Thu.Jan 09, 2025

article thumbnail

Massive breach at location data seller: “Millions” of users affected

Malwarebytes

Like many other data brokers, Gravy is a company you may never have heard of, but it almost certainly knows a lot about you if youre a US citizen. Data brokers come in different shapes and sizes. What they have in common is that they gather personally identifiable data from various sourcesfrom publicly available data to stolen datasetsand then sell the gathered data on.

Media 130
article thumbnail

From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions 

Security Boulevard

What to expect in 2025 and beyond, into the future. Here are some likely predictions across cybersecurity, GenAI and innovation, and defensive cyber. The post From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Chrome AI extensions deliver info-stealing malware in broad attack

Malwarebytes

Small businesses and boutique organizations should use caution when leaning on browser-friendly artificial intelligence (AI) tools to generate ideas, content, and marketing copy, as a set of Google Chrome extensions were recently compromised to deliver info-stealing malware disguised as legitimate updates. Analyzed by researchers at Extension Total, the cybercriminal campaign has managed to take over the accounts of at least 36 Google Chrome extensions that provide AI and VPN services.

Malware 125
article thumbnail

Cybersecurity Resolutions for 2025

IT Security Guru

As we begin the New Year, it offers a chance for reflection on 2024 and to consider what we can do as security professionals and business leaders in 2025 that will keep us relevant and in the best position to counter cyber threats going forward. The IT Security Guru caught up with Darren Guccione, CEO and co-founder of Keeper Security to see what he thinks should be the industry’s resolutions in the coming year.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

3 Percent ($30B) of U.S. Military Funding Dedicated to Cybersecurity

SecureWorld News

The National Defense Authorization Act (NDAA) for the U.S. military fiscal year 2025 dedicates approximately $30 billion to cybersecurity , marking it as a crucial focus in the broader $895.2 billion military budget. "As usual, this year's NDAA is a sweeping piece of legislation that touches all corners of the Department of Defense (DoD) as well as elements of the intelligence community," said Col.

article thumbnail

Zero-Day Vulnerability in Ivanti VPN

Schneier on Security

It’s being actively exploited.

VPN 270

LifeWorks

More Trending

article thumbnail

SOC Scalability: How AI Supports Growth Without Overloading Analysts

Security Affairs

Scaling up a security operations center (SOC) is inevitable for many organizations. How AI supports growth without overloading analysts. Scaling up a security operations center (SOC) is inevitable for many organizations. Although it might sting, keeping pace with business growth, increased threat volume and complexity, or compliance and regulatory demands requires enhancing and expanding SOC capabilities.

article thumbnail

Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency

Security Boulevard

While AI/ML and automation promise to help streamline and reduce security operation costs, these efforts could be significantly boosted by the increased availability of standard interfaces The post Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency appeared first on Security Boulevard.

article thumbnail

Ukrainian Cyber Alliance destroyed the connectivity of Russian ISP Nodex

Security Affairs

A group of hacktivists, known as the Ukrainian Cyber Alliance, breached Russian ISP Nodex, stole sensitive documents, and wiped systems. Ukrainian Cyber Alliance hacked Russian ISP Nodex, stole sensitive data, and wiped systems, highlighting their cyberattack capabilities. The Ukrainian Cyber Alliance has been active since 2016, the Pro-Ukraine group has targeted Russian entities since the invasion of Ukraine.

Backups 72
article thumbnail

What’s Next for Open Source Software Security in 2025?

Tech Republic Security

Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open-source software in 2025.

Software 184
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

U.S. Medical billing provider Medusind suffered a sata breach

Security Affairs

Medusind, a medical billing provider, disclosed a data breach that occurred in December 2023 and affected over 360,000 individuals. Medusind is a company that provides medical billing, coding, and revenue cycle management (RCM) services to healthcare organizations, including medical practices, dental practices, and other providers. The company disclosed a data breach discovered on December 29, 2023, that impacted 360,934 individuals.

article thumbnail

Building Resilience Into Cyber-Physical Systems Has Never Been This Mission-Critical  

Security Boulevard

Our nations critical infrastructure is increasingly brittle and under attack. Take the recent report that the drinking water of millions of Americans is at risk due to technical vulnerabilities. The post Building Resilience Into Cyber-Physical Systems Has Never Been This Mission-Critical appeared first on Security Boulevard.

Risk 64
article thumbnail

10 Linux apps I always install first - and you should too

Zero Day

If you're just now jumping onto the Linux train, you might be wondering what apps to install first. Here are the first 10 I find should be installed by all.

145
145
article thumbnail

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption

The Hacker News

Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple's XProtect," Check Point Research said in a new analysis shared with The Hacker News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How Cracks and Installers Bring Malware to Your Device

Trend Micro

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Malware 125
article thumbnail

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan

The Hacker News

Japan's National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019.

article thumbnail

I rescued my dying 2017 MacBook Pro with Ubuntu and it works like a charm (mostly)

Zero Day

If you have an older MacOS device lying around, why not install Linux to give it a new life?

122
122
article thumbnail

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection

The Hacker News

Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE).

Firewall 119
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

We have named the 12 winners for the official Best of CES 2025 awards

Zero Day

Our experts sifted through thousands of CES exhibitors to find the best tech. ZDNET, CNET, PCMag, Mashable, and Lifehacker combined to select the winners.

122
122
article thumbnail

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location

WIRED Threat Level

A hack of location data company Gravy Analytics has revealed which apps areknowingly or notbeing used to collect your information behind the scenes.

Hacking 113
article thumbnail

The Best of CES 2025 awards are in, as selected by ZDNET and the rest of CNET Group

Zero Day

Our experts sifted through the thousands of CES exhibitors to find the best tech.

122
122
article thumbnail

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

The Hacker News

Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Linux Foundation launches an initiative to support open-source Chromium-based browsers

Zero Day

Google's Chromium source code will be used as the basis for new open-source web browsers.

111
111
article thumbnail

Security Implications of Configuration Drift 

Security Boulevard

Addressing configuration drift - a seemingly minor issue - is essential to maintaining a secure and resilient IT environment. The post Security Implications of Configuration Drift appeared first on Security Boulevard.

article thumbnail

The best robot vacuum of CES 2025 - and 4 others that impressed us

Zero Day

Robot vacuums are getting some outstanding upgrades this year, and ZDNET has picked the best ones of them all.

111
111
article thumbnail

Digital Wallets: From Consumer Convenience to Corporate Security

Security Boulevard

From storing state IDs, driver's licenses and passports to managing payment information, digital wallets have revolutionized the way we handle personal credentials. The post Digital Wallets: From Consumer Convenience to Corporate Security appeared first on Security Boulevard.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

These headphones may look they play music but they actually clean your ears - and you can watch them do it

Zero Day

The Bebird EarSight Flow gently shoots water into your ears to clean them and has a special camera that allows you to watch the process in real time from the app.

105
105
article thumbnail

Product Review: How Reco Discovers Shadow AI in SaaS

The Hacker News

As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI. Shadow AI refers to the unauthorized use of AI tools and copilots at organizations.

103
103
article thumbnail

Finally! A robot vacuum that can climb stairs (well, kind of)

Zero Day

At CES 2025, Dreame introduced its premium X50 Ultra, which aspires to go where no robot vac has gone before.

105
105
article thumbnail

Chinese-linked Hackers May Be Exploiting Latest Ivanti Vulnerability

Security Boulevard

Software maker Ivanti, which for more than a year has been plagued by security flaws in its appliance, unveiled two new ones this week, with Mandiant researchers saying that one likely is being activity exploited by China-linked threat groups. The post Chinese-linked Hackers May Be Exploiting Latest Ivanti Vulnerability appeared first on Security Boulevard.

Software 101
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!