Mon.Aug 26, 2024

article thumbnail

US Federal Court Rules Against Geofence Warrants

Schneier on Security

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary—are unconstitutional. The decision seems obvious to me, but you can’t take anything for granted.

article thumbnail

CyberGhost vs NordVPN (2024): Which VPN Should You Choose?

Tech Republic Security

While CyberGhost VPN’s optimized servers bring a lot of value, NordVPN’s more consistent speed performance and extensive feature inclusions give it the slight edge.

VPN 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063

Penetration Testing

In a significant development for cybersecurity professionals, security researcher Ynwarcs has published an in-depth analysis and proof-of-concept (PoC) exploit code for a critical zero-click CVE-2024-38063 vulnerability in Windows TCP/IP. This... The post Zero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063 appeared first on Cybersecurity News.

article thumbnail

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

The Hacker News

Google has revealed that a security flaw that was patched as part of a security update rolled out last week to its Chrome browser has come under active exploitation in the wild. Tracked as CVE-2024-7965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CVE-2024-6386 (CVSS 9.9) in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks

Penetration Testing

A severe security flaw (CVE-2024-6386, CVSS 9.9) has been discovered in the widely-used WPML plugin for WordPress, potentially exposing over one million websites to the risk of complete takeover. The... The post CVE-2024-6386 (CVSS 9.9) in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks appeared first on Cybersecurity News.

Risk 143
article thumbnail

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

The Hacker News

Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.

139
139

More Trending

article thumbnail

Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

The Hacker News

Details have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling. "ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface," security researcher Johann Rehberger said.

138
138
article thumbnail

The Dutch Data Protection Authority (DPA) has fined Uber a record €290M

Security Affairs

The Dutch Data Protection Authority (DPA) has fined Uber a record €290M for violating the EU data protection regulation while sending sensitive driver data to the U.S. The Dutch Data Protection Authority (DPA) has fined Uber €290 million ($324 million) for allegedly failing to comply with the EU data protection regulation GPDR when transferring the personal data of European taxi drivers to the U.S. “The Dutch Data Protection Authority (DPA) imposes a fine of 290 million euros on Uber.

Hacking 136
article thumbnail

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

The Hacker News

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities that could be exploited to target MLOps platforms.

Software 138
article thumbnail

SonicWall addressed an improper access control issue in its firewalls

Security Affairs

SonicWall addressed a critical flaw in its firewalls that could allow attackers to achieve unauthorized access to the devices. SonicWall has released security updates to address a critical vulnerability, tracked as CVE-2024-40766 (CVSS score: 9.3), in its firewalls. The vulnerability is an improper access control issue that resides in the SonicWall SonicOS management access. “An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentiall

Firewall 132
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access

The Hacker News

SonicWall has released security updates to address a critical flaw impacting its firewalls that, if successfully exploited, could grant malicious actors unauthorized access to the devices. The vulnerability, tracked as CVE-2024-40766 (CVSS score: 9.3), has been described as an improper access control bug.

Firewall 138
article thumbnail

PSA: These ‘Microsoft Support’ ploys may just fool you

Malwarebytes

Many people turn to their favorite search engine when they are facing an issue with their computer. One common search query is to look for the telephone number or contact form for Microsoft, Apple or one of many other brands. Scammers have long been interested in pretending to be Microsoft technical support. Years ago, inbound unsolicited calls were one of the most common techniques to bring in new victims.

Scams 132
article thumbnail

Dutch Regulator Fines Uber €290 Million for GDPR Violations in Data Transfers to U.S.

The Hacker News

The Dutch Data Protection Authority (DPA) has fined Uber a record €290 million ($324 million) for allegedly failing to comply with European Union (E.U.) data protection standards when sending sensitive driver data to the U.S. "The Dutch DPA found that Uber transferred personal data of European taxi drivers to the United States (U.S.

137
137
article thumbnail

Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring

Penetration Testing

Centreon, a widely-used open-source monitoring solution, has issued a critical security bulletin addressing multiple SQL injection vulnerabilities in its Centreon Web interface. These vulnerabilities, identified as CVE-2024-32501, CVE-2024-33852, CVE-2024-33853, CVE-2024-33854,... The post Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration

The Hacker News

Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and encryption, and companies are often oblivious to the risk. A case in point: Disney suffered a devastating data leak by a hacktivist group known as NullBulge that got hold of over 1.2 terabytes of data from Disney's internal Slack messaging channels.

Hacking 128
article thumbnail

Miggio Uncovers AWS Load Balancer Security Flaw

Security Boulevard

Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than 15,000 potentially vulnerable applications. The post Miggio Uncovers AWS Load Balancer Security Flaw appeared first on Security Boulevard.

article thumbnail

Move over malware: Why one teen is more worried about AI (re-air) (Lock and Code S05E18)

Malwarebytes

This week on the Lock and Code podcast… Every age group uses the internet a little bit differently, and it turns out for at least one Gen Z teen in the Bay Area, the classic approach to cyberecurity—defending against viruses, ransomware, worms, and more—is the least of her concerns. Of far more importance is Artificial Intelligence (AI). Today, the Lock and Code podcast with host David Ruiz revisits a prior episode from 2023 about what teenagers fear the most about going online.

Malware 117
article thumbnail

Port of Seattle, Including Sea-Tac Airport, Disrupted by Cyber Attack

SecureWorld News

The Port of Seattle, which oversees the Seattle-Tacoma International Airport (Sea-Tac), recently confirmed that a possible cyberattack disrupted several critical systems, including websites and phone services, beginning on August 24, 2024. Initially, the incident was reported as system outages, but it was later acknowledged that a cyberattack could be the cause.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

The Last Watchdog

As our world becomes increasingly interconnected, the security of Operational Technology (OT) and Internet of Things (IoT) devices is more critical than ever. New findings from Forescout ­– Vedere Labs , the industry leader in device intelligence, and Finite State , an industry leader in software supply chain security, emphasize the critical state of software supply chains in OT and IoT routers, revealing widespread vulnerabilities.

Firmware 100
article thumbnail

Pidgin Users Beware! Malicious Plugin Discovered with Keylogger

Penetration Testing

In a recent and alarming development, the popular messaging client Pidgin has removed a third-party plugin, “ss-otr,” from its plugin list after it was discovered to contain a malicious keylogger.... The post Pidgin Users Beware! Malicious Plugin Discovered with Keylogger appeared first on Cybersecurity News.

article thumbnail

A week in security (August 19 – August 25)

Malwarebytes

Last week on Malwarebytes Labs: Millennials’ sense of privacy uniquely tested in romantic relationships Hacked GPS tracker reveals location data of customers “We will hold them accountable”: General Motors sued for selling customer driving data to third parties Why you need to know about ransomware Toyota confirms customer and employee data stolen, says breach at third party to blame National Public Data leaked passwords online Man certifies his own (fake) death after hacking into re

article thumbnail

Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971

Penetration Testing

In a significant update to its security advisory, Google has confirmed that CVE-2024-7965, a high-severity zero-day vulnerability in the Chrome browser, has been actively exploited in the wild. This revelation... The post Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971 appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

What to expect from Meta Connect 2024: Affordable Quest 3, AR glasses, and more

Zero Day

Meta is expected to undercut the Vision Pro's price even more with its new VR headset and to show off a new wearable.

75
article thumbnail

Uber Hit with €290 Million GDPR Fine by Dutch DPA

Penetration Testing

Uber, the renowned ride-hailing service provider, was recently hit with a record-breaking fine of €290 million by the Dutch privacy regulator for failing to comply with EU regulations by transferring... The post Uber Hit with €290 Million GDPR Fine by Dutch DPA appeared first on Cybersecurity News.

article thumbnail

I tested Samsung's new Copilot+ PC, and it's one of the best Windows laptop deals right now

Zero Day

The Galaxy Book 4 Edge is a flagship laptop with a gorgeous display, impressive performance, and deep integration with Samsung's ecosystem of devices.

75
article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

Security Boulevard

As our world becomes increasingly interconnected, the security of Operational Technology (OT) and Internet of Things (IoT) devices is more critical than ever. New findings from Forescout ­– Vedere Labs , the industry leader in device intelligence, and Finite State … (more…) The post Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers first appeared on The Last Watchdog.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The 2-in-1 laptop that I recommend for college juggles work and play seamlessly

Zero Day

The Lenovo Yoga 7i is a sleek and versatile 2-in-1 that performs equally well however you use it, and portable enough to make a solid laptop for college.

75
article thumbnail

CVE-2024-42531 (CVSS 9.8): Ezviz Camera Flaw Exposes Live Feeds to Unauthenticated Access

Penetration Testing

A critical vulnerability, identified as CVE-2024-42531 and rated with a CVSS score of 9.8 (Critical), has been discovered in the Ezviz Internet PT Camera CS-CV246. This flaw enables unauthorized individuals... The post CVE-2024-42531 (CVSS 9.8): Ezviz Camera Flaw Exposes Live Feeds to Unauthenticated Access appeared first on Cybersecurity News.

article thumbnail

Four Misconceptions about DDoS Testing

Security Boulevard

Most organizations already understand the importance of running a controlled DDoS attack to evaluate the resiliency of their application and to practice event response. However, there are still some misconceptions about the process, tools, and goals of DDoS testing. You can DIY – all you need is a DDoS attack tool There are many options […] The post Four Misconceptions about DDoS Testing appeared first on Security Boulevard.

DDOS 69
article thumbnail

ARRL Confirms $1 Million Ransom Payment Following May Attack

Penetration Testing

The American Radio Relay League (ARRL) recently confirmed the payment of a $1 million ransom to restore its systems following a ransomware attack that occurred in May. Upon discovering the... The post ARRL Confirms $1 Million Ransom Payment Following May Attack appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.