Wed.Feb 12, 2025

article thumbnail

Delivering Malware Through Abandoned Amazon S3 Buckets

Schneier on Security

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that had previously been used across commercial and open source software

Malware 299
article thumbnail

Threat Modeling the Genomic Data Sequencing Workflow (Threat Model Thursday)

Adam Shostack

An exciting new sample TM from MITRE For Threat Model Thursday, I want to provide some comments on NIST CSWP 35 ipd, Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow (Initial Public Draft). As always, my goal is to offer helpful feedback. This is a big, complex document. Its 50 pages of real content with 13 listed authors, and is a subset of a larger project.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake Etsy invoice scam tricks sellers into sharing credit card information 

Malwarebytes

This article was researched and written by Stefan Dasic, manager, research and response for ThreatDown, powered by Malwarebytes. As an online seller, youre already juggling product listings, customer service and marketingso the last thing you need is to be targeted by scammers. Unfortunately, a new scam is making the rounds, and its crucial to recognize the warning signs before you fall victim.

Scams 125
article thumbnail

Cybercriminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks

Security Boulevard

As Valentines Day approaches, cybercriminals are ramping up their efforts to exploit consumers through romance scams, phishing campaigns and fraudulent e-commerce offers. The post Cybercriminals Exploit Valentines Day with Romance Scams, Phishing Attacks appeared first on Security Boulevard.

Scams 114
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Gambling firms are secretly sharing your data with Facebook 

Malwarebytes

While you might think youre hitting the jackpot, whether youve consented to it or not, online gambling sites are playing with your data. Users data, including details of webpages they visited and buttons they clicked, are being shared with Meta, Facebooks parent company. The Observer reports that over 150 UK gambling websites have been extracting visitor data through a hidden embedded tracking tool, and then sending that data to Meta in order to profile people as gamblers and flood them with Fac

article thumbnail

North Korea-linked APT Emerald Sleet is using a new tactic

Security Affairs

Microsoft Threat Intelligence has observed North Korea-linked APT Emerald Sleet using a new tactic, tricking targets into running PowerShell. Microsoft Threat Intelligence researchers spotted North Korea-linked threat actor Emerald Sleet (also known as Kimsuky and VELVET CHOLLIMA ) using a new tactic. They are tricking targets into running PowerShell as an administrator and executing code provided by the attacker.

LifeWorks

More Trending

article thumbnail

The Rise of Non-Ransomware Attacks on AWS S3 Data

Thales Cloud Protection & Licensing

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. Instead, they exploit the AWS server-side encryption with customer-provided keys (SSE-C), extorting payment in exchange for the encryption key.

article thumbnail

U.S. CISA adds Microsoft Windows, Zyxel device flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Windows, Zyxel deviceflaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability CVE-2025-21418 Microsoft Windows Ancillary Function Driver for WinSock Heap

article thumbnail

Canada Releases 2025 National Cyber Security Strategy

SecureWorld News

The Honourable David McGuinty, Minister of Public Safety, on February 6th unveiled Canada's National Cyber Security Strategy (NCSS), a long-term plan to protect Canadians, businesses, and critical infrastructure from an increasingly complex cyber threat landscape. With cybercrime, state-sponsored attacks, and digital risks evolving rapidly, the strategy aims to modernize Canada's cyber defenses through enhanced collaboration, industry leadership, and proactive threat mitigation.

article thumbnail

Sarcoma ransomware gang claims the theft of sensitive data from PCB maker Unimicron

Security Affairs

The Sarcoma ransomware group announced a breach of the Taiwanese printed circuit board (PCB) manufacturing giant Unimicron. The Sarcoma ransomware group claims to have breached Taiwanese PCB manufacturer Unimicron, leaked sample files, and threatened a full data release if no ransom is paid by Tuesday, February 20, 2025. Unimicron Technology Corporation is a Taiwanese company specializing in the manufacturing of printed circuit boards (PCBs), high-density interconnects (HDI), and IC substrates.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CISOs Brace for LLM-Powered Attacks: Key Strategies to Stay Ahead  

Security Boulevard

For chief information security officers (CISOs), understanding and mitigating the security risks associated with LLMs is paramount. The post CISOs Brace for LLM-Powered Attacks: Key Strategies to Stay Ahead appeared first on Security Boulevard.

CISO 80
article thumbnail

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

The Hacker News

The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them.

article thumbnail

Navigating Security Challenges in the Age of Data Complexity 

Security Boulevard

Organizations need to embrace the transformative powers of AI but do so with a vigilant eye toward the data security and privacy challenges it presents. The post Navigating Security Challenges in the Age of Data Complexity appeared first on Security Boulevard.

article thumbnail

Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws

Tech Republic Security

Februarys report on Microsoft patches includes 56 vulnerabilities, two of which are zero-day flaws that have been exploited.

139
139
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Current AI Revolution Will (Finally) Transform Your SOC

Security Boulevard

Artificial intelligence (AI) is profoundly transforming cybersecurity, reimagining detection through remediation. The post The Current AI Revolution Will (Finally) Transform Your SOC appeared first on Security Boulevard.

article thumbnail

Perplexity is the AI tool Gemini wishes it could be

Zero Day

Here's why I stick with Perplexity over Google's Gemini for AI assistance, even on my Android phone.

132
132
article thumbnail

Check Point, Wiz Partner on Enterprise Cloud Security

Security Boulevard

Check Point Software Technologies and cloud security provider Wiz are teaming up to enhance cloud security for enterprises by integrating cloud network protection with Cloud Native Application Protection (CNAPP). The post Check Point, Wiz Partner on Enterprise Cloud Security appeared first on Security Boulevard.

article thumbnail

Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation

The Hacker News

Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63 vulnerabilities, three are rated Critical, 57 are rated Important, one is rated Moderate, and two are rated Low in severity.

Software 128
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

macOS Security Breach: CVE-2024-54531 PoC Published, Attackers Can Bypass KASLR

Penetration Testing

Security researchers from Korea University have unveiled an attack that successfully bypasses Kernel Address Space Layout Randomization (KASLR) The post macOS Security Breach: CVE-2024-54531 PoC Published, Attackers Can Bypass KASLR appeared first on Cybersecurity News.

article thumbnail

Microsoft Uncovers Sandworm Subgroup's Global Cyber Attacks Spanning 15+ Countries

The Hacker News

A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe.

article thumbnail

CrowdStrike Addresses High-Severity TLS Vulnerability in Falcon Sensor for Linux (CVE-2025-1146)

Penetration Testing

CrowdStrike has issued a security advisory regarding a high-severity Transport Layer Security (TLS) vulnerability in its Falcon Sensor The post CrowdStrike Addresses High-Severity TLS Vulnerability in Falcon Sensor for Linux (CVE-2025-1146) appeared first on Cybersecurity News.

article thumbnail

JSON Web Token Attacks And Vulnerabilities

Acunetix

JSON Web Tokens (JWTs) are a widely used method for securely exchanging data in JSON format. Due to their ability to be digitally signed and verified, they are commonly used for authorization and authentication. However, their security depends entirely on proper implementationwhen misconfigured, JWTs can. Read more The post JSON Web Token Attacks And Vulnerabilities appeared first on Acunetix.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cisco and Wiz Collaborate to Enhance Cloud Security: Tackling AI-Generating Threats in Complex IT Infrastructures

Cisco Security

Cisco is collaborating with Wiz. Together, they aim to improve cloud security for enterprises grappling with AI-generated threats in intricate IT landscapes.

article thumbnail

Perplexity is the AI tool Google wishes Gemini could be

Zero Day

If you've become interested in AI, you might have automatically been drawn to Google's Gemini but there's a better way to get your answers, thanks to Perplexity.

119
119
article thumbnail

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

The Hacker News

Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container's isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3).

article thumbnail

CVE-2025-0108 & CVE-2025-0110: Palo Alto Networks Fixes High-Severity PAN-OS Vulnerabilities

Penetration Testing

Palo Alto Networks has released security advisories addressing two high-severity vulnerabilities in its PAN-OS network security operating system. The post CVE-2025-0108 & CVE-2025-0110: Palo Alto Networks Fixes High-Severity PAN-OS Vulnerabilities appeared first on Cybersecurity News.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

AI chatbots distort the news, BBC finds - see what they get wrong

Zero Day

ChatGPT, Copilot, Gemini, and Perplexity were asked to summarize 100 news stories. Here's how they did.

117
117
article thumbnail

How to Steer AI Adoption: A CISO Guide

The Hacker News

CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there arent many resources to guide them on what their role should look like or what they should bring to these meetings.

CISO 117
article thumbnail

How to use Linux without ever touching the terminal

Zero Day

Once upon a time, using Linux without the terminal was unthinkable. Now? For average users, the terminal is totally optional.

109
109
article thumbnail

Lines Between Nation-State and Cybercrime Groups Disappearing: Google

Security Boulevard

Threat researchers with Google are saying that the lines between nation-state actors and cybercrime groups are blurring, noting that gangs backed by China, Russia, and others are using financially motivated hackers and their tools while attacks by cybercriminals should be seen as national security threats. The post Lines Between Nation-State and Cybercrime Groups Disappearing: Google appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!