Fri.Nov 22, 2024

article thumbnail

Meta takes down more than 2 million accounts in fight against pig butchering

Malwarebytes

Meta provided insight this week into the company’s efforts in taking down more than 2 million accounts that were connected to pig butchering scams on their owned platforms, Facebook and Instagram. Pig butchering scams are big business, with hundreds of millions of dollars involved every year. The numbers are not precise because some researchers see these scams as a special kind of romance scam , while others classify them as investment fraud , muddying the numbers based on which group is c

article thumbnail

CISA Sounds the Alarm on Actively Exploited Apple and Oracle Zero-Days

Penetration Testing

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about three actively exploited vulnerabilities affecting Apple and Oracle products. These flaws, added to CISA’s Known Exploited Vulnerabilities... The post CISA Sounds the Alarm on Actively Exploited Apple and Oracle Zero-Days appeared first on Cybersecurity News.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Justice Department Cracks Down on Scattered Spider Phishing Ring

SecureWorld News

The United States Department of Justice (DOJ) has unsealed charges against five individuals accused of orchestrating sophisticated phishing campaigns tied to the notorious Scattered Spider cybercrime group. The attacks have resulted in millions of dollars in theft, including cryptocurrency and sensitive corporate data, showcasing the ongoing threat of organized cybercrime.

Phishing 103
article thumbnail

U.S. Agencies Seize Four North Korean IT Worker Scam Websites

Security Boulevard

U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies. The post U.S. Agencies Seize Four North Korean IT Worker Scam Websites appeared first on Security Boulevard.

Scams 112
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CISA: BianLian Ransomware Focus Switches to Data Theft

Heimadal Security

The FBI, the Australian Cyber Security Centre, and the U.S. Cybersecurity & Infrastructure Security Agency have issued a new advisory stating that the BianLian ransomware operation has changed its strategy and is now predominantly a data theft extortion gang. The same agencies issued a joint advisory in May that warned about BianLian’s shifting tactics, which […] The post CISA: BianLian Ransomware Focus Switches to Data Theft appeared first on Heimdal Security Blog.

article thumbnail

Nile Releases Zero Trust-as-a-Service Aimed at Delivering Ransomware Protection Natively Without Operational Headaches

Security Boulevard

Nile is working to make Local Area Network (LAN) invulnerable by design; its latest effort to stop ransomware and lateral movement attacks. The networking-as-a-service vendor, on Thursday, announced the launch of Nile Trust Service, an add-on solution that it said will end the need to deploy a medley of localized point security solutions and provide.

LifeWorks

More Trending

article thumbnail

How Effective Network Management Enhances Collaboration Between IT and Security Teams

Security Boulevard

For small and mid-size businesses (SMBs), balancing IT and security resources can be both challenging and essential. With limited resources and personnel, SMBs often rely on multifunctional roles and streamlined operations. The post How Effective Network Management Enhances Collaboration Between IT and Security Teams appeared first on Security Boulevard.

article thumbnail

U.S. CISA adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Oracle Agile PLM bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-44308 Apple Multiple Products Code Execution Vulnerability CVE-2024-44309 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability CVE-2024-21287 Oracle Agile Product Lifecycle Man

Spyware 64
article thumbnail

The Race is on to Solve the Quantum Computing Security Challenge

Security Boulevard

Quantum computing has long been a topic of intense research and debate, particularly regarding its potential impact on current cryptographic systems. The post The Race is on to Solve the Quantum Computing Security Challenge appeared first on Security Boulevard.

article thumbnail

CVE-2024-8811: WinZip Flaw Allows Malicious Code Execution

Penetration Testing

Security researchers have uncovered a critical vulnerability in WinZip, a widely-used file archiving tool, that could allow attackers to bypass crucial security measures and potentially execute malicious code on users’... The post CVE-2024-8811: WinZip Flaw Allows Malicious Code Execution appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Customer Adoption Journey of Cisco Secure Workload

Cisco Security

Explore the customer adoption journey of Cisco Secure Workload, with key stages and best practices for successful implementation highlighted.

145
145
article thumbnail

Video: How to Protect Your Online Identity with a Password Manager

eSecurity Planet

In this video, we’ll explain why safeguarding your online identity is essential, as well as how password managers work, their advantages, and how to pick the right one. By the end, you’ll be ready to enhance your security to protect your online identity and personal information. The post Video: How to Protect Your Online Identity with a Password Manager appeared first on eSecurity Planet.

article thumbnail

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign

The Hacker News

A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for follow-on information collection.

Media 134
article thumbnail

Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack

WIRED Threat Level

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Hacking 132
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

The Hacker News

The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asynshell. The attack campaign is said to have used Hajj-themed lures to trick victims into executing a malicious payload under the guise of a Microsoft Compiled HTML Help (CHM) file, the Knownsec 404 team said in an analysis published today.

Malware 131
article thumbnail

This new YouTube tool adds AI backgrounds to your videos instantly - for free

Zero Day

YouTube's AI-generated feature enables users to add images or videos to the background of their Shorts using text-to-image prompts.

118
118
article thumbnail

Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

The Hacker News

Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future's Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0063, which, in turn, overlaps with APT28.

Malware 128
article thumbnail

One year later: 7 useful things the Flipper Zero can do that still blows my mind

Zero Day

This weird little device blew up on TikTok, but there's more to it than what lies on the surface. Here are some of the most useful features I've discovered.

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks

The Hacker News

Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams, fraud, and phishing attacks.

article thumbnail

Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle

Zero Day

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $55 for a limited time.

111
111
article thumbnail

Email Phishing and DMARC Statistics

Security Boulevard

Discover key phishing trends, tactics, and their impact on industries worldwide. Learn about the power of DMARC and how it can save your business. The post Email Phishing and DMARC Statistics appeared first on Security Boulevard.

Phishing 109
article thumbnail

This gadget can help you drive safer and save money (and get 20% off for Black Friday)

Zero Day

Maintaining the correct tire pressure on your vehicle not only helps you save on gas, but also makes driving safer. Stay properly inflated with the Syncwire Tire Inflator.

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

5 Common Pitfalls to Avoid With Zero-Trust

Security Boulevard

Implementing zero-trust is not straightforward — security teams can overlook critical items that impact zero-trust initiatives and limit their effectiveness. The post 5 Common Pitfalls to Avoid With Zero-Trust appeared first on Security Boulevard.

article thumbnail

AI isn't hitting a wall, it's just getting too smart for benchmarks, says Anthropic

Zero Day

As their self-correction and self-reasoning improve, the latest LLMs find new capabilities at a rate that makes it harder to measure everything they can do.

109
109
article thumbnail

The Customer Adoption Journey of Cisco Secure Workload

Cisco Security

Explore the customer adoption journey of Cisco Secure Workload, with key stages and best practices for successful implementation highlighted. Explore the customer adoption journey of Cisco Secure Workload, with key stages and best practices for successful implementation highlighted.

101
101
article thumbnail

Two free ways to get a Perplexity Pro subscription for one year

Zero Day

You can get free access to this top AI chatbot if you fall into one of two categories.

102
102
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?

The Hacker News

Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and collaboration tools. This single-platform approach makes it easy for teams to connect and work efficiently, no matter where they are, enabling seamless digital transformation that’s both scalable and adaptable.

article thumbnail

Claude AI can analyze your Google Docs and offer feedback now

Zero Day

There are a few caveats to consider but this could be a major productivity enhancer for people who use Claude and Docs.

97
article thumbnail

300,000 Forced to Scam: Meta’s Report Reveals Staggering Scale of “Pig Butchering”

Penetration Testing

In a recent report, Meta detailed its efforts to combat the organized crime networks behind “pig butchering” scams and other fraudulent activities. These scams, often perpetrated through forced labor in... The post 300,000 Forced to Scam: Meta’s Report Reveals Staggering Scale of “Pig Butchering” appeared first on Cybersecurity News.

Scams 69
article thumbnail

I tried Google's suggested uses of Gemini Live - and one immediately stood out

Zero Day

Some use cases are good, while others fall short. Here is a ranked list of the most to least helpful use cases for Gemini Live.

97
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!