Sun.Dec 29, 2024

article thumbnail

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

The Hacker News

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft.

Hacking 140
article thumbnail

Volkswagen’s Cariad Exposes Location Data of 800,000 Electric Vehicles

Penetration Testing

A “misconfiguration” in Volkswagen’s automotive software subsidiary, Cariad, has led to a significant data breach, exposing the location data of approximately 800,000 electric vehicles across its brands, including VW, Audi,... The post Volkswagen’s Cariad Exposes Location Data of 800,000 Electric Vehicles appeared first on Cybersecurity News.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ZAGG disclosed a data breach that exposed its customers’ credit card data

Security Affairs

ZAGG Inc. notifies customers of credit card data breach, after threat actors hacked a third-party app from its e-commerce provider. ZAGG Inc. disclosed a data breach that exposed its customers’ credit card data after threat actors hacked a third-party application from its e-commerce providerBigCommerce. The company has not disclosed the number of impacted customers were impacted by this security breach.

article thumbnail

Linux Kernel Vulnerability CVE-2023-4147: PoC Exploit Published for Privilege Escalation Flaw

Penetration Testing

Security researchers published the technical details and a proof-of-concept (PoC) exploit for a CVE-2023-4147 flaw in the Linux Kernel, potentially allowing attackers to escalate privileges and compromise system security. This... The post Linux Kernel Vulnerability CVE-2023-4147: PoC Exploit Published for Privilege Escalation Flaw appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Meta's latest update is a devastating blow to advertisers - what you need to know

Zero Day

American small businesses could struggle as Meta's latest update changes the advertising landscape. Here's how to pivot your efforts to thrive instead.

article thumbnail

CVE-2024-45387: PoC Published for Critical SQL Injection in Apache Traffic Control

Penetration Testing

Security researcher Abdelrhman Zayed, in collaboration with Mohamed Abdelhady, has published proof-of-concept (PoC) exploit code for CVE-2024-45387, a critical SQL injection vulnerability in Apache Traffic Control. The flawcarries a near-maximum... The post CVE-2024-45387: PoC Published for Critical SQL Injection in Apache Traffic Control appeared first on Cybersecurity News.

More Trending

article thumbnail

Cyber Attack on Japan Airlines Causes Global Disruptions

ZoneAlarm

Japan Airlines (JAL), a leading name in global aviation, recently fell victim to a significant cyber attack. This breach disrupted flight operations, delaying passengers and raising concerns about cyber security vulnerabilities in the aviation sector. Japan Airlines is among the most prominent carriers in Asia, known for its extensive global network and technological sophistication.

article thumbnail

CVE-2024-56512: Apache NiFi Vulnerability Exposes Sensitive Data to Unauthorized Users

Penetration Testing

A newly discovered vulnerability in Apache NiFi, a widely used data processing and distribution system, could allow unauthorized access to sensitive information. The vulnerability, tracked as CVE-2024-56512, affects all versions... The post CVE-2024-56512: Apache NiFi Vulnerability Exposes Sensitive Data to Unauthorized Users appeared first on Cybersecurity News.

article thumbnail

LG's upcoming bendable 5K2K monitor sets the record straight for gamers and professionals

Zero Day

The latest LG gaming monitors are here, and the company's newest bendable model is a world's first.

79
article thumbnail

Postman Security Lapse: 30,000 Workspaces Leak API Keys & More

Penetration Testing

A recent report by CloudSEK’s TRIAD Team, has shed light on alarming security vulnerabilities within Postman, a popular platform for API development and testing. The investigation revealed over 30,000 publicly... The post Postman Security Lapse: 30,000 Workspaces Leak API Keys & More appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

I replaced my iPhone 16 Pro Max with this pocket camera for video shooting - and can't go back

Zero Day

The DJI Osmo Pocket 3 has become a mainstay in my work and travel essentials - and I don't expect that to change soon.

78
article thumbnail

CVE-2024-55950: Tabby Terminal Emulator Vulnerability Exposes macOS Users to Privacy and Security Risks

Penetration Testing

A high-severity vulnerability, CVE-2024-55950 (CVSS 8.6), has been identified in Tabby (formerly Terminus), a widely used terminal emulator and SSH client for Windows, macOS, and Linux. With nearly 61,000 GitHub... The post CVE-2024-55950: Tabby Terminal Emulator Vulnerability Exposes macOS Users to Privacy and Security Risks appeared first on Cybersecurity News.

Risk 58
article thumbnail

I invested in a subscription-less video doorbell, and it's paying off for my smart home

Zero Day

The Eufy Security E340 dual-camera video doorbell can help protect deliveries from porch pirates with no monthly fees required.

72
article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 26

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Now You See Me, Now You Dont: Using LLMs to Obfuscate Malicious JavaScript Analyzing Malicious Intent in Python Code: A Case Study DigiEver Fix That IoT Thing! Botnets Continue to Target Aging D-Link Vulnerabilities OtterCookie, a new malware used by Contagious Interview Lazarus group evolves its infection chain with old and new malware BellaCPP: Discovering a

Malware 63
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Linux Systems at Risk: GStreamer Vulnerabilities Threaten Millions

Penetration Testing

A recent report by Antonio Morales from the GitHub Security Lab has unveiled 29 vulnerabilities in GStreamer, an open-source multimedia framework widely used in Linux distributions such as Ubuntu, Fedora,... The post Linux Systems at Risk: GStreamer Vulnerabilities Threaten Millions appeared first on Cybersecurity News.

Risk 63
article thumbnail

These wireless earbuds are the reason why I've ditched Bose and Apple - and they're on sale

Zero Day

The Denon PerL earbuds retain the same ultra-high-quality sound as their Pro sibling but are almost half the price. This new discount takes another half off of that.

article thumbnail

The Dark Side of Virtual Offices: How Criminals Exploit Flexibility

Penetration Testing

Security researcher Lewis Henderson from Team Cymru unveils the shadowy underbelly of virtual office services. Praised for their ability to offer cost-effective flexibility to businesses, these services have become an... The post The Dark Side of Virtual Offices: How Criminals Exploit Flexibility appeared first on Cybersecurity News.

article thumbnail

Security Affairs newsletter Round 504 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Pro-Russia group NoName targeted the websites of Italian airports North Korea actors use OtterCookie malware in Contagious Interview campaign Experts warn of a surge in activity associated FICORA and Kaiten botnets Palo Alto Networks fixed a high-severity

Spyware 59
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Four-Faith Industrial Routers Under Attack: CVE-2024-12856 Exploited in the Wild

Penetration Testing

VulnCheck, a renowned cybersecurity research organization, has recently issued a warning concerning active exploitation of a critical vulnerability affecting Four-Faith industrial routers. The vulnerability, identified as CVE-2024-12856 (CVSS 7.2), allows... The post Four-Faith Industrial Routers Under Attack: CVE-2024-12856 Exploited in the Wild appeared first on Cybersecurity News.

article thumbnail

ReliaQuest to Bring Cyber Lab Bootcamp to ReliaQuest Bowl Universities

Digital Shadows

On New Years Eve, the universities of Michigan and Alabama will face off in the third annual ReliaQuest Bowl in Tampa Bay. ReliaQuest continues to use this high-profile event to raise awareness of the importance of cybersecurity, as well as career opportunities within the cybersecurity industry. This year, ReliaQuest will take that commitment a step further, offering real-world cybersecurity training to the college campuses of the participating universities from this year and previous years Reli

article thumbnail

Global Cyber Collaboration Takes Down PlugX Worm

Penetration Testing

In an unprecedented effort to combat malware, the Sekoia Threat Detection & Research team spearheaded a campaign to disinfect thousands of systems infected with the PlugX worm. This malware, linked... The post Global Cyber Collaboration Takes Down PlugX Worm appeared first on Cybersecurity News.

article thumbnail

Empowering Security: Mastering Least Privilege

Security Boulevard

Why is Mastering Least Privilege Essential? The least privilege principle remains a cornerstone for securing machine identities and their secrets. However, many organizations still grapple with the practicalities of implementing and maintaining this vital strategy. The consequences of failing to master least privilege can be dire, leading to unauthorized access, data breaches, and cybersecurity incidents. [] The post Empowering Security: Mastering Least Privilege appeared first on Entro.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

OpenAI Restructures for Profit to Fuel AGI Development

Penetration Testing

After unveiling a multitude of features, OpenAI recently announced plans to undergo a restructuring in 2025, establishing a profit-oriented company to secure essential funding. This move aims to accelerate the... The post OpenAI Restructures for Profit to Fuel AGI Development appeared first on Cybersecurity News.

article thumbnail

What is Nassef from Darkode Up To? – Part Two

Security Boulevard

Dear blog readers, I've decided to continue my elaboration and provide further actionable intelligence on a well known member of the Darkode cybercrime-friendly forum community Nassef. Nassef is using xavi-linuxer@live.com as his personal email address account and is known to have registered the following domains using it - hxxp://tonymontana.cards - hxxp://tonymontana.cash - hxxp://tonymontana.biz.

article thumbnail

AI Dev Gallery: Microsoft Unleashes On-Device AI for Windows 11

Penetration Testing

Microsoft has recently introduced an open-source development resource called “AI Dev Gallery” for devices equipped with the Windows 11 operating system and branded as “AI PCs.” This resource enables developers... The post AI Dev Gallery: Microsoft Unleashes On-Device AI for Windows 11 appeared first on Cybersecurity News.

article thumbnail

NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester

Security Boulevard

SANTA CLARA, Calif., December 30, 2024 We are thrilled to announce that NSFOCUS was selected as the notable vendor of Forrester The Security Analytics Platform Landscape, Q4 by its ISOP (Intelligent Security Operations Platform) with built-in NSFGPT AI assistant and AI-empowered security operation scenarios. The security analytics platform is the core of the security [] The post NSFOCUS ISOP Listed in The Security Analytics Platform Landscape Report by Forrester appeared first on NSFOCUS, Inc.,

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

This 20-in-1 accessory kit is my favorite laptop essential (and it's on sale)

Zero Day

For less money than a phone case, this multifaceted tool kit can keep your handset, laptop, earbuds, and more clean and pristine.

44
article thumbnail

Achieve Satisfaction with Streamlined Secrets Rotation Processes

Security Boulevard

Are Secrets Rotation Processes a Keystone in Your Cybersecurity Strategy? The digital business landscape has evolved with technologies enabling organizations to seamlessly maneuver their operations in the cloud. As a cybersecurity professional, have you considered that as we accelerate towards a future driven by automation, the effective management of Non-Human Identities (NHIs) and secrets rotation [] The post Achieve Satisfaction with Streamlined Secrets Rotation Processes appeared first on En

article thumbnail

This excellent ThinkPad for hybrid workers isn't even Lenovo's newest model (and it's 50% off)

Zero Day

Lenovo's 12th-generation ThinkPad X1 Carbon leverages a long list of design improvements to deliver a thoughtful and well-optimized product.

40
article thumbnail

DEF CON 32 – How State Laws Meant to Protect Children Raise Other Risks

Security Boulevard

Authors/Presenters: Anthony Hendricks Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – How State Laws Meant to Protect Children Raise Other Risks appeared first on Security Boulevard.

Risk 59
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.