Fri.Jan 03, 2025

article thumbnail

ShredOS

Schneier on Security

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.

230
230
article thumbnail

How To Use SCP (Secure Copy) With SSH Key Authentication

Tech Republic Security

Here's how to use the secure copy command, in conjunction with ssh key authentication, for an even more secure means of copying files to your remote Linux servers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beware! Fake EditThisCookie Extension Steals User Data

Penetration Testing

EditThisCookie, a browser extension with over 3 million downloads, primarily used for editing local cookie files, has been The post Beware! Fake EditThisCookie Extension Steals User Data appeared first on Cybersecurity News.

article thumbnail

LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113

Security Affairs

Experts warn of a new PoC exploit, LDAPNightmare, that targets a Windows LDAP flaw (CVE-2024-49113), causing crashes & reboots. The vulnerability CVE-2024-49113 (CVSS score of 7.5), namedLDAPNightmare, is a Windows Lightweight Directory Access Protocol (LDAP) Denial of Service flaw that was discovered by the researcher Yuki Chen. An attacker can exploit the now-patched vulnerability to trigger a denial of service condition.

DNS 119
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Facebook and Instagram Ads Push Gun Silencers Disguised as Car Parts

WIRED Threat Level

A network of Facebook pages has been advertising fuel filters that are actually meant to be used as silencers, which are heavily regulated by US law. Even US military officials are concerned.

article thumbnail

How to clear your iPhone cache for a fresh (and faster) start in 2025

Zero Day

Cache and cookies can clog your browser and slow down your iPhone, but there's a simple way to bring your device back up to speed and give it a performance boost for the new year. Here's how.

130
130

More Trending

article thumbnail

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers

The Hacker News

A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition. The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5).

122
122
article thumbnail

This Trusted App Helps Sluggish PCs Work Faster

Tech Republic Security

CCleaner speeds up sluggish PCs by clearing junk files, fixing registry issues, and optimizing performance.

Software 118
article thumbnail

Best of 2024: If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door 

Security Boulevard

Firewalls and VPN appliances are critical gateways. Like all on-prem systems, a vulnerability can lead to a compromise that is used to open the door for attackers. The post Best of 2024: If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door appeared first on Security Boulevard.

Firewall 114
article thumbnail

iOS 18.2 was killing my iPhone's battery until I turned off this feature

Zero Day

If your battery life has worsened since you upgraded to iOS 18, here's how I fixed the problem after weeks of tweaking my phone's settings.

110
110
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New AI Jailbreak Method 'Bad Likert Judge' Boosts Attack Success Rates by Over 60%

The Hacker News

Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model's (LLM) safety guardrails and produce potentially harmful or malicious responses.

article thumbnail

Californians Say X Blocked Them From Viewing Amber Alert About Missing 14 Year-Old

WIRED Threat Level

Many people reported they hit a screen preventing them from seeing the alert unless they signed in.

107
107
article thumbnail

Could AI make you a billionaire in 2025?

Zero Day

Sam Altman recently said we could soon see a one-person billion-dollar company. I did some research, and what I found might surprise you.

102
102
article thumbnail

Richmond University Medical Center data breach impacted 674,033 individuals

Security Affairs

Richmond University Medical Center has confirmed that a ransomware attack in May 2023 affected 670,000 individuals. New York’s Richmond University Medical Center confirmed a May 2023 ransomware attack impacted 674,033 individuals. Richmond University Medical Center (RUMC) is a healthcare institution based in Staten Island, New York. It provides a wide range of medical services, including inpatient and outpatient care, emergency services, and specialty care in areas such as cardiology, onco

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Siri's secret recordings lead to a $95 million settlement. Could you get a share?

Zero Day

The class action privacy suit contends that Siri recorded and shared Apple users' conversations. Apple isn't the only tech giant in the crosshairs of such legal action.

102
102
article thumbnail

Magecart Attacks Surge as E-Commerce Security Struggles to Keep Pace

Security Boulevard

by Source Defense A new report by Recorded Futures Insikt Group reveals a concerning rise in Magecart attacks and e-skimming activity targeting online retailers. The research highlights how cybercriminals are evolving their tactics to bypass traditional, rather antiquated client-side security measures such as Content Security Policy (CSP) and compromise e-commerce platforms at an alarming rate.

Retail 90
article thumbnail

How IBM's blueprint for industry transformation leverages AI, 5G, and collaboration

Zero Day

In this exclusive talk with a senior IBM executive, learn about how AI, 5G, and groundbreaking partnerships are reshaping global industries.

102
102
article thumbnail

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns

The Hacker News

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

CES 2025: What to expect and how to watch

Zero Day

As the world's largest tech conference devoted to consumer electronics, CES showcases the most innovative technology from leading companies worldwide.

article thumbnail

You've Made the Ascent to CISO. Now What?

SecureWorld News

Embrace the challenges of cybersecurity leadership For many of us in the security industry, it ' s the pinnacle of our career. You ' ve worked in the trenches. You've worked your way up, taking on bigger projects and teams. You've built your network. You've gone to events and dinners. And now, you finally got that call, to be a CISO at an organization.

CISO 86
article thumbnail

How to program your iPhone's Action Button to summon ChatGPT's voice assistant

Zero Day

Unlike Siri, OpenAI Advanced Voice uses your phone's camera to understand your surroundings. If you have one of these iPhone models, here's how to get started.

99
article thumbnail

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

The Hacker News

Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution.

VPN 82
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

7 rules to follow when setting up a home security camera - and where you should never install one

Zero Day

Whether you want to mount a new camera or move an existing one, follow these pointers to enhance performance and avoid problems.

98
article thumbnail

Around 3.3 million POP3 and IMAP mail servers lack TLS encryption

Security Affairs

Over 3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. ShadowServer researchers reported that around 3.3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol) are two protocols used to retrieve and manage emails from mail servers.

article thumbnail

Is your live TV streaming service still worth it? I reassessed the options for us both

Zero Day

Curd cutting was supposed to save us from the cable monopoly, but those monthly bills keep going up. Are you really getting your money's worth out of that $90-plus subscription?

98
article thumbnail

CVE-2024-56513: Karmada Vulnerability Grants Attackers Control of Kubernetes Systems

Penetration Testing

A high-severity vulnerability (CVE-2024-56513) has been identified in Karmada (Kubernetes Armada), a management platform designed to facilitate cloud-native The post CVE-2024-56513: Karmada Vulnerability Grants Attackers Control of Kubernetes Systems appeared first on Cybersecurity News.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

I test smart home devices for a living, and this is my favorite smart thermostat

Zero Day

The latest Google Nest Learning Thermostat is the perfect example of a gorgeous piece of tech that works and promises to remain relevant.

98
article thumbnail

Imperva’s Wildest 2025 AppSec Predictions

Security Boulevard

Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated with cool names like Nostradamus and The Amazing Kreskin. Nostradamus made his fame on predictions about the distant future, but that technique has [] The post Impervas Wildest 2025 AppSec Predictions appeared first on Blog.

article thumbnail

LG's new Gram Pro laptops compete with MacBook Air with thinner-than-ever designs

Zero Day

LG's 2025 Gram Pro laptops feature the company's first-ever Copilot+ PC, armed with the 'Lunar Lake' Intel Core Ultra processor.

91
article thumbnail

Consent Phishing: The New, Smarter Way to Phish

Security Boulevard

What is consent phishing? Most people are familiar with the two most common types of phishingcredential phishing and phishing payloads, where attackers trick users into revealing credentials and downloading malicious software respectively. However, there is a third type of phishing on the rise: consent phishing. Consent phishing deceives users into granting a third-party SaaS application access to their account, enabling it to retrieve sensitive information or act on their behalf.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.