Wed.Jan 08, 2025

article thumbnail

US to Launch Cyber Trust Mark to Label Secure Smart Devices

Tech Republic Security

The Cyber Trust Mark will help consumers make more informed decisions about the cybersecurity of products, according to the White House.

article thumbnail

Autonomous businesses will be powered by AI agents

Zero Day

The Accenture Technology Vision 2025 report explores how AI-powered autonomy is shaping technology development, customer experience, the physical world, and the future workforce, where people and AI agents work together to drive customer success.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Cyber Trust Mark logo for smart devices is coming

Malwarebytes

The White House announced the launch of the US Cyber Trust Mark which aims to help buyers make an informed choice about the purchase of wireless internet-connected devices, such as baby monitors, doorbells, thermostats, and more. The cybersecurity labeling program for wireless consumer Internet of Things (IoT) products is voluntary but the participants include several major manufacturers, retailers, and trade associations for popular electronics, appliances, and consumer products.

Wireless 102
article thumbnail

Update Chrome and Firefox now to patch these critical security flaws

Zero Day

The latest updates for both browsers squash several high-severity security bugs. Here's how to grab them.

125
125
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks

The Hacker News

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks. The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

DDOS 118
article thumbnail

The best AI tech of CES 2025: Neural wristbands, smart mirrors and more

Zero Day

AI was featured in nearly every consumer tech category at CES. Here's what stood out.

119
119

More Trending

article thumbnail

Nvidia Project Digits: A Linux-powered desktop for AI developers

Zero Day

The most powerful desktop of all time will be arriving soon - and it will be running Linux.

116
116
article thumbnail

Insecure Medical Devices — Illumina DNA Sequencer Illuminates Risks

Security Boulevard

IEI-IEI, Oh: Running an obsolete OS, on obsolete hardware, configured with obsolete settings. The post Insecure Medical Devices Illumina DNA Sequencer Illuminates Risks appeared first on Security Boulevard.

Risk 113
article thumbnail

Audio-Technica is turning the tables with new earbuds offering 65 hours of playback

Zero Day

The audio brand Audio-Technica announced the new ATH-CKS50TW2 earbuds at CES 2025.

115
115
article thumbnail

CVE-2024-5594 (CVSS 9.1): Critical Vulnerability in OpenVPN Enables Code Execution

Penetration Testing

The open-source VPN software OpenVPN has patched three significant vulnerabilities in OpenVPN 2.6.11, released on June 21, 2024. The post CVE-2024-5594 (CVSS 9.1): Critical Vulnerability in OpenVPN Enables Code Execution appeared first on Cybersecurity News.

VPN 112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to install an LLM on MacOS (and why you should)

Zero Day

If you like the idea of AI but don't want to share your content or information with a third party, you can always install an LLM on your Apple desktop or laptop. You'll be surprised at how easy it is.

111
111
article thumbnail

Top 5 Malware Threats to Prepare Against in 2025

The Hacker News

2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance.

Malware 110
article thumbnail

Best laptops of CES 2025: These 5 Windows PCs left the biggest mark on the show floor

Zero Day

Our quest to go hands-on with every new laptop announced at CES has led us to these five picks, which stood out thanks to features, design, and value.

108
108
article thumbnail

FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance

The Hacker News

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices. "IoT products can be susceptible to a range of security vulnerabilities," the U.S. Federal Communications Commission (FCC) said.

IoT 110
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Gayfemboy Botnet targets Four-Faith router vulnerability

Security Affairs

Gayfemboy, a Mirai botnet variant, has been exploiting a flaw in Four-Faith industrial routers to launch DDoS attacks since November 2024. The Gayfemboy botnet was first identified in February 2024, it borrows the code from the basic Mirai variant and now integrates N-day and 0-day exploits. By November 2024, Gayfemboy exploited 0-day vulnerabilities in Four-Faith industrial routers and Neterbit routers and Vimar smart home devices, with over 15,000 daily active nodes.

DDOS 104
article thumbnail

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections

The Hacker News

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns. Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.

article thumbnail

The best smart home tech of CES 2025

Zero Day

Smart home tech is one of the main events at CES and we've gathered the best you can find at the showcase.

105
105
article thumbnail

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques

The Hacker News

Cybersecurity researchers have shed light on a new remote access trojan called NonEuclid that allows bad actors to remotely control compromised Windows systems. "The NonEuclid remote access trojan (RAT), developed in C#, is a highly sophisticated malware offering unauthorised remote access with advanced evasion techniques," Cyfirma said in a technical analysis published last week.

Malware 102
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Halliday just unveiled the AI glasses that Meta, Google and Apple have been trying to build

Zero Day

I tried Halliday's AI smart glasses at CES 2025. With a display that's built into the frame - not the lens - they beat my Ray-Ban Metas in key ways.

104
104
article thumbnail

Hijacking Azure Machine Learning Notebooks (via Storage Accounts)

NetSpi Technical

While everyone has been rushing to jump on the AI bandwagon, there has been a steady rise in AI/ML platforms that can be used in cloud service providers to run your data experiments. One of these platforms is the Azure Machine Learning (AML) service. The service is useful for handling large data processing tasks, as it seamlessly integrates with other Azure services that can feed it data.

article thumbnail

CES 2025: The 7 most advanced smart glasses we tried on - and loved

Zero Day

If these smart glasses are any indication of what we're in for in 2025, it's going to be a wild ride.

102
102
article thumbnail

CVE-2025-0282 (CVSS 9.0): Ivanti Confirms Active Exploitation of Critical Flaw

Penetration Testing

Ivanti has issued a security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and Neurons for The post CVE-2025-0282 (CVSS 9.0): Ivanti Confirms Active Exploitation of Critical Flaw appeared first on Cybersecurity News.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to protect yourself from phishing attacks in Chrome and Firefox

Zero Day

Phishing is a form of social engineering where attackers try to get you to reveal your sensitive information through malicious links, SMS, QR codes, and more. Here's how to protect yourself in Chrome and Firefox.

Phishing 102
article thumbnail

Understanding the U.S. Cyber Trust Mark: A New Era for IoT Security

SecureWorld News

The White House has officially launched the U.S. Cyber Trust Mark, a voluntary cybersecurity labeling program designed to help consumers make informed decisions about the security of their internet-connected devices. From baby monitors to home security systems, these IoT products have become integral to daily life, yet they also present significant cybersecurity risks.

IoT 85
article thumbnail

The best audio gear of CES 2025: Headphones, sound systems, and turntables to watch

Zero Day

CES 2025 is in full swing, and there are plenty of audio products to check out. From open-ear headphones to booming sound systems, there's audio gear for everyone this year.

102
102
article thumbnail

SonicWall warns of an exploitable SonicOS vulnerability

Security Affairs

SonicWall warns customers to address an authentication bypass vulnerability in its firewall’s SonicOS that is “susceptible to actual exploitation.” SonicWall is urging customers to upgrade the SonicOS firmware of their firewalls to patch an authentication bypass vulnerability tracked as CVE-2024-53704 (CVSS score of 8.2). The vulnerability resides in SSL VPN and SSH management and according to the vendor is “susceptible to actual exploitation.” “We have identi

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CES 2025: The 15 most impressive products so far

Zero Day

CES is in full swing, and we've seen major announcements from the likes of TCL, Roborock, MSI, and more. Here's our roundup of the new tech you don't want to miss.

100
100
article thumbnail

CVE-2024-54006 & CVE-2024-54007: Command Injection Flaws in HPE Aruba Devices, PoC Publicly Available

Penetration Testing

HPE Aruba Networking has issued a security advisory addressing multiple command injection vulnerabilities in its 501 Wireless Client The post CVE-2024-54006 & CVE-2024-54007: Command Injection Flaws in HPE Aruba Devices, PoC Publicly Available appeared first on Cybersecurity News.

article thumbnail

CES 2025: The 15 most impressive products you don't want to miss

Zero Day

We're at the final stretch of CES 2025, and we've seen major announcements from the likes of TCL, Roborock, Samsung, and more. Here's our roundup of the best tech you don't want to miss.

92
article thumbnail

Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure

The Hacker News

Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under active exploitation in the wild beginning mid-December 2024. The security vulnerability in question is CVE-2025-0282 (CVSS score: 9.0), a stack-based buffer overflow that affects Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.

86
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.