Thu.Nov 21, 2024

article thumbnail

Secret Service Tracking People’s Locations without Warrant

Schneier on Security

This feels important : The Secret Service has used a technology called Locate X which uses location data harvested from ordinary apps installed on phones. Because users agreed to an opaque terms of service page, the Secret Service believes it doesn’t need a warrant.

article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass , MailChimp , Okta , T-Mobile and Twilio. A visual depiction of the attacks by the SMS phishing group known as Scattered Spider, and Oktapus.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Here’s Yet Another D-Link RCE That Won’t be Fixed

Security Boulevard

D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear. The post Here’s Yet Another D-Link RCE That Won’t be Fixed appeared first on Security Boulevard.

Internet 120
article thumbnail

Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office

Security Affairs

Mexico is investigating a ransomware attack targeting its legal affairs office, as confirmed by the president amidst growing cybersecurity concerns. Mexico’s president announced the government is investigating an alleged ransomware hack that targeted the administration’s legal affairs office. “Today they are going to send me a report on the supposed hacking.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Crucial Influence of Human Factors in Security Breaches

Security Boulevard

The hard truth is that security breaches often happen because of human mistakes from simple, everyday actions. It's not just employees unknowingly using unsecured Wi-Fi – it's phishing, weak passwords and a lack of awareness that open the door to attackers. The post The Crucial Influence of Human Factors in Security Breaches appeared first on Security Boulevard.

Phishing 114
article thumbnail

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

The Hacker News

Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer.

More Trending

article thumbnail

Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online

The Hacker News

New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting for over one-third of the total exposures. The analysis, which comes from attack surface management company Censys, found that 38% of the devices are located in North America, 35.4% in Europe, 22.9% in Asia, 1.7% in Oceania, 1.

Internet 111
article thumbnail

More than 2,000 Palo Alto Networks firewalls hacked exploiting recently patched zero-days

Security Affairs

Threat actors already hacked thousands of Palo Alto Networks firewalls exploiting recently patched zero-day vulnerabilities. Thousands of Palo Alto Networks firewalls have reportedly been compromised in attacks exploiting recently patched zero-day vulnerabilities ( CVE-2024-0012 and CVE-2024-9474 ) in PAN-OS. CVE-2024-0012 is a vulnerability in Palo Alto Networks PAN-OS that allows unauthenticated attackers with network access to the management web interface to bypass authentication and gain adm

Firewall 109
article thumbnail

China’s Surveillance State Is Selling Citizen Data as a Side Hustle

WIRED Threat Level

Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it online—no questions asked.

article thumbnail

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

The Hacker News

As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S.

Hacking 106
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apple Patches Two Zero-Day Attack Vectors

Tech Republic Security

Threat actors exploited two vulnerabilities in Intel-based machines. Google’s Threat Analysis Group discovered the flaws.

110
110
article thumbnail

Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor

The Hacker News

The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia. That's according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in March 2023.

article thumbnail

CVE-2024-52940: AnyDesk Vulnerability Exposes User IP Addresses, PoC Published

Penetration Testing

A newly discovered vulnerability in popular remote desktop software AnyDesk could allow attackers to uncover users’ IP addresses, posing significant privacy risks. Security researcher Ebrahim Shafiei identified the flaw (CVE-2024-52940)... The post CVE-2024-52940: AnyDesk Vulnerability Exposes User IP Addresses, PoC Published appeared first on Cybersecurity News.

article thumbnail

5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme

The Hacker News

Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for targeting employees of companies across the country using social engineering techniques to harvest credentials and using them to gain unauthorized access to sensitive data and break into crypto accounts to steal digital assets worth millions of dollars.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Red Hat Enterprise Linux Lands on Windows Subsystem for Linux

Penetration Testing

Red Hat and Microsoft join forces to bring the leading enterprise Linux distribution to Windows developers. In a move that promises to streamline hybrid cloud development and enhance developer flexibility,... The post Red Hat Enterprise Linux Lands on Windows Subsystem for Linux appeared first on Cybersecurity News.

article thumbnail

I tried replacing Twitter with Bluesky, Threads, and Mastodon: Here's what I found

Zero Day

More and more ex-Twitter/X users are seeking new online homes. I kicked the tires on these three nascent services. Here's what you need to know about them.

106
106
article thumbnail

10 Most Impactful PAM Use Cases for Enhancing Organizational Security

The Hacker News

Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain tighter control over privileged access, achieve regulatory compliance, and reduce the burden on your IT team. As an established provider of a PAM solution, we’ve witnessed firsthand how PAM transforms organizational security.

Risk 86
article thumbnail

ChatGPT Search could destroy online businesses - how you can stay ahead

Zero Day

OpenAI's ChatGPT Search could be the beginning of the end for anyone who relies on Search ads and SEO. Here are three strategies to protect your business before it's too late.

128
128
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cyber Story Time: The Boy Who Cried "Secure!"

The Hacker News

As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated Security Validation (ASV) tools?” We’ve covered that pretty extensively in the past, so today, instead of covering the “What is ASV?” I wanted to address the “Why ASV?” question.

86
article thumbnail

Get these premium Sony Bravia home theater speakers for $500 off during Black Friday

Zero Day

This premium Sony speaker system offers easy placement and exclusive features. It's on sale for $500 of its list price during the holiday season.

100
100
article thumbnail

Threat actor sells data of over 750,000 patients from a French hospital

Security Affairs

A threat actor had access to electronic patient record system of an unnamed French hospital, and the health data of 750,000 patients was compromised. An unnamed French hospital suffered a data breach that impacted more than 758,000 patients, a threat actor had access to the electronic patient record system of the organization. The threat actor claims that exposed records include name, first name, date of birth, gender, address, city, postal code, phone number(s), and email.

article thumbnail

The $23 Echo Dot deal is a great deal to upgrade your smart home this Black Friday

Zero Day

Looking for a way to add a hands-free virtual assistant to your life? You can buy the latest Echo Dot for only $23 through Black Friday.

99
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Genetic Algorithms: Using Natural Selection to Block Bot Traffic

Security Boulevard

Learn how DataDome uses genetic algorithms, an AI technique inspired by natural selection, to create rules for blocking bot traffic. The post Genetic Algorithms: Using Natural Selection to Block Bot Traffic appeared first on Security Boulevard.

71
article thumbnail

Roku vs Fire Stick: Which one is best for your streaming needs in 2024?

Zero Day

The Roku Streaming Stick and the Amazon Fire TV Stick are two of the best devices for streaming. Here are the key reasons to buy one over the other.

91
article thumbnail

Video: Meet Our Cybersecurity Expert, Davin Jackson

eSecurity Planet

Davin Jackson has joined the eSecurity Planet team as our cybersecurity expert and media personality, bringing with him nearly 20 years of experience in tech and cybersecurity. He has helped organizations of various sizes to improve their security against cyber threats. His licenses and certifications include GIAC Web Application Penetration Tester, GIAC Certified Penetration Tester (GPEN), Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker, among others.

article thumbnail

Jim Zemlin, 'head janitor of open source,' marks 20 years at Linux Foundation

Zero Day

In a world where modest leadership is often an oxymoron, Jim Zemlin's two-decade tenure as executive director remains helpful, hopeful, and humble.

95
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

NVIDIA Base Command Manager Update Patches CVE-2024-0138 (CVSS 9.8)

Penetration Testing

NVIDIA has issued a critical security update for its Base Command Manager software, addressing a vulnerability that could open systems to a range of serious attacks. The flaw, tracked as... The post NVIDIA Base Command Manager Update Patches CVE-2024-0138 (CVSS 9.8) appeared first on Cybersecurity News.

article thumbnail

I replaced my desktop with this MSI laptop for a week, and it surpassed my expectations

Zero Day

The MSI Stealth A16 AI Plus delivers a powerful (and flexible) performance that isn't burdened by a low battery life.

101
101
article thumbnail

MisakaNetwork: Blockchain Botnet Threatens npm Ecosystem

Penetration Testing

A recent analysis by security researcher Kirill Boychenko at Socket has unveiled a sophisticated npm malware campaign that blends traditional supply chain attack techniques with modern blockchain technology. The campaign,... The post MisakaNetwork: Blockchain Botnet Threatens npm Ecosystem appeared first on Cybersecurity News.

Malware 69
article thumbnail

My favorite bone-conduction headphones are comfortable, durable, and $55 off for Black Friday

Zero Day

If having earbuds stuck into your ear canals doesn't appeal to you, Shokz OpenRun Pro open-ear headphones might be what you need.

94
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.