Tue.Jan 07, 2025

article thumbnail

A Day in the Life of a Prolific Voice Phishing Crew

Krebs on Security

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications to their users, including emails, automated phone calls and system-level messages sent to all signed-in devices.

Phishing 281
article thumbnail

US Treasury Department Sanctions Chinese Company Over Cyberattacks

Schneier on Security

From the Washington Post : The sanctions target Beijing Integrity Technology Group , which U.S. officials say employed workers responsible for the Flax Typhoon attacks which compromised devices including routers and internet-enabled cameras to infiltrate government and industrial targets in the United States, Taiwan, Europe and elsewhere.

Internet 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: CyTwist launches threat detection engine tuned to identify AI-driven malware in minutes

The Last Watchdog

Ramat Gan, Israel, January 7th, 2025, CyberNewswire — CyTwist , a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape is evolving as attackers harness the power of artificial intelligence (AI) to develop advanced and evasive threats.

article thumbnail

Authentication Bypass Vulnerability Found in Dell OpenManage Server Administrator

Penetration Testing

Dell Technologies has issued a critical security advisory for its OpenManage Server Administrator (OMSA) software. The advisory addresses The post Authentication Bypass Vulnerability Found in Dell OpenManage Server Administrator appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

News Alert: Security Risk Advisors joins Microsoft Intelligent Security Association (MISA)

The Last Watchdog

Philadelphia, Pa., Jan. 7, 2025, CyberNewswire — Security Risk Advisors today announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their solutions with Microsoft Security technology to better defend mutual customers against a world of increasing cyber threats.

Risk 130
article thumbnail

Chrome Update Addresses High-Severity Vulnerability: CVE-2025-0291

Penetration Testing

Google has just released a critical security update for its Chrome web browser, addressing a high-severity vulnerability that The post Chrome Update Addresses High-Severity Vulnerability: CVE-2025-0291 appeared first on Cybersecurity News.

More Trending

article thumbnail

License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data

WIRED Threat Level

Misconfigured license-plate-recognition systems reveal the livestreams of individual cameras and the wealth of data they collect about every vehicle that passes by them.

120
120
article thumbnail

New product wows CES by fully charging a phone in under 5 seconds

Zero Day

With Swippitt, you can insert your phone into a toaster-looking contraption and get a full charge in seconds -- and it actually works.

129
129
article thumbnail

IVPN Review: Pricing, Features, Pros, and Cons

Tech Republic Security

Read our IVPN review to uncover its strong security features and privacy-first approach. Discover what sets it apart but are there hidden drawbacks?

VPN 118
article thumbnail

Two OTC continuous glucose monitors won awards at CES - and you can try them now

Zero Day

These over-the-counter CGMs from health brands Dexcom and Abbott make glucose monitoring affordable and accessible. Here's how they can help you - no prescription necessary.

126
126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

U.S. Treasury Sanctions Chinese Cybersecurity Firm

SecureWorld News

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has taken decisive action against Integrity Technology Group, Incorporated (Integrity Tech), a Beijing-based cybersecurity company, for its alleged involvement in malicious cyber activities targeting U.S. critical infrastructure. Announced on January 3, 2025, this move represents a significant escalation in the U.S. government's efforts to combat state-sponsored cyber threats.

article thumbnail

The one feature Bluesky really needs

Zero Day

You just followed a fascinating new account on Bluesky. But does that account really belong to who you think it does?

article thumbnail

2025 SecureWorld Theme: Once Upon a Time in Cybersecurity

SecureWorld News

Cybersecurity in today's world is akin to the enchanted realms of fairy tales, where threats lurk in dark digital forests and heroes wield keyboards instead of swords. Just as these cautionary fables have guided generations, modern stories now light our path through the complex security landscape. Welcome to SecureWorld's theme for 2025: Once Upon a Time in Cybersecurity.

article thumbnail

The best robotics and AI tech of CES 2025

Zero Day

AI was featured in nearly every consumer tech category at CES. Here's what stood out.

109
109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies. The agency said it's working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts.

article thumbnail

Need more storage or Thunderbolt 5 ports? OWC delivers new gear for video pros

Zero Day

Premium hardware maker OWC unveils a new RAID storage unit and Thunderbolt 5 hub.

108
108
article thumbnail

Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers

The Hacker News

Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices.

article thumbnail

Two affordable OTC glucose monitors were just unveiled at CES - and you can try them now

Zero Day

These over-the-counter GCMs from health brands Dexcom and Abbot make glucose monitoring affordable and accessible. Here's how they can help you - no prescription necessary.

105
105
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Brokers Key to Strengthening American Businesses’ Cyber Defenses

Security Boulevard

American businesses are increasingly turning to their brokers for more than financial protection, and also seek guidance, expertise and support to strengthen their cyber defenses. The post Brokers Key to Strengthening American Businesses’ Cyber Defenses appeared first on Security Boulevard.

article thumbnail

Meta ditches fact checking for community notes - just like on X

Zero Day

Meta CEO Mark Zuckerberg cited the recent elections as a 'cultural tipping point' for restoring free speech.

102
102
article thumbnail

New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities

The Hacker News

Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework. The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution.

article thumbnail

Need a 10-port USB-C charger? Plugable has just the thing

Zero Day

If you could use a 10-port charger or 5-display docking station, Plugable has some CES 2025 reveals you should check out.

102
102
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CVE-2024-50603 (CVSS 10): Critical Command Injection Vulnerability in Aviatrix Controller

Penetration Testing

Jakub Korepta, Principal Security Consultant and Head of Infrastructure Security at Securing, has released a detailed report uncovering The post CVE-2024-50603 (CVSS 10): Critical Command Injection Vulnerability in Aviatrix Controller appeared first on Cybersecurity News.

article thumbnail

This Anker power bank has a built-in display, retractable cable, and is TSA-certified

Zero Day

The company's latest 165W Fast Charging Power Bank and 140W Charger are available for purchase now.

Banking 102
article thumbnail

Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year

The Hacker News

It's time once again to pay our respects to the once-famous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing threats.

article thumbnail

CES 2025: These 9 best mobile accessories have impressed us the most

Zero Day

ZDNET is live from Las Vegas, covering the best and most innovative mobile accessories at CES 2025. Here are our top picks so far.

Mobile 101
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Exabeam Extends Scope and Reach of SIEM Platform

Security Boulevard

Exabeam today added a bevy of capabilities to its New-Scale Security Operations Platform, including support for open application programming interface (API) and an ability to search data stored in the LogRhythm security information event management (SIEM) platform it acquired last year. The post Exabeam Extends Scope and Reach of SIEM Platform appeared first on Security Boulevard.

article thumbnail

In a machine-led economy, relational intelligence is key to success

Zero Day

AI agents will change work forever. To embrace that chance, business leaders must focus on what matters most - designing and cultivating healthy and sustainable relationships.

100
100
article thumbnail

CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three flaws impacting Mitel MiCollab and Oracle WebLogic Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows - CVE-2024-41713 (CVSS score: 9.

article thumbnail

This Asus laptop is the MacBook alternative I recommend to most people (for now)

Zero Day

Asus' ROG Zephyrus G14 resembles a MacBook, but the OLED display and hardware make for a well-rounded machine that performs better.

97
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.