Thu.Oct 24, 2024

article thumbnail

What Is PCI Compliance? A Simple Guide for Businesses

Tech Republic Security

Learn what PCI compliance is and why it’s crucial for businesses handling credit card data. Explore key requirements to ensure security and protect customer information.

165
165
article thumbnail

FortiJump flaw CVE-2024-47575 has been exploited in zero-day attacks since June 2024

Security Affairs

The “FortiJump” flaw (CVE-2024-47575) has been exploited in zero-day attacks since June 2024, impacting over 50 servers, says Mandiant. A new report published by Mandiant states that the recently disclosed Fortinet FortiManager flaw “FortiJump” CVE-2024-47575 (CVSS v4 score: 9.8) has been exploited since June 2024 in zero-day attacks on over 50 servers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blending Traditional and Emerging Cybersecurity Practices for a Holistic Approach

Security Boulevard

Security leaders must leverage the best of both to truly protect an organization in today's complex digital environment — blending the old with the new. The post Blending Traditional and Emerging Cybersecurity Practices for a Holistic Approach appeared first on Security Boulevard.

article thumbnail

Pwn2Own Ireland 2024 Day 2: participants demonstrated an exploit against Samsung Galaxy S24

Security Affairs

On the second day of Pwn2Own Ireland 2024, researchers demonstrated an exploit for the Samsung Galaxy S24. On day two of Pwn2Own Ireland 2024 , hackers demonstrated attacks against 51 zero-day vulnerabilities, earning a total of $358,625, prizes that we have sum to the $516,250 earned by participants on the first day of the event. With the $516,250 earned by participants on the first day of the event , the total payout at the hacking contest organized by Trend Micro’s Zero Day Initiative (ZDI

Hacking 135
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How ChatGPT scanned 170k lines of code in seconds, saving me hours of work

Zero Day

Have a question that requires a lot of text or numerical analysis? Consider running it by ChatGPT or another popular model -- the answer might surprise you.

142
142
article thumbnail

Meet ZachXBT, the Masked Vigilante Tracking Down Billions in Crypto Scams and Thefts

WIRED Threat Level

He just untangled a $243 million bitcoin theft, what may be the biggest-ever crypto heist to target a single victim. And he has never shown his face.

Scams 141

More Trending

article thumbnail

New Threat Group UNC5820 Targets FortiManager Zero-Day CVE-2024-47575 in Global Cyberattack

Penetration Testing

In October 2024, Mandiant, in collaboration with Fortinet, uncovered the mass exploitation of FortiManager appliances across multiple industries. This zero-day vulnerability, designated as CVE-2024-47575, allows malicious actors to execute arbitrary... The post New Threat Group UNC5820 Targets FortiManager Zero-Day CVE-2024-47575 in Global Cyberattack appeared first on Cybersecurity News.

article thumbnail

Irish Watchdog Imposes Record €310 Million Fine on LinkedIn for GDPR Violations

The Hacker News

The Irish data protection watchdog on Thursday fined LinkedIn €310 million ($335 million) for violating the privacy of its users by conducting behavioral analyses of personal data for targeted advertising.

article thumbnail

Cisco fixed tens of vulnerabilities, including an actively exploited one

Security Affairs

Cisco patched vulnerabilities in ASA, FMC, and FTD products, including one actively exploited in a large-scale brute-force attack campaign. Cisco addressed multiple vulnerabilities in Adaptive Security Appliance (ASA), Secure Firewall Management Center (FMC), and Firepower Threat Defense (FTD) products, including an actively exploited flaw tracked as CVE-2024-20481.

VPN 130
article thumbnail

AWS Cloud Development Kit Vulnerability Exposes Users to Potential Account Takeover Risks

The Hacker News

Cybersecurity researchers have disclosed a security flaw impacting Amazon Web Services (AWS) Cloud Development Kit (CDK) that could have resulted in an account takeover under specific circumstances.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

North Korean Cyber Espionage Group Tenacious Pungsan Compromises Open-Source Repositories with Backdoored npm Packages

Penetration Testing

In a recent report, the Datadog Security Research Team exposed the latest nefarious activities of the Tenacious Pungsan group, a North Korean cyber-espionage threat actor. Known for its persistence, the... The post North Korean Cyber Espionage Group Tenacious Pungsan Compromises Open-Source Repositories with Backdoored npm Packages appeared first on Cybersecurity News.

article thumbnail

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

The Hacker News

Sometimes, it turns out that the answers we struggled so hard to find were sitting right in front of us for so long that we somehow overlooked them.

Phishing 135
article thumbnail

Majority of SaaS Applications, AI Tools Unmanaged

Security Boulevard

Unmanaged software as a service (SaaS) applications and AI tools within organizations are posing a growing security risk as vulnerabilities increase, according to a report from Grip Security. The post Majority of SaaS Applications, AI Tools Unmanaged appeared first on Security Boulevard.

Software 121
article thumbnail

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack

The Hacker News

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance (ASA) that could lead to a denial-of-service (DoS) condition. The vulnerability, tracked as CVE-2024-20481 (CVSS score: 5.8), affects the Remote Access VPN (RAVPN) service of Cisco ASA and Cisco Firepower Threat Defense (FTD) Software.

Software 133
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Sysdig Predicts Global Cyberattacks Costs Will Exceed $100B in 2025

Security Boulevard

A report published this week by Sysdig predicts global cyberattacks will cost over $100 billion in 2025 based om the fact that the average cost of a public cloud breach alone has eclipsed $5 million, with the number of attacks having increased 154% year over year. The post Sysdig Predicts Global Cyberattacks Costs Will Exceed $100B in 2025 appeared first on Security Boulevard.

article thumbnail

New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics

The Hacker News

Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. "Notably, Qilin.

article thumbnail

Ray-Ban Meta vs. GoPro: I took my smart glasses fly fishing and it was surprisingly relaxing

Zero Day

Fishing is one of my favorite ways to decompress and take in the beauty of the world around me. Meta's Ray-Ban smart glasses helped me capture that without diminishing the experience at all - unlike some other gadgets I've tried.

126
126
article thumbnail

Exploring the Transformative Potential of AI in Cybersecurity 

Security Boulevard

By continuously learning from new data, ML models can adapt to evolving threat landscapes, making them invaluable in identifying zero-day vulnerabilities before they can be exploited. The post Exploring the Transformative Potential of AI in Cybersecurity appeared first on Security Boulevard.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to use the Private Space feature in Android 15 - and secure your sensitive data

Zero Day

This feature can improve your Android experience and provide a much-needed security boost.

124
124
article thumbnail

Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset

Security Boulevard

A recent alert jointly issued by a myriad of governmental agencies including CISA, FBI, EPA, DOE, NSA and NCSC-UK has spotlighted activities by Russians targeting U.S. and European critical infrastructure. The post Strengthening Critical Infrastructure Defense: Shifting to an Exposure Management Mindset appeared first on Security Boulevard.

article thumbnail

I took my Ray-Ban Meta smart glasses fly fishing, and they beat GoPro in several surprising ways

Zero Day

Fishing is one of my favorite ways to decompress and take in the beauty of the world around me. Meta's Ray-Ban smart glasses helped me capture that without diminishing the experience at all - unlike some other gadgets I've tried.

116
116
article thumbnail

ESET Research Podcast: CosmicBeetle

We Live Security

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

I demoed the new Snap Spectacles, and the future of AR glasses never looked more promising

Zero Day

A world where your glasses seamlessly blend digital artifacts over reality may not be far off.

115
115
article thumbnail

Ransomware Threat Escalates as Scattered Spider and RansomHub Combine Forces

Penetration Testing

ReliaQuest revealed a concerning new collaboration between the Scattered Spider cybercriminal collective and the rising ransomware group RansomHub. This report highlights a dangerous escalation in ransomware activities, combining Scattered Spider’s... The post Ransomware Threat Escalates as Scattered Spider and RansomHub Combine Forces appeared first on Cybersecurity News.

article thumbnail

Why remove Russian maintainers of Linux kernel? Here's what Torvalds says

Zero Day

Many of us like to think that our open-source work is unrelated to geopolitics. Think again.

111
111
article thumbnail

NotLockBit: ransomware discovery serves as wake-up call for Mac users

Graham Cluley

Historically, Mac users haven't had to worry about malware as much as their Windows-using cousins. But that doesn't mean that Mac users should be complacent. And the recent discovery of a new malware strain emphasises that the threat - even if much smaller than on Windows - remains real. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Technologist Bruce Schneier on security, society and why we need 'public AI' models

Zero Day

The renowned security expert says fully transparent models can help us turn AI into a tool that produces benefits for everyone.

109
109
article thumbnail

Hacking CICS: 7 Ways to Defeat Mainframe Applications

NetSpi Technical

In recent years, significant advancements have taken place within the field of penetration testing CICS and IMS applications. Open-source tool development and an overall rising demand for mainframe security evaluation have accelerated both the desire and required capabilities for mainframe pentesting services. In this post, we will cover 7 different ways to test your mainframe applications for vulnerabilities that are commonly seen in the wild.

Hacking 100
article thumbnail

5 tips for choosing the right AI model for your business

Zero Day

What size language model meets your needs? How can you best use your data? These business leaders give us their opinions.

105
105
article thumbnail

11 Russian Linux Kernel Developers Lose Maintainer Status Due to “Compliance Requirements”

Penetration Testing

The Linux kernel community is buzzing with controversy following the removal of 11 developers, primarily associated with Russian companies, from the list of subsystem maintainers. Greg Kroah-Hartman, the stable branch... The post 11 Russian Linux Kernel Developers Lose Maintainer Status Due to “Compliance Requirements” appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.