Wed.Jan 08, 2025

article thumbnail

SonicWall warns of an exploitable SonicOS vulnerability

Security Affairs

SonicWall warns customers to address an authentication bypass vulnerability in its firewall’s SonicOS that is “susceptible to actual exploitation.” SonicWall is urging customers to upgrade the SonicOS firmware of their firewalls to patch an authentication bypass vulnerability tracked as CVE-2024-53704 (CVSS score of 8.2). The vulnerability resides in SSL VPN and SSH management and according to the vendor is “susceptible to actual exploitation.” “We have identi

Firewall 114
article thumbnail

The $84 Million Fall of Stoli

SecureWorld News

The fall of Stoli, the vodka maker, shows how cyberattacks can push struggling companies over the edge. Here's what happened: In August 2024, Stoli got hit with ransomware. The attack knocked out their enterprise resource planning (ERP) system. They had to switch to manual operations for everythingeven basic accounting. Now, four months later, two U.S. parts of Stoli (Stoli USA and Kentucky Owl) have filed for bankruptcy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Insecure Medical Devices — Illumina DNA Sequencer Illuminates Risks

Security Boulevard

IEI-IEI, Oh: Running an obsolete OS, on obsolete hardware, configured with obsolete settings. The post Insecure Medical Devices Illumina DNA Sequencer Illuminates Risks appeared first on Security Boulevard.

Risk 125
article thumbnail

Understanding the U.S. Cyber Trust Mark: A New Era for IoT Security

SecureWorld News

The White House has officially launched the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program designed to help consumers make informed decisions about the security of their internet-connected devices. From baby monitors to home security systems, these IoT products have become integral to daily life, yet they also present significant cybersecurity risks.

IoT 117
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Green Bay Packers Retail Site Hacked, Data of 8,500 Customers Exposed

Security Boulevard

The data of more than 8,500 customers were exposed during an attack on the Green Bay Packers online retail website in which the hackers were able to bypass security measure and install malicious code, steal customers' names, addresses, and credit card information. The post Green Bay Packers Retail Site Hacked, Data of 8,500 Customers Exposed appeared first on Security Boulevard.

Retail 109
article thumbnail

Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

NetSpi Technical

While everyone has been rushing to jump on the AI bandwagon, there has been a steady rise in AI/ML platforms that can be used in cloud service providers to run your data experiments. One of these platforms is the Azure Machine Learning (AML) service. The service is useful for handling large data processing tasks, as it seamlessly integrates with other Azure services that can feed it data.

LifeWorks

More Trending

article thumbnail

Effective API Throttling for Enhanced API Security

Security Boulevard

APIs are the backbone of modern digital ecosystems, but their misuse can expose systems to cyber threats. Effective API throttling not only optimizes performance but also acts as a critical defense mechanism against abuse, such as denial-of-service attacks. Discover how this powerful strategy enhances API security and safeguards your organizations data in an interconnected world. [.

article thumbnail

Autonomous businesses will be powered by AI agents

Zero Day

The Accenture Technology Vision 2025 report explores how AI-powered autonomy is shaping technology development, customer experience, the physical world, and the future workforce, where people and AI agents work together to drive customer success.

article thumbnail

How Hacker's hack Android Devices

Hacker's King

In this digital world, Android users can be found in bulk. Android devices are popular among this generation as they are quite affordable and provide flexibility with customizable features and access to diverse applications. Android devices can be appropriately called the most preferred devices. One main reason behind their popularity as they are compatible with multiple brands leading to their popularity.

Hacking 52
article thumbnail

Breach Readiness and Business Continuity Planning

Security Boulevard

I recently caught up with Karissa Breen, the founder of KBI.Media, and we got straight into our topic: What is breach readiness and business continuity planning in complex environments? Everyone talks about having a plan, but actually putting it into action, especially when youre under attack, is a completely different story. Realities of Breach Readiness [] The post Breach Readiness and Business Continuity Planning appeared first on ColorTokens.

59
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws

The Hacker News

The European General Court on Wednesday fined the European Commission, the primary executive arm of the European Union responsible for proposing and enforcing laws for member states, for violating the bloc's own data privacy regulations. The development marks the first time the Commission has been held liable for infringing stringent data protection laws in the region.

article thumbnail

CVE-2024-5594 (CVSS 9.1): Critical Vulnerability in OpenVPN Enables Code Execution

Penetration Testing

The open-source VPN software OpenVPN has patched three significant vulnerabilities in OpenVPN 2.6.11, released on June 21, 2024. The post CVE-2024-5594 (CVSS 9.1): Critical Vulnerability in OpenVPN Enables Code Execution appeared first on Cybersecurity News.

VPN 136
article thumbnail

Top 5 Malware Threats to Prepare Against in 2025

The Hacker News

2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance.

Malware 140
article thumbnail

Update Chrome and Firefox now to patch these critical security flaws

Zero Day

The latest updates for both browsers squash several high-severity security bugs. Here's how to grab them.

134
134
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks

The Hacker News

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

DDOS 140
article thumbnail

How to install an LLM on MacOS (and why you should)

Zero Day

If you like the idea of AI but don't want to share your content or information with a third party, you can always install an LLM on your Apple desktop or laptop. You'll be surprised at how easy it is.

134
134
article thumbnail

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques

The Hacker News

Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. "The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques," Cyfirma said in a technical analysis published last week.

Malware 137
article thumbnail

Dell just took a leap of faith by renaming its entire laptop portfolio - and it might just work out

Zero Day

This week at CES 2025, Dell revealed the Pro series will be its new flagship line - while bringing back an old favorite.

128
128
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections

The Hacker News

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.

article thumbnail

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Trend Micro

Our blog entry discusses a fake PoC exploit for LDAPNightmare (CVE-2024-49113) that is being used to distribute information-stealing malware.

Malware 127
article thumbnail

FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance

The Hacker News

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices. "IoT products can be susceptible to a range of security vulnerabilities," the U.S. Federal Communications Commission (FCC) said.

IoT 136
article thumbnail

The best AI tech of CES 2025: Neural wristbands, smart mirrors and more

Zero Day

AI was featured in nearly every consumer tech category at CES. Here's what stood out.

126
126
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure

The Hacker News

Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning mid-December 2024. The security vulnerability in question is CVE-2025-0282 (CVSS score: 9.0), a stack-based buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.

134
134
article thumbnail

This $200 Android is the only smartphone at CES that you should care about

Zero Day

TCL's CES mobile lineup includes the TCL 60 XE Nxtpaper 5G, an Android handset with a brilliant display and competitive price point.

Mobile 125
article thumbnail

An Insight on Whatsapp Call Crash Bug

Hacker's King

This digital world has become so advanced, that contacting people has become a swift task. Messaging is one of the most convenient ways to contact people; hence, WhatsApp is the most reliable social platform for this task, globally accepted by everyone. WhatsApp always believes in adapting the latest technology and implementing it. Even the most advanced app, like WhatsApp , is not immune to bugs.

article thumbnail

Audio-Technica is turning the tables with new earbuds offering 65 hours of playback

Zero Day

The audio brand Audio-Technica announced the new ATH-CKS50TW2 earbuds at CES 2025.

122
122
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

CVE-2025-0282 (CVSS 9.0): Ivanti Confirms Active Exploitation of Critical Flaw

Penetration Testing

Ivanti has issued a security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and Neurons for The post CVE-2025-0282 (CVSS 9.0): Ivanti Confirms Active Exploitation of Critical Flaw appeared first on Cybersecurity News.

article thumbnail

Nvidia Project Digits: A Linux-powered desktop for AI developers

Zero Day

The most powerful desktop of all time will be arriving soon - and it will be running Linux.

122
122
article thumbnail

Rethinking Incident Response: How Organizations Can Avoid Budget Overruns and Delays 

Security Boulevard

Victim organizations need more effective tools and strategies to streamline incident response and mitigate financial fallout. The post Rethinking Incident Response: How Organizations Can Avoid Budget Overruns and Delays appeared first on Security Boulevard.

article thumbnail

The best smart home tech of CES 2025

Zero Day

Smart home tech is one of the main events at CES and we've gathered the best you can find at the showcase.

119
119
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!