Thu.Oct 24, 2024

article thumbnail

What Is PCI Compliance? A Simple Guide for Businesses

Tech Republic Security

Learn what PCI compliance is and why it’s crucial for businesses handling credit card data. Explore key requirements to ensure security and protect customer information.

141
141
article thumbnail

Pinterest tracks users without consent, alleges complaint

Malwarebytes

Pinterest has received a complaint from privacy watchdog noyb (None of your business) over the unsolicited tracking of its users. Pinterest allows you to pin images to virtual pinboards; useful for interior design, recipe ideas, party inspiration, and much more. It started as a virtual replacement for paper catalogs to share recipes, but has since grown into a visual search and e-commerce platform.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

The Hacker News

The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security flaw in Google Chrome to seize control of infected devices. Cybersecurity vendor Kaspersky said it discovered a novel attack chain in May 2024 that targeted the personal computer of an unnamed Russian national with the Manuscrypt backdoor.

article thumbnail

How ChatGPT scanned 170k lines of code in seconds, saving me hours of work

Zero Day

Have a question that requires a lot of text or numerical analysis? Consider running it by ChatGPT or another popular model -- the answer might surprise you.

142
142
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New Threat Group UNC5820 Targets FortiManager Zero-Day CVE-2024-47575 in Global Cyberattack

Penetration Testing

In October 2024, Mandiant, in collaboration with Fortinet, uncovered the mass exploitation of FortiManager appliances across multiple industries. This zero-day vulnerability, designated as CVE-2024-47575, allows malicious actors to execute arbitrary... The post New Threat Group UNC5820 Targets FortiManager Zero-Day CVE-2024-47575 in Global Cyberattack appeared first on Cybersecurity News.

article thumbnail

FortiJump flaw CVE-2024-47575 has been exploited in zero-day attacks since June 2024

Security Affairs

The “FortiJump” flaw (CVE-2024-47575) has been exploited in zero-day attacks since June 2024, impacting over 50 servers, says Mandiant. A new report published by Mandiant states that the recently disclosed Fortinet FortiManager flaw “FortiJump” CVE-2024-47575 (CVSS v4 score: 9.8) has been exploited since June 2024 in zero-day attacks on over 50 servers.

More Trending

article thumbnail

Pwn2Own Ireland 2024 Day 2: participants demonstrated an exploit against Samsung Galaxy S24

Security Affairs

On the second day of Pwn2Own Ireland 2024, researchers demonstrated an exploit for the Samsung Galaxy S24. On day two of Pwn2Own Ireland 2024 , hackers demonstrated attacks against 51 zero-day vulnerabilities, earning a total of $358,625, prizes that we have sum to the $516,250 earned by participants on the first day of the event. With the $516,250 earned by participants on the first day of the event , the total payout at the hacking contest organized by Trend Micro’s Zero Day Initiative (ZDI

Hacking 128
article thumbnail

Ray-Ban Meta vs. GoPro: I took my smart glasses fly fishing and it was surprisingly relaxing

Zero Day

Fishing is one of my favorite ways to decompress and take in the beauty of the world around me. Meta's Ray-Ban smart glasses helped me capture that without diminishing the experience at all - unlike some other gadgets I've tried.

126
126
article thumbnail

Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations

The Hacker News

The Irish data protection watchdog on Thursday fined LinkedIn €310 million ($335 million) for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising.

article thumbnail

Cisco fixed tens of vulnerabilities, including an actively exploited one

Security Affairs

Cisco patched vulnerabilities in ASA, FMC, and FTD products, including one actively exploited in a large-scale brute-force attack campaign. Cisco addressed multiple vulnerabilities in Adaptive Security Appliance (ASA), Secure Firewall Management Center (FMC), and Firepower Threat Defense (FTD) products, including an actively exploited flaw tracked as CVE-2024-20481.

VPN 123
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

AWS Cloud Development Kit Vulnerability Exposes Users to Potential Account Takeover Risks

The Hacker News

Cybersecurity researchers have disclosed a security flaw impacting Amazon Web Services (AWS) Cloud Development Kit (CDK) that could have resulted in an account takeover under specific circumstances.

article thumbnail

Majority of SaaS Applications, AI Tools Unmanaged

Security Boulevard

Unmanaged software as a service (SaaS) applications and AI tools within organizations are posing a growing security risk as vulnerabilities increase, according to a report from Grip Security. The post Majority of SaaS Applications, AI Tools Unmanaged appeared first on Security Boulevard.

Software 121
article thumbnail

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack

The Hacker News

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance (ASA) that could lead to a denial-of-service (DoS) condition. The vulnerability, tracked as CVE-2024-20481 (CVSS score: 5.8), affects the Remote Access VPN (RAVPN) service of Cisco ASA and Cisco Firepower Threat Defense (FTD) Software.

Software 110
article thumbnail

Sysdig Predicts Global Cyberattacks Costs Will Exceed $100B in 2025

Security Boulevard

A report published this week by Sysdig predicts global cyberattacks will cost over $100 billion in 2025 based om the fact that the average cost of a public cloud breach alone has eclipsed $5 million, with the number of attacks having increased 154% year over year. The post Sysdig Predicts Global Cyberattacks Costs Will Exceed $100B in 2025 appeared first on Security Boulevard.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics

The Hacker News

Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. "Notably, Qilin.

article thumbnail

North Korean Cyber Espionage Group Tenacious Pungsan Compromises Open-Source Repositories with Backdoored npm Packages

Penetration Testing

In a recent report, the Datadog Security Research Team exposed the latest nefarious activities of the Tenacious Pungsan group, a North Korean cyber-espionage threat actor. Known for its persistence, the... The post North Korean Cyber Espionage Group Tenacious Pungsan Compromises Open-Source Repositories with Backdoored npm Packages appeared first on Cybersecurity News.

article thumbnail

I took my Ray-Ban Meta smart glasses fly fishing, and they beat GoPro in several surprising ways

Zero Day

Fishing is one of my favorite ways to decompress and take in the beauty of the world around me. Meta's Ray-Ban smart glasses helped me capture that without diminishing the experience at all - unlike some other gadgets I've tried.

116
116
article thumbnail

NotLockBit: ransomware discovery serves as wake-up call for Mac users

Graham Cluley

Historically, Mac users haven't had to worry about malware as much as their Windows-using cousins. But that doesn't mean that Mac users should be complacent. And the recent discovery of a new malware strain emphasises that the threat - even if much smaller than on Windows - remains real. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Exploring the Transformative Potential of AI in Cybersecurity 

Security Boulevard

By continuously learning from new data, ML models can adapt to evolving threat landscapes, making them invaluable in identifying zero-day vulnerabilities before they can be exploited. The post Exploring the Transformative Potential of AI in Cybersecurity appeared first on Security Boulevard.

article thumbnail

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

The Hacker News

Sometimes, it turns out that the answers we struggled so hard to find were sitting right in front of us for so long that we somehow overlooked them.

Phishing 111
article thumbnail

Meet ZachXBT, the Masked Vigilante Tracking Down Billions in Crypto Scams and Thefts

WIRED Threat Level

He just untangled a $243 million bitcoin theft, what may be the biggest-ever crypto heist to target a single victim. And he has never shown his face.

Scams 121
article thumbnail

Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset

Security Boulevard

A recent alert jointly issued by a myriad of governmental agencies including CISA, FBI, EPA, DOE, NSA and NCSC-UK has spotlighted activities by Russians targeting U.S. and European critical infrastructure. The post Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset appeared first on Security Boulevard.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The Amazon Fire TV Omni QLED is great for gaming and streaming, and still 25% off

Zero Day

The Amazon Fire TV Omni QLED offers great picture and audio quality for both streaming and console gaming. Save $150 on the 55-inch model, but you'll have to hurry because you might not see a deal this good again until Black Friday.

98
article thumbnail

Third-Party Cyber Risks Surge in U.S. Energy Sector

SecureWorld News

In a time when cyber threats are growing more sophisticated and pervasive, a new report by SecurityScorecard and KPMG LLP sheds light on critical cybersecurity vulnerabilities facing the U.S. energy sector. Titled " A Quantitative Analysis of Cyber Risks in the U.S. Energy Supply Chain ," the report analyzes the cybersecurity performance of the 250 largest U.S. energy companies and their supply chains, with a particular focus on third-party risks.

article thumbnail

This $679 Lenovo IdeaPad has a clever feature that makes it a budget laptop winner

Zero Day

Running Windows S mode, Lenovo's IdeaPad Flex 5 delivers a secure and simplified computing experience - and it's available now for $679.

105
105
article thumbnail

11 Russian Linux Kernel Developers Lose Maintainer Status Due to “Compliance Requirements”

Penetration Testing

The Linux kernel community is buzzing with controversy following the removal of 11 developers, primarily associated with Russian companies, from the list of subsystem maintainers. Greg Kroah-Hartman, the stable branch... The post 11 Russian Linux Kernel Developers Lose Maintainer Status Due to “Compliance Requirements” appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

How to use the Private Space feature in Android 15 - and secure your sensitive data

Zero Day

This feature can improve your Android experience and provide a much-needed security boost.

124
124
article thumbnail

ESET Research Podcast: CosmicBeetle

We Live Security

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world

article thumbnail

Technologist Bruce Schneier on security, society and why we need 'public AI' models

Zero Day

The renowned security expert says fully transparent models can help us turn AI into a tool that produces benefits for everyone.

109
109
article thumbnail

Best PirateBay Proxies: Your Ultimate Guide

SecureBlitz

Are you looking for the best PirateBay proxies? Look no further! PirateBay, the infamous torrent site known for its vast digital content library, has faced numerous blocks and restrictions over the years. Accessing PirateBay often requires circumventing these restrictions using proxies. Proxies act as intermediaries between your device and the PirateBay servers, allowing you to […] The post Best PirateBay Proxies: Your Ultimate Guide appeared first on SecureBlitz Cybersecurity.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.