Mon.Dec 02, 2024

article thumbnail

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

Security Affairs

The Tor Project seeks help deploying 200 WebTunnel bridges by year-end to counter government censorship. Recent reports from Russia show increased censorship targeting the Tor network, including blocking bridges, pluggable transports, and circumvention apps. Russian watchdog Roskomnadzor is making some bridges inaccessible, highlighting the urgent need for more WebTunnel bridges.

article thumbnail

No company too small for Phobos ransomware gang, indictment reveals

Malwarebytes

The US Department of Justice has charged a Russian national named Evgenii Ptitsyn with selling, operating, and distributing a ransomware variant known as “Phobos” during a four-year cybercriminal campaign that extorted at least $16 million from victims across the world. The government’s indictment against Ptitsyn should dispel any notion that ransomware gangs only target the largest, richest, most robust corporations on the planet, as one Phobos affiliate allegedly extorted a Maryland-based heal

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

Security Affairs

International law enforcement operation Operation HAECHI-V led to more than 5,500 suspects arrested and seized over $400 million. A global operation code-named Operation HAECHI V, involving 40 countries, resulted in 5,500+ arrests and seized $400M in assets. Operation HAECHI V (July-Nov 2024) targeted cyber frauds like phishing, romance scams, sextortion, investment fraud, online gambling, BEC, and e-commerce fraud.

article thumbnail

Details about the iOS Inactivity Reboot Feature

Schneier on Security

I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details , discovered through reverse engineering. The feature triggers after seventy-two hours of inactivity, even it is remains connected to Wi-Fi.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Reposition Cybersecurity From a Cost Center to a Business Driver

Security Boulevard

Repositioning cybersecurity as a business issue ensures that it receives the attention and resources it requires at the highest levels of the organization. The post Reposition Cybersecurity From a Cost Center to a Business Driver appeared first on Security Boulevard.

article thumbnail

Live Stream: AWS Partners LIVE!

eSecurity Planet

Get a front row seat to hear real stories from customers and AWS leaders about navigating pressing topics, learn about new product launches, watch demos, and get behind-the-scenes insights. You can catch all the excitement on the AWS Partner Network YouTube channel, where we’ll be sharing breaking news and exclusive insights alongside our competency partners.

124
124

LifeWorks

More Trending

article thumbnail

Critical Vulnerabilities in mySCADA myPRO Software Pose Significant Risk to Industrial Control Systems

Penetration Testing

Researchers have disclosed critical vulnerabilities in mySCADA’s myPRO software, a widely deployed industrial automation platform. These security flaws could permit remote attackers to gain unauthorized access and complete control over... The post Critical Vulnerabilities in mySCADA myPRO Software Pose Significant Risk to Industrial Control Systems appeared first on Cybersecurity News.

article thumbnail

Top 5 Cyber Security Trends for 2025

Tech Republic Security

TechRepublic asked cyber experts to predict the top trends that will impact the security field in 2025.

article thumbnail

A week in security (November 25 – December 1)

Malwarebytes

Last week on Malwarebytes Labs: Printer problems? Beware the bogus help Data broker exposes 600,000 sensitive files including background checks Medical testing company LifeLabs failed to protect customer data, report finds Explained: the Microsoft connected experiences controversy Spotify, Audible, and Amazon used to push dodgy forex trading sites and more “Hilariously insecure”: Andrew Tate’s The Real World breached, 800,000 users affected Last week on ThreatDown: What is Buffer Ove

article thumbnail

Cisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Software

Penetration Testing

Cisco Systems has issued an updated security advisory regarding CVE-2014-2120, a vulnerability affecting the WebVPN login page of Cisco Adaptive Security Appliance (ASA) Software. Originally disclosed in 2014, this vulnerability... The post Cisco Confirms Active Exploitation of Decade-Old WebVPN Vulnerability in ASA Software appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Duo SSO, DAG, GCC, GCC High – What's the Difference?

Duo's Security Blog

In today’s world, organizations must balance ease of access with robust protection for their users. Duo Security offers a suite of solutions designed to provide secure authentication and single sign-on (SSO) for applications. But with various products available, it can be confusing to understand the differences between all the aspects of Duo – especially those that impact public sector organizations and federal entities.

article thumbnail

Bitwarden Review (2024): Is It a Secure Password Manager?

Tech Republic Security

Bitwarden’s excellent free version makes it one of the best free password managers available. To learn more, read our full Bitwarden review.

article thumbnail

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

The Hacker News

Over a dozen malicious Android apps identified on the Google Play Store that have been collectively downloaded over 8 million times contain malware known as SpyLoan, according to new findings from McAfee Labs.

article thumbnail

One of the best work travel tablets is still nearly 25% off for Cyber Monday

Zero Day

The Asus ProArt PZ13 is a high-performing laptop-tablet hybrid with a gorgeous 3K OLED screen and a battery that lasts way longer than expected.

116
116
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

SmokeLoader Malware Resurfaces, Targeting Manufacturing and IT in Taiwan

The Hacker News

Taiwanese entities in manufacturing, healthcare, and information technology sectors have become the target of a new campaign distributing the SmokeLoader malware. "SmokeLoader is well-known for its versatility and advanced evasion techniques, and its modular design allows it to perform a wide range of attacks," Fortinet FortiGuard Labs said in a report shared with The Hacker News.

article thumbnail

Gafgyt Malware Targeting Docker Remote API Servers

Trend Micro

Our researchers identified threat actors exploiting misconfigured Docker servers to spread the Gafgyt malware. This threat traditionally targets IoT devices; this new tactic signals a change in its behavior.

Malware 112
article thumbnail

Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads

The Hacker News

A newly discovered malware campaign has been found to target private users, retailers, and service businesses mainly located in Russia to deliver NetSupport RAT and BurnsRAT. The campaign, dubbed Horns&Hooves by Kaspersky, has hit more than 1,000 victims since it began around March 2023.

Retail 121
article thumbnail

Zero-Day Exploit Code Released for Windows Task Scheduler Flaw (CVE-2024-49039), Actively Exploited by RomCom Group

Penetration Testing

A proof-of-concept (PoC) exploit code for CVE-2024-49039, a zero-day vulnerability in Windows Task Scheduler, has been publicly released, raising concerns about increased attacks. This vulnerability, with a CVSS score of... The post Zero-Day Exploit Code Released for Windows Task Scheduler Flaw (CVE-2024-49039), Actively Exploited by RomCom Group appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

I test AI tools for a living, and these are the only two worth paying for

Zero Day

Generative AI can supercharge your productivity, but which tools truly deliver? These are my must-have subscriptions for programming, graphics, and creative workflows that actually pay off.

106
106
article thumbnail

A Guide to Securing AI App Development: Join This Cybersecurity Webinar

The Hacker News

Artificial Intelligence (AI) is no longer a far-off dream—it’s here, changing the way we live. From ordering coffee to diagnosing diseases, it’s everywhere. But while you’re creating the next big AI-powered app, hackers are already figuring out ways to break it. Every AI app is an opportunity—and a potential risk.

article thumbnail

The Apple Watch Ultra 2 is still $80 off at Best Buy for Cyber Monday (while the deal lasts)

Zero Day

Snag Apple's Watch Ultra 2 for $80 off at Best Buy. The deal is going fast during the last few hours of Cyber Monday.

105
105
article thumbnail

Zero-Day Attack Alert: Corrupted Files Weaponized in New Attacks

Penetration Testing

A new 0-day attack leverages file corruption to slip past antivirus and sandbox defenses. A sophisticated new phishing campaign is leveraging a novel technique to bypass traditional security measures, delivering... The post Zero-Day Attack Alert: Corrupted Files Weaponized in New Attacks appeared first on Cybersecurity News.

Antivirus 105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Apple Watch Ultra 2 is still $80 off at Best Buy for Cyber Monday

Zero Day

Nearly every Apple Watch is on sale for Cyber Week, and the Ultra 2 hasn't been left out. Snag one for $80 off at Best Buy during Cyber Monday.

105
105
article thumbnail

Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services

Quick Heal Antivirus

Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex. The post Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services appeared first on Quick Heal Blog.

article thumbnail

AWS says its AI data centers just got even more efficient - here's how

Zero Day

Liquid cooling, renewable diesel, and a host of infrastructure changes make Amazon's cloud service four times more efficient than on-premise computing, the company explains at re:Invent.

100
100
article thumbnail

Exploring the Highest Paying Cybersecurity Jobs in 2024

Security Boulevard

The typical salary ranges for various cybersecurity roles and the elements and factors that impact earning potential in the cybersecurity field. The post Exploring the Highest Paying Cybersecurity Jobs in 2024 appeared first on Security Boulevard.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

My favorite DeWalt tool set is 46% off for Cyber Monday

Zero Day

Save $80 on this brilliant DeWalt power tool kit at Amazon for Cyber Monday -- the perfect gift for DIY beginners and tradespeople.

99
article thumbnail

Cyber Monday Scams: Unmasking the Shadows of Online Shopping

Penetration Testing

Cyber Monday, a day eagerly awaited by shoppers for its irresistible deals, has become a hunting ground for cybercriminals leveraging the surge in online activity to execute sophisticated scams. CloudSEK’s... The post Cyber Monday Scams: Unmasking the Shadows of Online Shopping appeared first on Cybersecurity News.

Scams 92
article thumbnail

I recommend this $60 anti-spy camera finder to anyone traveling (get 38% off for Cyber Monday)

Zero Day

Social media is awash with ads for gadgets that detect hidden cameras and bugs in your hotel room, Airbnb, or even your own home. So I tested one to see if it actually works.

Media 98
article thumbnail

THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1)

The Hacker News

Ever wonder what happens in the digital world every time you blink? Here's something wild - hackers launch about 2,200 attacks every single day, which means someone's trying to break into a system somewhere every 39 seconds.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!