Mon.Aug 26, 2024

article thumbnail

US Federal Court Rules Against Geofence Warrants

Schneier on Security

This is a big deal. A US Appeals Court ruled that geofence warrants—these are general warrants demanding information about all people within a geographical boundary—are unconstitutional. The decision seems obvious to me, but you can’t take anything for granted.

article thumbnail

CyberGhost vs NordVPN (2024): Which VPN Should You Choose?

Tech Republic Security

While CyberGhost VPN’s optimized servers bring a lot of value, NordVPN’s more consistent speed performance and extensive feature inclusions give it the slight edge.

VPN 171
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063

Penetration Testing

In a significant development for cybersecurity professionals, security researcher Ynwarcs has published an in-depth analysis and proof-of-concept (PoC) exploit code for a critical zero-click CVE-2024-38063 vulnerability in Windows TCP/IP. This... The post Zero-Click Windows RCE Threat: Researcher Publishes PoC Exploit for CVE-2024-38063 appeared first on Cybersecurity News.

article thumbnail

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

The Hacker News

Google has revealed that a security flaw that was patched as part of a security update rolled out last week to its Chrome browser has come under active exploitation in the wild. Tracked as CVE-2024-7965, the vulnerability has been described as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CVE-2024-6386 (CVSS 9.9) in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks

Penetration Testing

A severe security flaw (CVE-2024-6386, CVSS 9.9) has been discovered in the widely-used WPML plugin for WordPress, potentially exposing over one million websites to the risk of complete takeover. The... The post CVE-2024-6386 (CVSS 9.9) in WPML Plugin Exposes Millions of WordPress Sites to RCE Attacks appeared first on Cybersecurity News.

Risk 144
article thumbnail

Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

The Hacker News

Details have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of sensitive user information using a technique called ASCII smuggling. "ASCII Smuggling is a novel technique that uses special Unicode characters that mirror ASCII but are actually not visible in the user interface," security researcher Johann Rehberger said.

139
139

LifeWorks

More Trending

article thumbnail

SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access

The Hacker News

SonicWall has released security updates to address a critical flaw impacting its firewalls that, if successfully exploited, could grant malicious actors unauthorized access to the devices. The vulnerability, tracked as CVE-2024-40766 (CVSS score: 9.3), has been described as an improper access control bug.

Firewall 139
article thumbnail

Port of Seattle, Including Sea-Tac Airport, Disrupted by Cyber Attack

SecureWorld News

The Port of Seattle, which oversees the Seattle-Tacoma International Airport (Sea-Tac), recently confirmed that a possible cyberattack disrupted several critical systems, including websites and phone services, beginning on August 24, 2024. Initially, the incident was reported as system outages, but it was later acknowledged that a cyberattack could be the cause.

article thumbnail

Dutch Regulator Fines Uber €290 Million for GDPR Violations in Data Transfers to U.S.

The Hacker News

The Dutch Data Protection Authority (DPA) has fined Uber a record €290 million ($324 million) for allegedly failing to comply with European Union (E.U.) data protection standards when sending sensitive driver data to the U.S. "The Dutch DPA found that Uber transferred personal data of European taxi drivers to the United States (U.S.

138
138
article thumbnail

Miggio Uncovers AWS Load Balancer Security Flaw

Security Boulevard

Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than 15,000 potentially vulnerable applications. The post Miggio Uncovers AWS Load Balancer Security Flaw appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

The Hacker News

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities that could be exploited to target MLOps platforms.

Software 138
article thumbnail

Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring

Penetration Testing

Centreon, a widely-used open-source monitoring solution, has issued a critical security bulletin addressing multiple SQL injection vulnerabilities in its Centreon Web interface. These vulnerabilities, identified as CVE-2024-32501, CVE-2024-33852, CVE-2024-33853, CVE-2024-33854,... The post Centreon Issues Critical Security Update: SQL Injection Vulnerabilities Threaten IT Monitoring appeared first on Cybersecurity News.

article thumbnail

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

The Hacker News

Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.

138
138
article thumbnail

PSA: These ‘Microsoft Support’ ploys may just fool you

Malwarebytes

Many people turn to their favorite search engine when they are facing an issue with their computer. One common search query is to look for the telephone number or contact form for Microsoft, Apple or one of many other brands. Scammers have long been interested in pretending to be Microsoft technical support. Years ago, inbound unsolicited calls were one of the most common techniques to bring in new victims.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration

The Hacker News

Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and encryption, and companies are often oblivious to the risk. A case in point: Disney suffered a devastating data leak by a hacktivist group known as NullBulge that got hold of over 1.2 terabytes of data from Disney's internal Slack messaging channels.

Hacking 129
article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

The Last Watchdog

As our world becomes increasingly interconnected, the security of Operational Technology (OT) and Internet of Things (IoT) devices is more critical than ever. New findings from Forescout ­– Vedere Labs , the industry leader in device intelligence, and Finite State , an industry leader in software supply chain security, emphasize the critical state of software supply chains in OT and IoT routers, revealing widespread vulnerabilities.

Firmware 100
article thumbnail

Move over malware: Why one teen is more worried about AI (re-air) (Lock and Code S05E18)

Malwarebytes

This week on the Lock and Code podcast… Every age group uses the internet a little bit differently, and it turns out for at least one Gen Z teen in the Bay Area, the classic approach to cyberecurity—defending against viruses, ransomware, worms, and more—is the least of her concerns. Of far more importance is Artificial Intelligence (AI). Today, the Lock and Code podcast with host David Ruiz revisits a prior episode from 2023 about what teenagers fear the most about going online.

Malware 97
article thumbnail

Telegram CEO Pavel Durov’s Arrest Linked to Sweeping Criminal Investigation

WIRED Threat Level

French authorities detained Durov to question him as part of a probe into a wide range of alleged violations—including money laundering and CSAM—but it remains unclear if he will face charges.

Media 93
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Pidgin Users Beware! Malicious Plugin Discovered with Keylogger

Penetration Testing

In a recent and alarming development, the popular messaging client Pidgin has removed a third-party plugin, “ss-otr,” from its plugin list after it was discovered to contain a malicious keylogger.... The post Pidgin Users Beware! Malicious Plugin Discovered with Keylogger appeared first on Cybersecurity News.

article thumbnail

Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep.5)

We Live Security

The world of Android threats is quite vast and intriguing.

article thumbnail

Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971

Penetration Testing

In a significant update to its security advisory, Google has confirmed that CVE-2024-7965, a high-severity zero-day vulnerability in the Chrome browser, has been actively exploited in the wild. This revelation... The post Google Chrome Faces Double Blow with New Zero-Day Flaw Exploits: CVE-2024-7965 and CVE-2024-7971 appeared first on Cybersecurity News.

article thumbnail

What to expect from Meta Connect 2024: Affordable Quest 3, AR glasses, and more

Zero Day

Meta is expected to undercut the Vision Pro's price even more with its new VR headset and to show off a new wearable.

75
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers

Security Boulevard

As our world becomes increasingly interconnected, the security of Operational Technology (OT) and Internet of Things (IoT) devices is more critical than ever. New findings from Forescout ­– Vedere Labs , the industry leader in device intelligence, and Finite State … (more…) The post Guest Essay: The urgent need to improve firmware security — especially in OT and IoT routers first appeared on The Last Watchdog.

article thumbnail

I tested Samsung's new Copilot+ PC, and it's one of the best Windows laptop deals right now

Zero Day

The Galaxy Book 4 Edge is a flagship laptop with a gorgeous display, impressive performance, and deep integration with Samsung's ecosystem of devices.

75
article thumbnail

A week in security (August 19 – August 25)

Malwarebytes

Last week on Malwarebytes Labs: Millennials’ sense of privacy uniquely tested in romantic relationships Hacked GPS tracker reveals location data of customers “We will hold them accountable”: General Motors sued for selling customer driving data to third parties Why you need to know about ransomware Toyota confirms customer and employee data stolen, says breach at third party to blame National Public Data leaked passwords online Man certifies his own (fake) death after hacking into re

article thumbnail

The 2-in-1 laptop that I recommend for college juggles work and play seamlessly

Zero Day

The Lenovo Yoga 7i is a sleek and versatile 2-in-1 that performs equally well however you use it, and portable enough to make a solid laptop for college.

75
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Four Misconceptions about DDoS Testing

Security Boulevard

Most organizations already understand the importance of running a controlled DDoS attack to evaluate the resiliency of their application and to practice event response. However, there are still some misconceptions about the process, tools, and goals of DDoS testing. You can DIY – all you need is a DDoS attack tool There are many options […] The post Four Misconceptions about DDoS Testing appeared first on Security Boulevard.

DDOS 69
article thumbnail

CVE-2024-42531 (CVSS 9.8): Ezviz Camera Flaw Exposes Live Feeds to Unauthenticated Access

Penetration Testing

A critical vulnerability, identified as CVE-2024-42531 and rated with a CVSS score of 9.8 (Critical), has been discovered in the Ezviz Internet PT Camera CS-CV246. This flaw enables unauthorized individuals... The post CVE-2024-42531 (CVSS 9.8): Ezviz Camera Flaw Exposes Live Feeds to Unauthenticated Access appeared first on Cybersecurity News.

article thumbnail

UPI Security: Best Practices for a Safe Digital Experience

Security Boulevard

UPI has redefined digital transactions as hassle-free like none other in India. However, with the growing popularity of this method, security breaches have been on the rise. Protect your UPI transactions to make your digital experience secure. This blog will discuss important UPI security best practices to secure your finances and personal data. UPI and […] The post UPI Security: Best Practices for a Safe Digital Experience first appeared on StrongBox IT.

64
article thumbnail

ARRL Confirms $1 Million Ransom Payment Following May Attack

Penetration Testing

The American Radio Relay League (ARRL) recently confirmed the payment of a $1 million ransom to restore its systems following a ransomware attack that occurred in May. Upon discovering the... The post ARRL Confirms $1 Million Ransom Payment Following May Attack appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!