Mon.Jan 27, 2025

article thumbnail

New VPN Backdoor

Schneier on Security

A newly discovered VPN backdoor uses some interesting tactics to avoid detection: When threat actors use backdoor malware to gain access to a network, they want to make sure all their hard work can’t be leveraged by competing groups or detected by defenders. One countermeasure is to equip the backdoor with a passive agent that remains dormant until it receives what’s known in the business as a “magic packet.” On Thursday, researchers revealed that a never-before-seen back

VPN 300
article thumbnail

Spatial Reasoning and Threat Modeling

Adam Shostack

Do diagrams leverage the brain in a different way? Creating, refining, communicating, and working with models are all important parts of how I think about answering what are we working on? People often want to eliminate the diagramming or modeling step as not required, and thats a mistake. The act of engaging with the higher order question of what are we building working on is important, and diagramming acts as a forcing function.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DeepSeek Chatbot Beats OpenAI on App Store Leaderboard

Tech Republic Security

Competing with OpenAIs o1, DeepSeeks models scored higher on benchmarks and disrupted the AI market, sparking debates on U.S.-China tech dynamics.

Marketing 147
article thumbnail

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

The Hacker News

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate privileges.

Media 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

DeepSeek’s Popular AI App Is Explicitly Sending US Data to China

WIRED Threat Level

Amid ongoing fears over TikTok, Chinese generative AI platform DeepSeek says its sending heaps of US user data straight to its home country, potentially setting the stage for greater scrutiny.

article thumbnail

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

The Hacker News

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it's restricting registrations on the service, citing malicious attacks. "Due to large-scale malicious attacks on DeepSeek's services, we are temporarily limiting registrations to ensure continued service," the company said in an incident report page.

More Trending

article thumbnail

Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam

Security Boulevard

A large-scale phishing campaign is using PDF files and hidden malicious links, as well as posing at the U.S. Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal information, Zimperium researchers say. The post Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam appeared first on Security Boulevard.

Mobile 115
article thumbnail

Apple fixed the first actively exploited zero-day of 2025

Security Affairs

Apple addressed the first zero-day vulnerability of 2025, which is actively exploited in attacks in the wild aimed at iPhone users. Apple released security updates to address 2025’s first zero-day vulnerability, tracked as CVE-2025-24085 , actively exploited in attacks targeting iPhone users. The vulnerability is a privilege escalation vulnerability that impacts the Core Media framework. “A malicious application may be able to elevate privileges.

Spyware 103
article thumbnail

UnitedHealth almost doubles victim numbers from massive Change Healthcare data breach

Malwarebytes

UnitedHealth says it now estimates that the data breach on its subsidiary Change Healthcare affected 190 million people, nearly doubling its previous estimate from October. In May, UnitedHealth CEO Andrew Witty estimated that the ransomware attack compromised the data of a third of US individuals when he testified before the Senate Finance Committee on Capitol Hill.

article thumbnail

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

The Hacker News

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user's Git credentials.

Risk 114
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Humans are the Beating Heart of the Autonomous SOC

Security Boulevard

Ultimately, the goal of the autonomous SOC is to create a more efficient and effective security environment where human analysts and AI work together to achieve a higher level of security than either could achieve alone. Working together, each improves the other. The post Humans are the Beating Heart of the Autonomous SOC appeared first on Security Boulevard.

article thumbnail

Is this the iPhone SE 4? Leaked photos reveal major changes coming in 2025

Zero Day

Rumored to launch in April, the SE 4 sports a single camera, a notch, a USB-C port, and no more Home button, according to photos and a video shared by a known leaker.

112
112
article thumbnail

ESXi ransomware attacks use SSH tunnels to avoid detection

Security Affairs

Threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Researchers at cybersecurity firm Sygnia warn that threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Ransomware groups are exploiting unmonitored ESXi appliances to persist and access corporate networks.

article thumbnail

Do We Really Need The OWASP NHI Top 10?

The Hacker News

The Open Web Application Security Project has recently introduced a new Top 10 project - the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.

106
106
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Furious over the Pixel 4a update fiasco? You may be entitled to compensation

Zero Day

If Google's update ruined your phone's battery life, you can choose a battery replacement, a Google store credit, or a cash payment. Here's how.

104
104
article thumbnail

Scammers Are Creating Fake News Videos to Blackmail Victims

WIRED Threat Level

Yahoo Boy scammers are impersonating CNN and other news organizations to create videos that pressure victims into making blackmail payments.

92
article thumbnail

My favorite bone conduction headphones for swimming just got a brilliant new feature

Zero Day

Bone conduction headsets let you stay aware while working out. The Nank Runner Diver2 Pro adds a new design element to take that idea even further.

102
102
article thumbnail

Are Third-Party Risk Management Solutions Effective Enough?  

Security Boulevard

A modern EASM solution offers more by incorporating meaningful first-party and third-party cyber risk insights than conventional TPRM solutions. The post Are Third-Party Risk Management Solutions Effective Enough? appeared first on Security Boulevard.

Risk 91
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to remove Copilot from your Microsoft 365 plan

Zero Day

Copilot has muscled its way into Microsoft 365 with a price hike to boot. But you can remove the AI from Word and revert to the classic plan. Here's how.

102
102
article thumbnail

U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5

Security Boulevard

The DOJ, which has move aggressively over the past year to find and shut down North Korea's numerous IT worker scams, indicts two U.S. citizens and three others for running a six-year operation the stole more than $866,000 from 10 U.S. companies that thought they were hiring legitimate IT pros. The post U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5 appeared first on Security Boulevard.

Scams 90
article thumbnail

This versatile HP laptop will satisfy business professionals and creatives alike

Zero Day

HP's EliteBook x360 1040 has an adaptable form factor with one of the best video conferencing experiences I've tested on a laptop.

102
102
article thumbnail

The Cybersecurity Dimensions of Web Accessibility

SecureWorld News

Today, the internet is the glue for areas like communication, commerce, healthcare, entertainment, and pretty much everything in between. However, despite the indisputable necessity for online inclusivity, the global digital ecosystem remains largely inaccessible to millions of people with disabilities. If you find this narrative far-fetched, here are some stats that paint the unsettling big picture: As of 2024, only 4.1% of all websites complied with accessibility standards, and users with phys

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Why China's DeepSeek could burst our AI bubble

Zero Day

The startup's open-source reasoning model R1 is clobbering AI rivals and panicking investors. But there's more.

98
article thumbnail

AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability

Security Boulevard

Gartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI to simplify access to an environment. The post AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability appeared first on Netography.

article thumbnail

This robot vacuum performs as well as some flagship models for a fraction of the cost

Zero Day

Ecovacs' Deebot N30 Omni is a mid-range robot vacuum with high-end features worth way more than its cost, especially with this deal.

96
article thumbnail

Racing the Clock: Outpacing Accelerating Attacks

Digital Shadows

Key Findings 2024 was the year cyber threats got quicker. Cyber attackers really picked up the pace, executing faster, more efficient breaches that pushed traditional defenses to their limits. Our research reveals 2024 saw a 22% increase in attack speed compared to 2023, with the fastest incident achieving lateral movement in just 27 minutes. This quicker infiltration leaves organizations with even less time to respond, making automated defenses crucial in matchingand surpassingthe speed of adve

Scams 72
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Apple releases iOS 18.3 with AI-powered Apple Intelligence on by default

Zero Day

The move means that people who don't want to use Apple's AI tech will need to manually disable it.

95
article thumbnail

How Garmin watches reveal your personal data, and what you can do

Pen Test Partners

TL;DR A walk-through of obtaining sensitive data from a Garmin watch using forensic techniques How digital forensics on a Garmin watch helped solve a double murder case A comparison of Garmin’s privacy with other brands including Fitbit, Apple, and Samsung Understand the security and privacy implications of wearable device data Advice for Garmin users on securing their watch Introduction Related to my last post which detailed forensic techniques for recovering data in smart watches, this p

article thumbnail

Enterprises are hitting a 'speed limit' in deploying Gen AI - here's why

Zero Day

Many C-suite executives have been cheerleaders for their company's work in AI despite slow progress, finds Deloitte's latest survey.

94
article thumbnail

Multiple Git flaws led to credentials compromise

Security Affairs

Vulnerabilities in the Git credential retrieval protocol could have allowed threat actors to access user credentials. Security researcher RyotaK from GMO Flatt Security Inc discovered multiple v ulnerabilities in the Git credential retrieval protocol that could have allowed threat actors to access user credentials. The vulnerabilities stem from the improper handling of messages in Gits credential retrieval protocol.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.