Mon.Aug 26, 2024

article thumbnail

US Federal Court Rules Against Geofence Warrants

Schneier on Security

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary—are unconstitutional. The decision seems obvious to me, but you can’t take anything for granted.

article thumbnail

CyberGhost vs NordVPN (2024): Which VPN Should You Choose?

Tech Republic Security

While CyberGhost VPN’s optimized servers bring a lot of value, NordVPN’s more consistent speed performance and extensive feature inclusions give it the slight edge.

VPN 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063

Penetration Testing

In a significant development for cybersecurity professionals, security researcher Ynwarcs has published an in-depth analysis and proof-of-concept (PoC) exploit code for a critical zero-click CVE-2024-38063 vulnerability in Windows TCP/IP. This... The post Zero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063 appeared first on Cybersecurity News.

article thumbnail

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

The Hacker News

Google has revealed that a security flaw that was patched as part of a security update rolled out last week to its Chrome browser has come under active exploitation in the wild. Tracked as CVE-2024-7965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-6386 (CVSS 9.9) in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks

Penetration Testing

A severe security flaw (CVE-2024-6386, CVSS 9.9) has been discovered in the widely-used WPML plugin for WordPress, potentially exposing over one million websites to the risk of complete takeover. The... The post CVE-2024-6386 (CVSS 9.9) in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks appeared first on Cybersecurity News.

Risk 143
article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

The Last Watchdog

As our world becomes increasingly interconnected, the security of Operational Technology (OT) and Internet of Things (IoT) devices is more critical than ever. New findings from Forescout ­– Vedere Labs , the industry leader in device intelligence, and Finite State , an industry leader in software supply chain security, emphasize the critical state of software supply chains in OT and IoT routers, revealing widespread vulnerabilities.

Firmware 100

More Trending

article thumbnail

SonicWall addressed an improper access control issue in its firewalls

Security Affairs

SonicWall addressed a critical flaw in its firewalls that could allow attackers to achieve unauthorized access to the devices. SonicWall has released security updates to address a critical vulnerability, tracked as CVE-2024-40766 (CVSS score: 9.3), in its firewalls. The vulnerability is an improper access control issue that resides in the SonicWall SonicOS management access. “An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentiall

Firewall 125
article thumbnail

Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

The Hacker News

Details have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling. "ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface," security researcher Johann Rehberger said.

118
118
article thumbnail

The Dutch Data Protection Authority (DPA) has fined Uber a record €290M

Security Affairs

The Dutch Data Protection Authority (DPA) has fined Uber a record €290M for violating the EU data protection regulation while sending sensitive driver data to the U.S. The Dutch Data Protection Authority (DPA) has fined Uber €290 million ($324 million) for allegedly failing to comply with the EU data protection regulation GPDR when transferring the personal data of European taxi drivers to the U.S. “The Dutch Data Protection Authority (DPA) imposes a fine of 290 million euros on Uber.

Hacking 129
article thumbnail

SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access

The Hacker News

SonicWall has released security updates to address a critical flaw impacting its firewalls that, if successfully exploited, could grant malicious actors unauthorized access to the devices. The vulnerability, tracked as CVE-2024-40766 (CVSS score: 9.3), has been described as an improper access control bug.

Firewall 116
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring

Penetration Testing

Centreon, a widely-used open-source monitoring solution, has issued a critical security bulletin addressing multiple SQL injection vulnerabilities in its Centreon Web interface. These vulnerabilities, identified as CVE-2024-32501, CVE-2024-33852, CVE-2024-33853, CVE-2024-33854,... The post Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring appeared first on Cybersecurity News.

article thumbnail

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

The Hacker News

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities that could be exploited to target MLOps platforms.

Software 115
article thumbnail

PSA: These ‘Microsoft Support’ ploys may just fool you

Malwarebytes

Many people turn to their favorite search engine when they are facing an issue with their computer. One common search query is to look for the telephone number or contact form for Microsoft, Apple or one of many other brands. Scammers have long been interested in pretending to be Microsoft technical support. Years ago, inbound unsolicited calls were one of the most common techniques to bring in new victims.

Scams 103
article thumbnail

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

The Hacker News

Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.

114
114
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Port of Seattle, Including Sea-Tac Airport, Disrupted by Cyber Attack

SecureWorld News

The Port of Seattle, which oversees the Seattle-Tacoma International Airport (Sea-Tac), recently confirmed that a possible cyberattack disrupted several critical systems, including websites and phone services, beginning on August 24, 2024. Initially, the incident was reported as system outages, but it was later acknowledged that a cyberattack could be the cause.

article thumbnail

Dutch Regulator Fines Uber €290 Million for GDPR Violations in Data Transfers to U.S.

The Hacker News

The Dutch Data Protection Authority (DPA) has fined Uber a record €290 million ($324 million) for allegedly failing to comply with European Union (E.U.) data protection standards when sending sensitive driver data to the U.S. "The Dutch DPA found that Uber transferred personal data of European taxi drivers to the United States (U.S.

112
112
article thumbnail

Telegram CEO Pavel Durov’s Arrest Linked to Sweeping Criminal Investigation

WIRED Threat Level

French authorities detained Durov to question him as part of a probe into a wide range of alleged violations—including money laundering and CSAM—but it remains unclear if he will face charges.

Media 97
article thumbnail

Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration

The Hacker News

Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and encryption, and companies are often oblivious to the risk. A case in point: Disney suffered a devastating data leak by a hacktivist group known as NullBulge that got hold of over 1.2 terabytes of data from Disney's internal Slack messaging channels.

Hacking 99
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Pidgin Users Beware! Malicious Plugin Discovered with Keylogger

Penetration Testing

In a recent and alarming development, the popular messaging client Pidgin has removed a third-party plugin, “ss-otr,” from its plugin list after it was discovered to contain a malicious keylogger.... The post Pidgin Users Beware! Malicious Plugin Discovered with Keylogger appeared first on Cybersecurity News.

article thumbnail

Move over malware: Why one teen is more worried about AI (re-air) (Lock and Code S05E18)

Malwarebytes

This week on the Lock and Code podcast… Every age group uses the internet a little bit differently, and it turns out for at least one Gen Z teen in the Bay Area, the classic approach to cyberecurity—defending against viruses, ransomware, worms, and more—is the least of her concerns. Of far more importance is Artificial Intelligence (AI). Today, the Lock and Code podcast with host David Ruiz revisits a prior episode from 2023 about what teenagers fear the most about going online.

Malware 81
article thumbnail

Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971

Penetration Testing

In a significant update to its security advisory, Google has confirmed that CVE-2024-7965, a high-severity zero-day vulnerability in the Chrome browser, has been actively exploited in the wild. This revelation... The post Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971 appeared first on Cybersecurity News.

article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

Security Boulevard

As our world becomes increasingly interconnected, the security of Operational Technology (OT) and Internet of Things (IoT) devices is more critical than ever. New findings from Forescout ­– Vedere Labs , the industry leader in device intelligence, and Finite State … (more…) The post Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers first appeared on The Last Watchdog.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Uber Hit with €290 Million GDPR Fine by Dutch DPA

Penetration Testing

Uber, the renowned ride-hailing service provider, was recently hit with a record-breaking fine of €290 million by the Dutch privacy regulator for failing to comply with EU regulations by transferring... The post Uber Hit with €290 Million GDPR Fine by Dutch DPA appeared first on Cybersecurity News.

article thumbnail

Four Misconceptions about DDoS Testing

Security Boulevard

Most organizations already understand the importance of running a controlled DDoS attack to evaluate the resiliency of their application and to practice event response. However, there are still some misconceptions about the process, tools, and goals of DDoS testing. You can DIY – all you need is a DDoS attack tool There are many options […] The post Four Misconceptions about DDoS Testing appeared first on Security Boulevard.

DDOS 69
article thumbnail

A week in security (August 19 – August 25)

Malwarebytes

Last week on Malwarebytes Labs: Millennials’ sense of privacy uniquely tested in romantic relationships Hacked GPS tracker reveals location data of customers “We will hold them accountable”: General Motors sued for selling customer driving data to third parties Why you need to know about ransomware Toyota confirms customer and employee data stolen, says breach at third party to blame National Public Data leaked passwords online Man certifies his own (fake) death after hacking into re

article thumbnail

UPI Security: Best Practices for a Safe Digital Experience

Security Boulevard

UPI has redefined digital transactions as hassle-free like none other in India. However, with the growing popularity of this method, security breaches have been on the rise. Protect your UPI transactions to make your digital experience secure. This blog will discuss important UPI security best practices to secure your finances and personal data. UPI and […] The post UPI Security: Best Practices for a Safe Digital Experience first appeared on StrongBox IT.

64
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

CVE-2024-42531 (CVSS 9.8): Ezviz Camera Flaw Exposes Live Feeds to Unauthenticated Access

Penetration Testing

A critical vulnerability, identified as CVE-2024-42531 and rated with a CVSS score of 9.8 (Critical), has been discovered in the Ezviz Internet PT Camera CS-CV246. This flaw enables unauthorized individuals... The post CVE-2024-42531 (CVSS 9.8): Ezviz Camera Flaw Exposes Live Feeds to Unauthenticated Access appeared first on Cybersecurity News.

article thumbnail

Bootstrapping Growth: How B2B SaaS Startups Can Thrive on a Shoestring Budget

Security Boulevard

Fuel your B2B SaaS startup's growth without breaking the bank! Learn proven bootstrapping strategies to attract customers, generate revenue, and scale sustainably, even on a tight budget. The post Bootstrapping Growth: How B2B SaaS Startups Can Thrive on a Shoestring Budget appeared first on Security Boulevard.

B2B 64
article thumbnail

The 2-in-1 laptop that I recommend for college juggles work and play seamlessly

Zero Day

The Lenovo Yoga 7i is a sleek and versatile 2-in-1 that performs equally well however you use it, and portable enough to make a solid laptop for college.

97
article thumbnail

Gartner® Hype Cycle™ for Security Operations, 2024

Security Boulevard

While programs like CTEM may be upcoming, Gartner® Hype Cycle for Security Operations recommends making incremental shifts early on. The post Gartner® Hype Cycle™ for Security Operations, 2024 appeared first on SafeBreach. The post Gartner® Hype Cycle™ for Security Operations, 2024 appeared first on Security Boulevard.

64
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.