Wed.Apr 02, 2025

article thumbnail

Rational Astrologies and Security

Schneier on Security

John Kelsey and I wrote a short paper for the Rossfest Festschrift : “ Rational Astrologies and Security “: There is another non-security way that designers can spend their security budget: on making their own lives easier. Many of these fall into the category of what has been called rational astrology. First identified by Randy Steve Waldman [Wal12], the term refers to something people treat as though it works, generally for social or institutional reasons, even when theres little e

article thumbnail

Appsec Roundup - March 2025

Adam Shostack

Big news for LLMs in threat modeling! Threat Modeling Matthew Adams introduced TM-Bench The World's First LLM Threat Modeling Benchmark. Im glad to see this, testing and evaluation is important. Tony Lee has released DeepTM , a tool for chaining threat models. (Tony was nice enough to help me find the core code for the agents.) As a general comment on these systems, LLMs are tremendously reactive to very small wording changes.

147
147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Leaks 270,000 Samsung Customer Records—Stolen Credentials Were Left Unchecked for Years

eSecurity Planet

In a troubling security breach, a hacker exposed the personal data of over 270,000 Samsung customers in Germany, freely dumping it on the internet. The hack, attributed to a cybercriminal operating under the alias GHNA, occurred when the attacker accessed a system used by Samsungs German customer service. According to cybersecurity firm Hudson Rock, the hack was made possible by a set of stolen credentials compromised in 2021.

article thumbnail

New advanced FIN7’s Anubis backdoor allows to gain full system control on Windows

Security Affairs

FIN7 cybercrime group has been linked to Anubis, a Python-based backdoor that provides remote access to compromised Windows systems. The threat actor FIN7 , also known as Savage Ladybug, has developed a new Python-based malware, named Anubis Backdoor, which allows attackers to gain full remote control over infected Windows systems. It executes shell commands and system operations while using obfuscation to evade detection.

Antivirus 128
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

3 Ways the UK Government Plans to Tighten Cyber Security Rules with New Bill

Tech Republic Security

Amid a sharp spike in ransomware attacks disrupting essential services and critical infrastructure, the U.K. government has set out the scope of its upcoming Cyber Security and Resilience Bill for the first time. It aims to patch the holes in the countrys existing cyber regulations and protect critical infrastructure from ransomware and other attack types.

article thumbnail

U.S. CISA adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Apache Tomcat path equivalence vulnerability, tracked as CVE-2025-24813 , to its Known Exploited Vulnerabilities (KEV) catalog. The Apache Tomcat vulnerability CVE-2025-24813 was recently disclosed and is being actively exploited just 30 hours after a public PoC was released.

Firewall 109

LifeWorks

More Trending

article thumbnail

Spike in Palo Alto Networks scanner activity suggests imminent cyber threats

Security Affairs

Hackers are scanning for vulnerabilities in Palo Alto Networks GlobalProtect portals, likely preparing for targeted attacks. Researchers at the threat intelligence firm GreyNoise warn of hackers that are scanning for vulnerabilities in Palo Alto Networks GlobalProtect portals, likely preparing for targeted attacks, warns threat intelligence firm GreyNoise.

article thumbnail

Top 10 Patch My PC Alternatives for Automated Patching

Heimadal Security

Keeping Windows applications up to date is a challenge, and Patch My PC seems to be a favorite for automating the process. Some of its users praise the solutions lightweight agent and strong third-party app support. However, this tool also has its downsides: a reviewer on G2 says that only one user can be in […] The post Top 10 Patch My PC Alternatives for Automated Patching appeared first on Heimdal Security Blog.

86
article thumbnail

New Triada Trojan comes preinstalled on Android devices

Security Affairs

A new Triada trojan variant comes preinstalled on Android devices, stealing data on setup, warn researchers from Kaspersky. Kaspersky researchers discovered a new Triada trojan variant preinstalled on thousands of Android devices, enabling data theft upon setup. Kaspersky detected 2,600+ infections in Russia from March 13-27, 2025. The malware was discovered on counterfeit Android devices mimicking popular smartphone models.

Malware 84
article thumbnail

“Nudify” deepfakes stored unprotected online

Malwarebytes

Yesterday, we told you about how millions of pictures from specialized dating apps had been stored online without any kind of password protection. Now it’s the turn of an AI “nudify” service. A researcher, famous for finding unprotected cloud storage buckets, has uncovered an unprotected AWS bucket belonging to the nudify service. The rising popularity of these nudify services apparently has caused a selection of companies without any security awareness to hop on the money trai

Media 87
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Legal Zero-Days: How Old Laws Became a Novel Loss Generator

SecureWorld News

The latest wave of privacy litigation doesn't involve data breaches, AI models, or spyware. It involves tracking pixelsand legal theories pulled from a time when Blockbuster Video was still a thing. Companies across industries are being sued for using widely available web technologies: session replay tools, analytics platforms, and advertising trackers.

article thumbnail

Apple backported fixes for three actively exploited flaws to older devices

Security Affairs

Apple backports three critical vulnerabilities actively exploited in attacks against older iOS and macOS models. Apple has backported fixes for three actively exploited vulnerabilities to older devices and OS versions. The three vulnerabilities are: CVE-2025-24085 (CVSS score: 7.3) – In January, Apple released security updates to address 2025s first zero-day vulnerability, tracked as CVE-2025-24085 , actively exploited in attacks targeting iPhone users.

Media 61
article thumbnail

Top 8 Sophos Intercept X Alternatives for Ransomware Encryption Protection

Heimadal Security

Sophos Intercept X is one of the top choices for ransomware protection. However, some users report that it is resource-intensive and also asked for more flexibility. Sophos Intercept X is deeply integrated into the Sophos EDR platform. So, using it often requires a full commitment to the Sophos ecosystem. In some cases, that might mean […] The post Top 8 Sophos Intercept X Alternatives for Ransomware Encryption Protection appeared first on Heimdal Security Blog.

article thumbnail

KeePass Review (2025): Features, Pricing, and Security

Tech Republic Security

KeePass customizability is ideal for tech savvy users, but its lack of features and complicated user experience prevent it from being the best choice among competitors.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to Prevent Kerberoasting Attacks?

Security Boulevard

Kerberoasting attack targets the Active Directory environment to enable attackers to extract and crack service account credentials. Threat actors can gain elevated privileges by exploiting weak password policies and misconfiguration, which further results in lateral movement and deeper network compromise. In this article, we will learn about the harm that Kerberoasting causes, also its impact [] The post How to Prevent Kerberoasting Attacks?

article thumbnail

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

The Hacker News

In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual abuse material (CSAM). "A total of 1.8 million users worldwide logged on to the platform between April 2022 and March 2025," Europol said in a statement.

127
127
article thumbnail

What is subdomain hijacking?

Security Boulevard

Subdomain hijacking is a cybersecurity risk where attackers exploit abandoned DNS records to take control of legitimate subdomains. This can lead to phishing attacks, credential theft, and malware distribution. Organizations must regularly audit DNS records, remove outdated entries, and strengthen cloud security policies to prevent these vulnerabilities.

DNS 52
article thumbnail

Beyond vulnerability-based attacks: Identity-based attack path management (APM)

NopSec

As many as you know, I have been involved in penetration testing since the beginning of my career. It is my passion that drove my entire career. The very design of NopSec Threat Exposure Management Platform was an attempt to provide a way for organizations to track attack surface and dangerous security vulnerabilities beyond the time scope of the annual compliance-driven penetration test.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Exploited: Critical Unauthenticated Access Vulnerability in CrushFTP (CVE-2025-2825)

Security Boulevard

In the ever-evolving landscape of web application vulnerabilities, a new critical flaw has emerged. CVE-2025-2825 is a high-severity vulnerability that allows attackers to bypass authentication on CrushFTP servers. This popular enterprise file transfer solution is often used in corporate environments to manage sensitive data, making this vulnerability particularly concerning.

article thumbnail

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

The Hacker News

Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrency mining botnet called Outlaw (aka Dota) that's known for targeting SSH servers with weak credentials.

Malware 119
article thumbnail

Passkeys vs. Passwords: A Detailed Comparison

Security Boulevard

Explore the evolving landscape of digital security as we delve into the distinctions between passkeys and passwords. Understand their unique features, advantages, and potential drawbacks to determine the optimal choice for safeguarding your online presence. The post Passkeys vs. Passwords: A Detailed Comparison appeared first on Security Boulevard.

article thumbnail

New to Linux? 4 things to focus on before you switch

Zero Day

It's important to narrow your focus when choosing your first distribution. Here's how to do that.

114
114
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Evolution and Growth: The History of Penetration Testing

Security Boulevard

The history of penetration testing begins with military strategies used to test enemy defenses. Over time, this evolved into a formal practice for identifying vulnerabilities in computer systems. This article traces the brief history of of penetration testing, from its early conceptual roots in military exercises, through the rise of Tiger Teams in the 1970s, [] The post Evolution and Growth: The History of Penetration Testing appeared first on Security Boulevard.

article thumbnail

Clicked on a phishing link? Take these 7 steps ASAP to protect yourself

Zero Day

Phishing scams are becoming brutally effective, and even technically sophisticated people can be fooled. Here's how to limit the damage immediately and what to do next.

Phishing 111
article thumbnail

Unhealthy Cybersecurity Postures

Security Boulevard

Updates from Enzoics Threat Research Team In the last Enzoic research update, we briefly discussed the travails of the healthcare industry and their challenges in establishing a successful cybersecurity posture in the face of a salivating cadre of identity thieves and ransomware operators. In the intervening few weeks, more analyses have been published, including the [] The post Unhealthy Cybersecurity Postures appeared first on Security Boulevard.

article thumbnail

High-Severity Vulnerabilities in Bruno API Client Expose Users to Potential RCE

Penetration Testing

A security advisory from the Bruno project has revealed critical vulnerabilities in the Bruno API client, highlighting the The post High-Severity Vulnerabilities in Bruno API Client Expose Users to Potential RCE appeared first on Daily CyberSecurity.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

CVEs lose relevance: Get proactive — and think beyond vulnerabilities

Security Boulevard

Application security (AppSec) would not have existed for the past 25 years without the Common Vulnerabilities and Exposures (CVEs), the numbering system used for identifying discovered vulnerabilities in software. After the creation and adoption of the system in 1999, major companies such as Microsoft quickly began contributing CVE discoveries, using the Common Vulnerability Scoring System (CVSS) to convey the severity of a flaw.

article thumbnail

Verizon Call Filter App Vulnerability Exposed Call Records of Millions

Penetration Testing

A security vulnerability in the Verizon Call Filter iOS app allowed attackers to potentially leak the call history The post Verizon Call Filter App Vulnerability Exposed Call Records of Millions appeared first on Daily CyberSecurity.

article thumbnail

Modern SecOPs TCO Analysis: The Economic Case for Unified Security Platforms

Security Boulevard

In todays rapidly evolving threat landscape, organizations face mounting challenges with traditional, fragmented security approaches. This analysis examines the total cost of ownership (TCO) of conventional security infrastructures compared to modern unified platforms, revealing significant operational and financial advantages of consolidated solutions.

article thumbnail

Adobe brings four highly-requested Premiere Pro AI features out of beta

Zero Day

Now generally available, the AI tools include Generative Extend, Media Intelligence, Auto-Translate caption, and more. Here's what they can do.

Media 106
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!