Fri.Apr 11, 2025

article thumbnail

AI Vulnerability Finding

Schneier on Security

Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer overflows in filesystem parsers, command flaws, and a side-channel in cryptographic comparison. Additionally, 9 buffer overflows in parsing SquashFS, EXT4, CramFS, JFFS2, and symlinks were discovered in U-Boot and Barebox, which require physical access to exploit.

307
307
article thumbnail

News alert: INE Security highlights why hands-on labs can help accelerate CMMC 2.0 compliance

The Last Watchdog

Cary, NC, Apr. 11, 2025, CyberNewswire — Defense contractors are facing increased pressure to meet the Department of Defense’s stringent Cybersecurity Maturity Model Certification (CMMC) 2.0 requirements ahead of 2025 compliance deadlines. INE Security , a leading global provider of cybersecurity training and certifications, is highlighting how hands-on cybersecurity labs are proving critical for organizations seeking to achieve compliance efficiently and effectively.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InstaWP Connect Plugin Exposes WordPress Sites to Critical File Inclusion Vulnerability

Penetration Testing

A severe security vulnerability has been identified in the InstaWP Connect WordPress plugin, posing a significant risk to websites using this tool. The vulnerability, tracked as CVE-2025-2636, is an unauthenticated Local PHP File Inclusion flaw that could allow attackers to gain complete control over affected websites. InstaWP Connect is a WordPress plugin developed by the […] The post InstaWP Connect Plugin Exposes WordPress Sites to Critical File Inclusion Vulnerability appeared first on

Risk 108
article thumbnail

Palo Alto warns of brute-force login attempts on PAN-OS GlobalProtect gateways indicating possible upcoming attacks

Security Affairs

Experts warn of brute-force login attempts on PAN-OS GlobalProtect gateways following increased scanning activity on its devices. Palo Alto Networks reports brute-force login attempts on PAN-OS GlobalProtect gateways. The security firm pointed out that no known vulnerability has been exploited, but monitoring and analysis continue. “Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to Prove the ROI of Your Vulnerability Management Metrics to the Board?

Security Boulevard

The ROI of Vulnerability Management comes down to the metricsthese might sound boring, but they are the magic numbers that decide whether security spending should be considered a cost or. The post How to Prove the ROI of Your Vulnerability Management Metrics to the Board? appeared first on Strobes Security. The post How to Prove the ROI of Your Vulnerability Management Metrics to the Board?

104
104
article thumbnail

Laboratory Services Cooperative data breach impacts 1.6 Million People

Security Affairs

Laboratory Services Cooperative discloses a data breach from October 2024 that exposed personal and medical info of 1.6 million individuals. Laboratory Services Cooperative disclosed a data breach that impacted the personal and medical information of 1.6 million people. The Laboratory Services Cooperative (LSC) is a clinical laboratory based in Bremerton, Washington, providing diagnostic testing services primarily to Planned Parenthood centers across 31 U.S. states.

LifeWorks

More Trending

article thumbnail

The Pall Mall Pact and why it matters

Malwarebytes

The US State Department reportedly plans to sign an international agreement designed to govern the use of commercial spyware known as the Pall Mall Pact. The Pall Mall Pact, formally known as the Pall Mall Process, was initiated by France and the United Kingdom in February 2024. The goal of the Pall Mall Pact is to regulate Commercial Cyber Intrusion Capabilities (CCICs), or what we usually refer to as spyware and surveillance tools.

Spyware 82
article thumbnail

ChatGPT Introduces “Memory” Feature for Personalized Interactions

Penetration Testing

OpenAI CEO Sam Altman recently announced via his personal X account the introduction of the “Memory” feature within the ChatGPT service. This capability enables the system to recall users’ previous interactions, sparing them from having to repeatedly reintroduce shared information. As a result, ChatGPT can respond more swiftly and offer more contextually relevant suggestions and […] The post ChatGPT Introduces “Memory” Feature for Personalized Interactions app

article thumbnail

Protect yourself from tax season scams

Webroot

For most of us, tax season is all about finding documents, filling out forms, and crossing your fingers youre getting a refund. But while youre busy trying to get your returns filed on time, tax scammers and identity thieves are busy trying to steal your precious personal information. During tax season, a vast amount of valuable personal and financial data is shared online, making it prime time for cybercriminals to rob you of your confidential information, identity, and money.

Scams 62
article thumbnail

Critical Vulnerability in Everest Forms Plugin Threatens WordPress Sites

Penetration Testing

A critical security vulnerability has been discovered in the Everest Forms WordPress plugin, putting over 100,000 websites at potential risk. The vulnerability, identified as CVE-2025-3439 (CVSS 9.8), is an Unauthenticated PHP Object Injection flaw that could allow attackers to inject malicious code into vulnerable websites. Everest Forms is a popular WordPress form builder plugin used […] The post Critical Vulnerability in Everest Forms Plugin Threatens WordPress Sites appeared first on D

Risk 72
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Microsoft Moves Forward With Controversial Recall Feature

Security Boulevard

Microsoft a year ago was about to launch Recall, a Windows feature for Copilot+ PCs that takes regular screenshots of users' systems and stores them so they can be searched for later. Privacy and security concerns forced the company to pull it back and rework it. Now it is in preview with Windows Insiders. The post Microsoft Moves Forward With Controversial Recall Feature appeared first on Security Boulevard.

article thumbnail

Precision-Validated Phishing: A New Era of Targeted Credential Theft

Penetration Testing

A recent report by Cofense Intelligence reveals a game-changing phishing technique called Precision-Validated Phishinga surgical approach to credential theft thats leaving security teams scrambling. Forget the spray-and-pray tactics of traditional phishing. This new method is all about quality over quantity, with threat actors only targeting pre-verified, active email accounts, making their attacks stealthier, more effective, […] The post Precision-Validated Phishing: A New Era of Targeted

article thumbnail

Navigating New Cyber-Physical System Security Regulations

Security Boulevard

Cyber-Physical Systems (CPS) are no longer the stuff of science fiction; they are woven into the fabric of our daily lives, organizations, and critical infrastructure. From smart grids managing our power to the connected cars we drive and the automated systems in our factories, CPS offers incredible benefits. But with great power comes great responsibility [] The post Navigating New Cyber-Physical System Security Regulations appeared first on Viakoo, Inc.

Risk 69
article thumbnail

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

The Hacker News

Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762.

VPN 131
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Geopolitics Just Cranked Up Your Threat Model, Again. Here’s What Cyber Pros Need to Know

Security Boulevard

If it feels like your entire cybersecurity program is once again operating on a geopolitical fault line, you're not imagining things. The intersection of global politics and cybersecurity has grown a whole lot messier and more consequential in recent weeks. With the current U.S. Administration turning up the heat on China through aggressive tariffs and foreign policy pressure, the ripple effects on cybersecurity are no longer hypothetical.

Risk 59
article thumbnail

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

The Hacker News

Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat actors warned of a surge in suspicious login scanning activity targeting its appliances.

Passwords 130
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 04/11/25

Security Boulevard

Insight No. 1 How to survive without CISA As CISA scales back , its time for enterprises to wake up to a harsh reality: You cant rely on the government to secure your infrastructure. The safety net is shrinking, and those still waiting for public-sector handholding are falling behind. Smart orgs are already shifting to private-sector threat intel, red-teaming services, and collaborative alliances that move faster and hit harder.

CISO 59
article thumbnail

Microsoft is pushing its controversial Recall feature to Windows Insiders

Zero Day

With Recall now in preview mode for Windows Insiders on Copilot+ PCs, Microsoft is testing the waters for an official release.

125
125
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices

Security Boulevard

A high severity vulnerability in DICOM, the healthcare industrys standard file protocol for medical imaging, has remained exploitable years after its initial disclosure. The flaw enables attackers to embed malicious code within legitimate medical image files. While previous research demonstrated this vulnerabilitys impact on Windows-based medical systems, Praetorians new proof of concept, ELFDICOM, extends the [] The post ELFDICOM: PoC Malware Polyglot Exploiting Linux-Based Medical Devices appe

Malware 52
article thumbnail

AkiraBot: AI-Powered Spam Bot Floods Websites with Personalized Messages

Penetration Testing

Spammers are constantly adapting their tactics to exploit new digital communication channels. A recent report by SentinelLABS sheds light on one such menace: AkiraBot, a sophisticated Python framework designed to bombard website contact forms and chat widgets with AI-generated spam messages. AkiraBot is not a malware strain, nor is it related to the Akira ransomware […] The post AkiraBot: AI-Powered Spam Bot Floods Websites with Personalized Messages appeared first on Daily CyberSecurity.

article thumbnail

Microsoft’s April Security Update of High-Risk Vulnerabilities in Multiple Products

Security Boulevard

Overview On April 9, NSFOCUS CERT detected that Microsoft released a security update patch for April, fixing 126 security problems in widely used products such as Windows, Microsoft Office, Azure, Microsoft Edge for iOS, Microsoft Visual Studio, etc. This includes high-risk vulnerabilities such as privilege escalation and remote code execution. Among the vulnerabilities fixed in [] The post Microsofts April Security Update of High-Risk Vulnerabilities in Multiple Products appeared first on NSFOC

Risk 52
article thumbnail

Why Adobe Firefly might be the only AI image tool that actually matters

Zero Day

If you're using AI-generated images or plan to, there's something you need to know now.

115
115
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

BSidesLV24 – Breaking Ground – Redis Or Not: Argo CD & GitOps From An Attacker’s Perspective

Security Boulevard

Authors/Presenters: Oreen Livni Shein, Elad Pticha Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – Redis Or Not: Argo CD & GitOps From An Attacker’s Perspective appeared first on Security Boulevard.

article thumbnail

Why I recommend this HP laptop to traveling business professionals and creatives

Zero Day

HP's EliteBook Ultra G1i is impressively lightweight, reliably powerful, and built to last on battery life. But that's just the beginning.

115
115
article thumbnail

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

The Hacker News

The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday.

article thumbnail

Is Your Kubernetes Infrastructure Resilient? Test It with a Chaos Day

Security Boulevard

We all know the feeling: the pit in your stomach when a critical application goes down (and you have no idea what went wrong). In today's always-on world, downtime isn't just inconvenient; it can be catastrophic to your reputation and even your business. So, how can you ensure your Kubernetes infrastructure is truly resilient? The answer might surprise you: test it with a Chaos Day.

52
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

The Hacker News

Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. These bogus websites masquerade as Google Play Store install pages for apps like the Chrome web browser, indicating an attempt to deceive unsuspecting users into installing the malware instead.

Malware 114
article thumbnail

Seeing the Big Picture in Phishing Defense: IRONSCALES & CrowdStrike

Security Boulevard

At the start of this year, IRONSCALES launched an integration with CrowdStrike Falcon Next-Gen SIEM , delivering enhanced threat visibility, detection, and correlation to help organizations combat phishing and account takeover (ATO) threats. This integration reflects our shared commitment to simplifying and strengthening cross-domain securityincluding email securityas a critical part of modern cyber defense.

article thumbnail

Are these cheap Android tablets legit? I tested one, and it beat my iPad in a major way

Zero Day

Blackview's Tab 90 is an affordable Android tablet at roughly $140, but its 11-inch display is one of its many strengths.

110
110
article thumbnail

BSidesLV24 – Breaking Ground – The Fault In Our Metrics: Rethinking How We Measure Detection & Response

Security Boulevard

Author/Presenter: Allyn Stott Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Breaking Ground – The Fault In Our Metrics: Rethinking How We Measure Detection & Response appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!