Mon.Dec 02, 2024

article thumbnail

Details about the iOS Inactivity Reboot Feature

Schneier on Security

I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details , discovered through reverse engineering. The feature triggers after seventy-two hours of inactivity, even it is remains connected to Wi-Fi.

article thumbnail

Top 5 Cyber Security Trends for 2025

Tech Republic Security

TechRepublic asked cyber experts to predict the top trends that will impact the security field in 2025.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Live Stream: AWS Partners LIVE!

eSecurity Planet

Get a front row seat to hear real stories from customers and AWS leaders about navigating pressing topics, learn about new product launches, watch demos, and get behind-the-scenes insights. You can catch all the excitement on the AWS Partner Network YouTube channel, where we’ll be sharing breaking news and exclusive insights alongside our competency partners.

113
113
article thumbnail

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

The Hacker News

Over a dozen malicious Android apps identified on the Google Play Store that have been collectively downloaded over 8 million times contain malware known as SpyLoan, according to new findings from McAfee Labs.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Bitwarden Review (2024): Is It a Secure Password Manager?

Tech Republic Security

Bitwarden’s excellent free version makes it one of the best free password managers available. To learn more, read our full Bitwarden review.

article thumbnail

SmokeLoader Malware Resurfaces, Targeting Manufacturing and IT in Taiwan

The Hacker News

Taiwanese entities in manufacturing, healthcare, and information technology sectors have become the target of a new campaign distributing the SmokeLoader malware. "SmokeLoader is well-known for its versatility and advanced evasion techniques, and its modular design allows it to perform a wide range of attacks," Fortinet FortiGuard Labs said in a report shared with The Hacker News.

More Trending

article thumbnail

Cisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Software

Penetration Testing

Cisco Systems has issued an updated security advisory regarding CVE-2014-2120, a vulnerability affecting the WebVPN login page of Cisco Adaptive Security Appliance (ASA) Software. Originally disclosed in 2014, this vulnerability... The post Cisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Software appeared first on Cybersecurity News.

article thumbnail

I test AI tools for a living, and these are the only two worth paying for

Zero Day

Generative AI can supercharge your productivity, but which tools truly deliver? These are my must-have subscriptions for programming, graphics, and creative workflows that actually pay off.

133
133
article thumbnail

Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads

The Hacker News

A newly discovered malware campaign has been found to target private users, retailers, and service businesses mainly located in Russia to deliver NetSupport RAT and BurnsRAT. The campaign, dubbed Horns&Hooves by Kaspersky, has hit more than 1,000 victims since it began around March 2023.

Retail 91
article thumbnail

Get Microsoft Office Pro and Windows 11 Pro for 87% off with this Cyber Monday bundle deal

Zero Day

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $55 for a limited time.

96
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Malicious Ads in Search Results Are Driving New Generations of Scams

WIRED Threat Level

The scourge of “malvertising” is nothing new, but the tactic is still so effective that it's contributing to the rise of investment scams and the spread of new strains of malware.

Scams 83
article thumbnail

8 ways Intel can still pull itself out of free fall after its CEO's sudden exit

Zero Day

Pat Gelsinger's departure leaves Intel at a crossroads, forcing the company to confront cultural stagnation, x86's decline, and growing competition from Arm, AI, and TSMC. Here's what could come next.

91
article thumbnail

A Guide to Securing AI App Development: Join This Cybersecurity Webinar

The Hacker News

Artificial Intelligence (AI) is no longer a far-off dream—it’s here, changing the way we live. From ordering coffee to diagnosing diseases, it’s everywhere. But while you’re creating the next big AI-powered app, hackers are already figuring out ways to break it. Every AI app is an opportunity—and a potential risk.

article thumbnail

AWS says its AI data centers just got even more efficient - here's how

Zero Day

Liquid cooling, renewable diesel, and a host of infrastructure changes make Amazon's cloud service four times more efficient than on-premise computing, the company explains at re:Invent.

90
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Critical Vulnerabilities in mySCADA myPRO Software Pose Significant Risk to Industrial Control Systems

Penetration Testing

Researchers have disclosed critical vulnerabilities in mySCADA’s myPRO software, a widely deployed industrial automation platform. These security flaws could permit remote attackers to gain unauthorized access and complete control over... The post Critical Vulnerabilities in mySCADA myPRO Software Pose Significant Risk to Industrial Control Systems appeared first on Cybersecurity News.

article thumbnail

My top 5 best Cyber Monday deals are hovering near all-time low prices

Zero Day

You should be excited to see some of the best tech products available at such great prices for Cyber Monday. I've personally tested all five of the products on this list, and they're outstanding.

78
article thumbnail

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

Security Affairs

The Tor Project seeks help deploying 200 WebTunnel bridges by year-end to counter government censorship. Recent reports from Russia show increased censorship targeting the Tor network, including blocking bridges, pluggable transports, and circumvention apps. Russian watchdog Roskomnadzor is making some bridges inaccessible, highlighting the urgent need for more WebTunnel bridges.

article thumbnail

No company too small for Phobos ransomware gang, indictment reveals

Malwarebytes

The US Department of Justice has charged a Russian national named Evgenii Ptitsyn with selling, operating, and distributing a ransomware variant known as “Phobos” during a four-year cybercriminal campaign that extorted at least $16 million from victims across the world. The government’s indictment against Ptitsyn should dispel any notion that ransomware gangs only target the largest, richest, most robust corporations on the planet, as one Phobos affiliate allegedly extorted a Maryland-based heal

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

Security Affairs

International law enforcement operation Operation HAECHI-V led to more than 5,500 suspects arrested and seized over $400 million. A global operation code-named Operation HAECHI V, involving 40 countries, resulted in 5,500+ arrests and seized $400M in assets. Operation HAECHI V (July-Nov 2024) targeted cyber frauds like phishing, romance scams, sextortion, investment fraud, online gambling, BEC, and e-commerce fraud.

article thumbnail

Sustainability in EPC Projects: The Function of Smart Technology and Devices

SecureWorld News

The engineering, procurement, and construction (EPC) project environment is changing due to global sustainable development trends. Smart technologies and devices are emerging as powerful drivers of sustainable change. As the construction and industrial sectors face increasing pressure to reduce their environmental impact, these developments are changing the way EPC projects are planned, executed, and maintained, from reducing waste to maximizing energy efficiency and supporting green building pr

article thumbnail

Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT

SecureList

Recent months have seen a surge in mailings with lookalike email attachments in the form of a ZIP archive containing JScript scripts. The script files – disguised as requests and bids from potential customers or partners – bear names such as “Запрос цены и предложения от Индивидуального предпринимателя <ФИО> на август 2024. АРТ-КП0005272381.js” (Request for price and proposal from sole trader <name> for August 2024.

article thumbnail

Signs Point to Foreign Syndicate Fueling BEC Surge From Within U.S. ISPs

Security Boulevard

By staying informed of these evolving tactics and adopting advanced detection tools, organizations can better protect themselves against the increasingly stealthy and persistent BEC threats affecting businesses worldwide. The post Signs Point to Foreign Syndicate Fueling BEC Surge From Within U.S. ISPs appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Zero-Day Exploit Code Released for Windows Task Scheduler Flaw (CVE-2024-49039), Actively Exploited by RomCom Group

Penetration Testing

A proof-of-concept (PoC) exploit code for CVE-2024-49039, a zero-day vulnerability in Windows Task Scheduler, has been publicly released, raising concerns about increased attacks. This vulnerability, with a CVSS score of... The post Zero-Day Exploit Code Released for Windows Task Scheduler Flaw (CVE-2024-49039), Actively Exploited by RomCom Group appeared first on Cybersecurity News.

article thumbnail

Reposition Cybersecurity From a Cost Center to a Business Driver

Security Boulevard

Repositioning cybersecurity as a business issue ensures that it receives the attention and resources it requires at the highest levels of the organization. The post Reposition Cybersecurity From a Cost Center to a Business Driver appeared first on Security Boulevard.

article thumbnail

Microsoft's Surface Laptop Copilot+ PC beat my MacBook Air in 3 ways and it's still 20% off

Zero Day

The company's first consumer laptop built for the AI era is already putting a smile on my face. As part of Cyber Monday, Amazon has slashed its price by over $200.

78
article thumbnail

Exploring the Highest Paying Cybersecurity Jobs in 2024

Security Boulevard

The typical salary ranges for various cybersecurity roles and the elements and factors that impact earning potential in the cybersecurity field. The post Exploring the Highest Paying Cybersecurity Jobs in 2024 appeared first on Security Boulevard.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Get Microsoft Visio Professional or Microsoft Project Professional 2024 for $80 this Cyber Monday

Zero Day

Microsoft's project management tools help plan, execute, and complete projects -- and they're on sale for up to 92% off right now.

83
article thumbnail

KrbRelayEx: A Kerberos Relaying Tool for Penetration Testing

Penetration Testing

KrbRelayEx is an open-source tool designed for security professionals to assess the security of Active Directory environments. It leverages the power of Kerberos relaying, a technique that exploits the trust... The post KrbRelayEx: A Kerberos Relaying Tool for Penetration Testing appeared first on Cybersecurity News.

article thumbnail

8 ways Intel can still pull itself out of free fall after its CEO's forced exit

Zero Day

Pat Gelsinger's departure leaves Intel at a crossroads, forcing the company to confront cultural stagnation, x86's decline, and growing competition from Arm, AI, and TSMC. Here's what could come next.

74
article thumbnail

The Pressure Is on for Big Tech to Regulate the Broken Digital Advertising Industry

WIRED Threat Level

Brands have been at the mercy of the algorithm when it comes to where their ads appear online, but they’re about to get more control.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.