered in U-Boot and Barebox, which require physical access to exploit.

286
286
article thumbnail

News alert: INE Security highlights why hands-on labs can help accelerate CMMC 2.0 compliance

The Last Watchdog

Cary, NC, Apr. 11, 2025, CyberNewswire — Defense contractors are facing increased pressure to meet the Department of Defense’s stringent Cybersecurity Maturity Model Certification (CMMC) 2.0 requirements ahead of 2025 compliance deadlines. INE Security , a leading global provider of cybersecurity training and certifications, is highlighting how hands-on cybersecurity labs are proving critical for organizations seeking to achieve compliance efficiently and effectively.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InstaWP Connect Plugin Exposes WordPress Sites to Critical File Inclusion Vulnerability

Penetration Testing

A severe security vulnerability has been identified in the InstaWP Connect WordPress plugin, posing a significant risk to websites using this tool. The vulnerability, tracked as CVE-2025-2636, is an unauthenticated Local PHP File Inclusion flaw that could allow attackers to gain complete control over affected websites. InstaWP Connect is a WordPress plugin developed by the […] The post InstaWP Connect Plugin Exposes WordPress Sites to Critical File Inclusion Vulnerability appeared first on

Risk 113
article thumbnail

Palo Alto warns of brute-force login attempts on PAN-OS GlobalProtect gateways indicating possible upcoming attacks

Security Affairs

Experts warn of brute-force login attempts on PAN-OS GlobalProtect gateways following increased scanning activity on its devices. Palo Alto Networks reports brute-force login attempts on PAN-OS GlobalProtect gateways. The security firm pointed out that no known vulnerability has been exploited, but monitoring and analysis continue. “Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to Prove the ROI of Your Vulnerability Management Metrics to the Board?

Security Boulevard

The ROI of Vulnerability Management comes down to the metricsthese might sound boring, but they are the magic numbers that decide whether security spending should be considered a cost or. The post How to Prove the ROI of Your Vulnerability Management Metrics to the Board? appeared first on Strobes Security. The post How to Prove the ROI of Your Vulnerability Management Metrics to the Board?

104
104
article thumbnail

Laboratory Services Cooperative data breach impacts 1.6 Million People

Security Affairs

Laboratory Services Cooperative discloses a data breach from October 2024 that exposed personal and medical info of 1.6 million individuals. Laboratory Services Cooperative disclosed a data breach that impacted the personal and medical information of 1.6 million people. The Laboratory Services Cooperative (LSC) is a clinical laboratory based in Bremerton, Washington, providing diagnostic testing services primarily to Planned Parenthood centers across 31 U.S. states.

LifeWorks

More Trending

article thumbnail

The Pall Mall Pact and why it matters

Malwarebytes

The US State Department reportedly plans to sign an international agreement designed to govern the use of commercial spyware known as the Pall Mall Pact. The Pall Mall Pact, formally known as the Pall Mall Process, was initiated by France and the United Kingdom in February 2024. The goal of the Pall Mall Pact is to regulate Commercial Cyber Intrusion Capabilities (CCICs), or what we usually refer to as spyware and surveillance tools.

Spyware 76
article thumbnail

Critical Vulnerability in Everest Forms Plugin Threatens WordPress Sites

Penetration Testing

A critical security vulnerability has been discovered in the Everest Forms WordPress plugin, putting over 100,000 websites at potential risk. The vulnerability, identified as CVE-2025-3439 (CVSS 9.8), is an Unauthenticated PHP Object Injection flaw that could allow attackers to inject malicious code into vulnerable websites. Everest Forms is a popular WordPress form builder plugin used […] The post Critical Vulnerability in Everest Forms Plugin Threatens WordPress Sites appeared first on D

Risk 78
article thumbnail

Protect yourself from tax season scams

Webroot

For most of us, tax season is all about finding documents, filling out forms, and crossing your fingers youre getting a refund. But while youre busy trying to get your returns filed on time, tax scammers and identity thieves are busy trying to steal your precious personal information. During tax season, a vast amount of valuable personal and financial data is shared online, making it prime time for cybercriminals to rob you of your confidential information, identity, and money.

Scams 60
article thumbnail

ChatGPT Introduces “Memory” Feature for Personalized Interactions

Penetration Testing

OpenAI CEO Sam Altman recently announced via his personal X account the introduction of the “Memory” feature within the ChatGPT service. This capability enables the system to recall users’ previous interactions, sparing them from having to repeatedly reintroduce shared information. As a result, ChatGPT can respond more swiftly and offer more contextually relevant suggestions and […] The post ChatGPT Introduces “Memory” Feature for Personalized Interactions app

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Security Boulevard

Insight No. 1 How to survive without CISA As CISA scales back , its time for enterprises to wake up to a harsh reality: You cant rely on the government to secure your infrastructure. The safety net is shrinking, and those still waiting for public-sector handholding are falling behind. Smart orgs are already shifting to private-sector threat intel, red-teaming services, and collaborative alliances that move faster and hit harder.

CISO 59
article thumbnail

Precision-Validated Phishing: A New Era of Targeted Credential Theft

Penetration Testing

A recent report by Cofense Intelligence reveals a game-changing phishing technique called Precision-Validated Phishinga surgical approach to credential theft thats leaving security teams scrambling. Forget the spray-and-pray tactics of traditional phishing. This new method is all about quality over quantity, with threat actors only targeting pre-verified, active email accounts, making their attacks stealthier, more effective, […] The post Precision-Validated Phishing: A New Era of Targeted

article thumbnail

Navigating New Cyber-Physical System Security Regulations

Security Boulevard

Cyber-Physical Systems (CPS) are no longer the stuff of science fiction; they are woven into the fabric of our daily lives, organizations, and critical infrastructure. From smart grids managing our power to the connected cars we drive and the automated systems in our factories, CPS offers incredible benefits. But with great power comes great responsibility [] The post Navigating New Cyber-Physical System Security Regulations appeared first on Viakoo, Inc.

Risk 64
article thumbnail

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

The Hacker News

Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat actors warned of a surge in suspicious login scanning activity targeting its appliances.

Passwords 131
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft Moves Forward With Controversial Recall Feature

Security Boulevard

Microsoft a year ago was about to launch Recall, a Windows feature for Copilot+ PCs that takes regular screenshots of users' systems and stores them so they can be searched for later. Privacy and security concerns forced the company to pull it back and rework it. Now it is in preview with Windows Insiders. The post Microsoft Moves Forward With Controversial Recall Feature appeared first on Security Boulevard.

article thumbnail

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

The Hacker News

Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762.

VPN 130
article thumbnail

Geopolitics Just Cranked Up Your Threat Model, Again. Here’s What Cyber Pros Need to Know

Security Boulevard

If it feels like your entire cybersecurity program is once again operating on a geopolitical fault line, you're not imagining things. The intersection of global politics and cybersecurity has grown a whole lot messier and more consequential in recent weeks. With the current U.S. Administration turning up the heat on China through aggressive tariffs and foreign policy pressure, the ripple effects on cybersecurity are no longer hypothetical.

Risk 52
article thumbnail

AkiraBot: AI-Powered Spam Bot Floods Websites with Personalized Messages

Penetration Testing

Spammers are constantly adapting their tactics to exploit new digital communication channels. A recent report by SentinelLABS sheds light on one such menace: AkiraBot, a sophisticated Python framework designed to bombard website contact forms and chat widgets with AI-generated spam messages. AkiraBot is not a malware strain, nor is it related to the Akira ransomware […] The post AkiraBot: AI-Powered Spam Bot Floods Websites with Personalized Messages appeared first on Daily CyberSecurity.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft is pushing its controversial Recall feature to Windows Insiders

Zero Day

With Recall now in preview mode for Windows Insiders on Copilot+ PCs, Microsoft is testing the waters for an official release.

125
125
article thumbnail

ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices

Security Boulevard

A high severity vulnerability in DICOM, the healthcare industrys standard file protocol for medical imaging, has remained exploitable years after its initial disclosure. The flaw enables attackers to embed malicious code within legitimate medical image files. While previous research demonstrated this vulnerabilitys impact on Windows-based medical systems, Praetorians new proof of concept, ELFDICOM, extends the [] The post ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices appe

Malware 52
article thumbnail

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

The Hacker News

The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday.

article thumbnail

Microsoft’s April Security Update of High-Risk Vulnerabilities in Multiple Products

Security Boulevard

Overview On April 9, NSFOCUS CERT detected that Microsoft released a security update patch for April, fixing 126 security problems in widely used products such as Windows, Microsoft Office, Azure, Microsoft Edge for iOS, Microsoft Visual Studio, etc. This includes high-risk vulnerabilities such as privilege escalation and remote code execution. Among the vulnerabilities fixed in [] The post Microsofts April Security Update of High-Risk Vulnerabilities in Multiple Products appeared first on NSFOC

Risk 52
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Why Adobe Firefly might be the only AI image tool that actually matters

Zero Day

If you're using AI-generated images or plan to, there's something you need to know now.

110
110
article thumbnail

BSidesLV24 – Breaking Ground – Redis Or Not: Argo CD & GitOps From An Attacker’s Perspective

Security Boulevard

Authors/Presenters: Oreen Livni Shein, Elad Pticha Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – Redis Or Not: Argo CD & GitOps From An Attacker’s Perspective appeared first on Security Boulevard.

article thumbnail

SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

The Hacker News

Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. These bogus websites masquerade as Google Play Store install pages for apps like the Chrome web browser, indicating an attempt to deceive unsuspecting users into installing the malware instead.

Malware 105
article thumbnail

Is Your Kubernetes Infrastructure Resilient? Test It with a Chaos Day

Security Boulevard

We all know the feeling: the pit in your stomach when a critical application goes down (and you have no idea what went wrong). In today's always-on world, downtime isn't just inconvenient; it can be catastrophic to your reputation and even your business. So, how can you ensure your Kubernetes infrastructure is truly resilient? The answer might surprise you: test it with a Chaos Day.

52
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Biometrics vs. passcodes: What lawyers recommend if you're worried about warrantless phone searches

Zero Day

Do passcodes really protect you more from warrantless phone searches than biometrics? It's complicated.

102
102
article thumbnail

Seeing the Big Picture in Phishing Defense: IRONSCALES & CrowdStrike

Security Boulevard

At the start of this year, IRONSCALES launched an integration with CrowdStrike Falcon Next-Gen SIEM , delivering enhanced threat visibility, detection, and correlation to help organizations combat phishing and account takeover (ATO) threats. This integration reflects our shared commitment to simplifying and strengthening cross-domain securityincluding email securityas a critical part of modern cyber defense.

article thumbnail

This compact smart heater easily warms up my living room without taking up much space

Zero Day

The Dreo Smart Wall Heater is efficient and affordable and has kept my family warm throughout the winter and spring.

98
article thumbnail

BSidesLV24 – Breaking Ground – The Fault In Our Metrics: Rethinking How We Measure Detection & Response

Security Boulevard

Author/Presenter: Allyn Stott Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – The Fault In Our Metrics: Rethinking How We Measure Detection & Response appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!