Fri.Jan 03, 2025

article thumbnail

“Can you try a game I made?” Fake game sites lead to information stealers

Malwarebytes

The background and the IOCs for this blog were gathered by an Expert helper on our forums and Malwarebytes researchers. Our thanks go out to them. A new, malicious campaign is making the rounds online and it starts simple: Unwitting targets receive a direct message (DM) on a Discord server asking about their interest in beta testing a new videogame (targets can also receive a text message or an email).

Scams 141
article thumbnail

ShredOS

Schneier on Security

ShredOS is a stripped-down operating system designed to destroy data. GitHub page here.

288
288
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best of 2024: If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door 

Security Boulevard

Firewalls and VPN appliances are critical gateways. Like all on-prem systems, a vulnerability can lead to a compromise that is used to open the door for attackers. The post Best of 2024: If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door appeared first on Security Boulevard.

Firewall 119
article thumbnail

Richmond University Medical Center data breach impacted 674,033 individuals

Security Affairs

Richmond University Medical Center has confirmed that a ransomware attack in May 2023 affected 670,000 individuals. New York’s Richmond University Medical Center confirmed a May 2023 ransomware attack impacted 674,033 individuals. Richmond University Medical Center (RUMC) is a healthcare institution based in Staten Island, New York. It provides a wide range of medical services, including inpatient and outpatient care, emergency services, and specialty care in areas such as cardiology, onco

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How To Use SCP (Secure Copy) With SSH Key Authentication

Tech Republic Security

Here's how to use the secure copy command, in conjunction with ssh key authentication, for an even more secure means of copying files to your remote Linux servers.

article thumbnail

Around 3.3 million POP3 and IMAP mail servers lack TLS encryption

Security Affairs

Over 3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. ShadowServer researchers reported that around 3.3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol) are two protocols used to retrieve and manage emails from mail servers.

LifeWorks

More Trending

article thumbnail

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers

The Hacker News

A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol (LDAP) that could trigger a denial-of-service (DoS) condition. The out-of-bounds reads vulnerability is tracked as CVE-2024-49113 (CVSS score: 7.5).

142
142
article thumbnail

This Trusted App Helps Sluggish PCs Work Faster

Tech Republic Security

CCleaner speeds up sluggish PCs by clearing junk files, fixing registry issues, and optimizing performance.

Software 138
article thumbnail

New AI Jailbreak Method 'Bad Likert Judge' Boosts Attack Success Rates by Over 60%

The Hacker News

Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model's (LLM) safety guardrails and produce potentially harmful or malicious responses.

article thumbnail

How to clear your iPhone cache for a fresh (and faster) start in 2025

Zero Day

Cache and cookies can clog your browser and slow down your iPhone, but there's a simple way to bring your device back up to speed and give it a performance boost for the new year. Here's how.

132
132
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns

The Hacker News

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims.

article thumbnail

You've Made the Ascent to CISO. Now What?

SecureWorld News

Embrace the challenges of cybersecurity leadership For many of us in the security industry, it ' s the pinnacle of our career. You ' ve worked in the trenches. You've worked your way up, taking on bigger projects and teams. You've built your network. You've gone to events and dinners. And now, you finally got that call, to be a CISO at an organization.

CISO 110
article thumbnail

Facebook and Instagram Ads Push Gun Silencers Disguised as Car Parts

WIRED Threat Level

A network of Facebook pages has been advertising fuel filters that are actually meant to be used as silencers, which are heavily regulated by US law. Even US military officials are concerned.

article thumbnail

iOS 18.2 was killing my iPhone's battery until I turned off this feature

Zero Day

If your battery life has worsened since you upgraded to iOS 18, here's how I fixed the problem after weeks of tweaking my phone's settings.

110
110
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

The Hacker News

Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/execution.

VPN 104
article thumbnail

Could AI make you a billionaire in 2025?

Zero Day

Sam Altman recently said we could soon see a one-person billion-dollar company. I did some research, and what I found might surprise you.

104
104
article thumbnail

Magecart Attacks Surge as E-Commerce Security Struggles to Keep Pace

Security Boulevard

by Source Defense A new report by Recorded Futures Insikt Group reveals a concerning rise in Magecart attacks and e-skimming activity targeting online retailers. The research highlights how cybercriminals are evolving their tactics to bypass traditional, rather antiquated client-side security measures such as Content Security Policy (CSP) and compromise e-commerce platforms at an alarming rate.

Retail 103
article thumbnail

Siri's secret recordings lead to a $95 million settlement. Could you get a share?

Zero Day

The class action privacy suit contends that Siri recorded and shared Apple users' conversations. Apple isn't the only tech giant in the crosshairs of such legal action.

102
102
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What We Know About CVE-2024-49112 and CVE-2024-49113

Trend Micro

This blog entry provides an overview of CVE-2024-49112 and CVE-2024-49113 and includes information that IT and SOC professionals need to know to stay protected against possible exploitation.

101
101
article thumbnail

How IBM's blueprint for industry transformation leverages AI, 5G, and collaboration

Zero Day

In this exclusive talk with a senior IBM executive, learn about how AI, 5G, and groundbreaking partnerships are reshaping global industries.

102
102
article thumbnail

Californians Say X Blocked Them From Viewing Amber Alert About Missing 14 Year-Old

WIRED Threat Level

Many people reported they hit a screen preventing them from seeing the alert unless they signed in.

84
article thumbnail

CES 2025: What to expect and how to watch

Zero Day

As the world's largest tech conference devoted to consumer electronics, CES showcases the most innovative technology from leading companies worldwide.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Consent Phishing: The New, Smarter Way to Phish

Security Boulevard

What is consent phishing? Most people are familiar with the two most common types of phishingcredential phishing and phishing payloads, where attackers trick users into revealing credentials and downloading malicious software respectively. However, there is a third type of phishing on the rise: consent phishing. Consent phishing deceives users into granting a third-party SaaS application access to their account, enabling it to retrieve sensitive information or act on their behalf.

article thumbnail

How to program your iPhone's Action Button to summon ChatGPT's voice assistant

Zero Day

Unlike Siri, OpenAI Advanced Voice uses your phone's camera to understand your surroundings. If you have one of these iPhone models, here's how to get started.

99
article thumbnail

Top 10 SentinelOne Competitors & Alternatives in 2025 [Features, Pricing & Reviews]

Heimadal Security

SentinelOne shines in endpoint detection and response, but EDR is just one piece of the in-depth defense puzzle. Choosing the right cybersecurity solution is key to safeguarding your systems. To fully protect your network, cloud, or email, youll need more than what SentinelOne alone can offer. Thorough research can help you find a cybersecurity solution […] The post Top 10 SentinelOne Competitors & Alternatives in 2025 [Features, Pricing & Reviews] appeared first on Heimdal Secur

article thumbnail

7 rules to follow when setting up a home security camera - and where you should never install one

Zero Day

Whether you want to mount a new camera or move an existing one, follow these pointers to enhance performance and avoid problems.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

CVE-2024-56513: Karmada Vulnerability Grants Attackers Control of Kubernetes Systems

Penetration Testing

A high-severity vulnerability (CVE-2024-56513) has been identified in Karmada (Kubernetes Armada), a management platform designed to facilitate cloud-native The post CVE-2024-56513: Karmada Vulnerability Grants Attackers Control of Kubernetes Systems appeared first on Cybersecurity News.

article thumbnail

Is your live TV streaming service still worth it? I reassessed the options for us both

Zero Day

Curd cutting was supposed to save us from the cable monopoly, but those monthly bills keep going up. Are you really getting your money's worth out of that $90-plus subscription?

98
article thumbnail

Gary Marcus – Taming Silicon Valley | Starmus Highlights

We Live Security

The prominent AI researcher explores the societal impact of artificial intelligence and calls for a reimagined approach to AI development that avoids the dangers of surveillance capitalism

article thumbnail

I test smart home devices for a living, and this is my favorite smart thermostat

Zero Day

The latest Google Nest Learning Thermostat is the perfect example of a gorgeous piece of tech that works and promises to remain relevant.

98
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!