Wed.Apr 23, 2025

article thumbnail

Regulating AI Behavior with a Hypervisor

Schneier on Security

Interesting research: “ Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract :As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity.

Software 237
article thumbnail

Operation SyncHole: Lazarus APT goes back to the well

SecureList

We have been tracking the latest attack campaign by the Lazarus group since last November, as it targeted organizations in South Korea with a sophisticated combination of a watering hole strategy and vulnerability exploitation within South Korean software. The campaign, dubbed “Operation SyncHole”, has impacted at least six organizations in South Korea’s software, IT, financial, semiconductor manufacturing, and telecommunications industries, and we are confident that many more

Malware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Risk in U.S. Healthcare: Tackling HIPAA, Vendors, and Human Error – A Free Webinar With Joseph Steinberg and Chip Witt

Joseph Steinberg

Whats Broken in U.S. Healthcare Cybersecurity And How to Fix It. From ransomware and cloud misconfigurations to vulnerable medical devices, U.S. healthcare organizations are under relentless cyber pressure and the risks to patient safety have never been higher. Join cybersecurity experts Joseph Steinberg (Cybersecurity Thought Leader & Author) and Chip Witt (Principal Security Evangelist, Radware) for a fast-paced 30-minute session on whats going wrong in healthcare cybersecurity and what

article thumbnail

The popular xrpl.js Ripple cryptocurrency library was compromised in a supply chain attack

Security Affairs

The xrpl.js Ripple cryptocurrency library was compromised in a supply chain attack aimed at stealing users’ private keys. Threat actors compromised the Ripple cryptocurrency npm JavaScript library xrpl.js to harvest users’ private keys. xrpl.js is the recommended library for integrating a JavaScript/TypeScript app with the XRP, it has more than 140.000 weekly downloads.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience

The Last Watchdog

Its no secret that cyber criminals go after data. Whats often overlooked is shoring up direct protection where that data typically resides: in enterprise storage systems. Thats beginning to change. Related: The data storage economy Enterprise storage security has moved to the front burner. The emerging best practice is to approach it as a core component of disaster recoveryintegrating perimeter and cloud detection with forensic mechanisms at the storage layer itself.

article thumbnail

Crypto mining campaign targets Docker environments with new evasion technique

Security Affairs

New malware campaign targets Docker environments using unknown methods to secretly mine cryptocurrency, researchers warn. Researchers from Darktrace and Cado Security have spotted a malware campaign that targets Docker environments with a novel technique to mine cryptocurrency. The malware campaign targets Docker environments to deploy a malicious node connected to Teneo, a decentralized infrastructure network.

LifeWorks

More Trending

article thumbnail

Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal

SecureWorld News

In its 17th edition, Verizon's 2025 Data Breach Investigations Report (DBIR) continues to deliver one of the most comprehensive analyses of cyber incidents worldwide. Based on data from more than 30,000 security incidents and more than 10,000 confirmed breaches, this year's report reveals a threat landscape where speed, simplicity, and stolen credentials dominate.

article thumbnail

Doge Worker's Code Supports NLRB Whistleblower

Krebs on Security

A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of data from the agency's sensitive case files in early March.

article thumbnail

CISA Secure by Design Initiative Faces Uncertainty Amid Leadership Exits

SecureWorld News

The United States Cybersecurity and Infrastructure Security Agency (CISA) is confronting a pivotal moment following the recent resignations of two senior officials who were instrumental in the agency's Secure by Design initiative. Bob Lord and Lauren Zabierek, both senior advisers at CISA, announced their departures on April 21, 2025, citing personal reasons without providing further details.

article thumbnail

Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report

Security Boulevard

Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar The post Asian Scam Farms: Industrial Scale, Warns UN Report appeared first on Security Boulevard.

Scams 106
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Chinese Cybercriminals Released Z-NFC Tool for Payment Fraud

Security Affairs

Cybercriminals leverage NFC fraud against ATMs and POS terminals, stealing money from consumers at scale. Resecurity (USA) investigated multiple incidents identified in Q1 2025, exceeding several million dollars in damages for one of the top Fortune 100 financial institutions in the United States due to NFC fraud. Stopping cybercriminals operating from China presents significant challenges due to geopolitical, technical, and organizational factors.

Banking 79
article thumbnail

AR/VR Imaging for Surgical Navigation: Enhancing Precision in Real-Time

Security Boulevard

What if your next surgery had more in common with a flight simulator than a scalpel? Thats not science fiction. Its software engineering meeting surgical. Read More The post AR/VR Imaging for Surgical Navigation: Enhancing Precision in Real-Time appeared first on ISHIR | Software Development India. The post AR/VR Imaging for Surgical Navigation: Enhancing Precision in Real-Time appeared first on Security Boulevard.

article thumbnail

Android spyware hidden in mapping software targets Russian soldiers

Security Affairs

A new Android spyware was discovered in a fake Alpine Quest app, reportedly used by Russian soldiers for war zone planning. Doctor Web researchers uncovered a new spyware, tracked as Android.Spy.1292.origin, targeting Russian military personnel. The malicious code was hidden in a trojanized Alpine Quest app and spread via Russian Android catalogs. The malware steals contacts, geolocation, and file info, it can also download extra modules to exfiltrate stored data when instructed. “Alpine Q

Spyware 82
article thumbnail

Delinea Adds Ability to Secure AI Agent Identities

Security Boulevard

Delinea today extended the reach of its platform for securing identities and credentials to now provide support for artificial intelligence (AI) agents. The post Delinea Adds Ability to Secure AI Agent Identities appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

British retailer giant Marks & Spencer (M&S) is managing a cyber incident

Security Affairs

Marks & Spencer (M&S) confirmed it’s managing a cyber incident after multiple customer complaints surfaced on social media. Marks and Spencer Group plc (M&S) announced it has been managing a cyber incident in recent days with the help of external cyber security experts. Customers report outages affecting card payments, gift cards, and M&S’s Click and Collect service across electronic payment systems. “Marks and Spencer Group plc (the Company, or M&S) has bee

Retail 67
article thumbnail

Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today

Security Boulevard

By performing a cryptographic key assessment (CKA), developing a PQC encryption strategy and prioritizing cryptoagility, organizations can prepare for quantum computing cyberthreats. The post Post-Quantum Cryptography: Defending Against Tomorrows Threats Today appeared first on Security Boulevard.

article thumbnail

Heimdal Awarded Patent for Predictive DNS™ Technology

Heimadal Security

COPENHAGEN, Denmark, April 23, 2025 Heimdal, a leading European cybersecurity company, today announced that it has been granted U.S. Patent No. 18333620 for a pioneering invention that calculates the probability of a domain being malicious. This milestone reinforces Heimdals position at the forefront of DNS security. The patent, titled Apparatus and Method of Predicting […] The post Heimdal Awarded Patent for Predictive DNS Technology appeared first on Heimdal Security Blog.

DNS 69
article thumbnail

5 Key Criteria for Choosing the Perfect MFA Solution for Your Business

Duo's Security Blog

"Ninety-nine percent of attacks can be blocked with multi-factor authentication (MFA) is an oft-discussed quote from 2019. Since then, MFA has since become a necessary defense for any cybersecurity strategy to defend against attacks. But times change, and what solved our challenges in the past doesnt necessarily work today, at least not in the same form.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

BSidesLV24 – Common Ground – Securing Your Cloud-Native DevOps: A Zero Trust Approach

Security Boulevard

Author/Presenter: Emma Fang Our sincere appreciation to BSidesLV , and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conferences events located at the Tuscany Suites & Casino ; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Common Ground – Securing Your Cloud-Native DevOps: A Zero Trust Approach appeared first on Security Boulevard.

article thumbnail

Your Meta Ray-Bans just got a big update for free - and it feels like science fiction

Zero Day

Previously limited to early access in certain countries, this new out-of-this-world feature is expanding to all owners.

138
138
article thumbnail

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia

Thales Cloud Protection & Licensing

Qualified Remote Signatures with Luna HSMs and Signature Activation Modules (SAM) from Nextsense and Ascertia madhav Thu, 04/24/2025 - 04:56 Enhance remote digital signing security with an eIDAS-compliant Qualified Signature Creation Device (QSCD) for digital signatures and seals As business processes and government services become increasingly digital, remote signing has become a secure and efficient way to confirm the authenticity of digital documents, transactions, and identities through the

article thumbnail

Stronger Cloud Security in Five: How To Protect Your Cloud Workloads

Security Boulevard

In the first installment of Tenables Stronger Cloud Security in Five blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. Today, we turn to securing cloud workloads, which are the applications and services along with all the resources they need to function that run within your multi-cloud infrastructure.

Risk 52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google Reverses Third-Party Cookie Phaseout, Privacy Sandbox Relegated to Support Role

Penetration Testing

Currently, the industry widely relies on cookie technology to store user data, and advertising networks use cookies to The post Google Reverses Third-Party Cookie Phaseout, Privacy Sandbox Relegated to Support Role appeared first on Daily CyberSecurity.

article thumbnail

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

The Hacker News

Multiple threat activity clusters with ties to North Korea (aka Democratic People's Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space.

article thumbnail

NVIDIA NeMo Framework: High-Risk Vulnerabilities Allow Remote Code Execution

Penetration Testing

NVIDIA has issued a security bulletin disclosing three high-severity vulnerabilities in its NeMo Framework, a scalable, cloud-native generative The post NVIDIA NeMo Framework: High-Risk Vulnerabilities Allow Remote Code Execution appeared first on Daily CyberSecurity.

Risk 130
article thumbnail

Regulating AI Behavior with a Hypervisor

Security Boulevard

Interesting research: Guillotine: Hypervisors for Isolating Malicious AIs. Abstract :As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI modelsmodels that, by accident or malice, can generate existential threats to humanity.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

The Hacker News

The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024. Google-owned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionage-related operations.

article thumbnail

Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber

Security Boulevard

ATT&CK v17 We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v17 version of MITRE ATT&CK. Like we do with every ATT&CK update , weve done the heavy lifting to analyze the new content additions, and where relevant, merge them with existing content added by our team so users have a seamless experience in the platform.

59
article thumbnail

The 4 types of people interested in AI agents - and what businesses can learn from them

Zero Day

Consumers want agentic AI to simplify their daily lives. This research identifies four personality types who are interested in AI agents.

119
119
article thumbnail

Unifying Identity Signals: Turning Breach Data into Actionable Identity Intelligence

Security Boulevard

The Fragmentation Problem in CTI and OSINT Investigations Cyber threat intelligence (CTI) and open-source intelligence (OSINT) workflows are often flooded with fragmented identity data leaked credentials, infostealer logs, dark web posts, and forum aliases. While this data holds enormous potential, making sense of it is no easy task. To draw meaningful insights, analysts must The post Unifying Identity Signals: Turning Breach Data into Actionable Identity Intelligence appeared first on Securit

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!