Sun.Jan 05, 2025

article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

PLAYFULGHOST is a new malware family with capabilities including keylogging, screen and audio capture, remote shell access, and file transfer/execution. Google researchers analyzed a new malware family called PLAYFULGHOST that supports multiple features, including keylogging, screen and audio capture, remote shell, and file transfer/execution. The PLAYFULGHOST backdoor shares functionality with Gh0stRAT whose source code was publicly released in 2008.

Malware 129
article thumbnail

Should States Ban Mandatory Human Microchip Implants?

Lohrman on Security

A new report examines the rise of pre-emptive bans on mandated human microchip implants, noting that 13 states have recently enacted such a ban, despite no companies currently requiring the technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 27

Security Affairs

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

Malware 66
article thumbnail

CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug

Penetration Testing

Security researchers published the technical details and a proof-of-concept (PoC) exploit code for CVE-2024-43452 (CVSS 7.5), a Windows The post CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug appeared first on Cybersecurity News.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Fake Account Detection in Snapchat ! How to Report it

Hacker's King

Everyone is now part of the virtual world, which includes a wide array of users from celebrities to everyday people. With this accessibility comes the critical issue of fake account detection. Cybercriminals exploit social platforms by creating fake profiles to deceive unsuspecting users. As our digital interactions grow, effective measures for fake account detection become essential to protect our online presence and maintain a safer environment.

article thumbnail

What is an AI PC exactly? And should you buy one in 2025?

Zero Day

How does a computer built to handle artificial intelligence tasks differ from a regular PC? Who's making them? And where do Windows and MacOS fit in? We answer all your burning questions.

LifeWorks

More Trending

article thumbnail

What are passkeys? How going passwordless can simplify your life in 2025

Zero Day

Take the first steps toward ditching passwords for good.

Passwords 131
article thumbnail

Unlocking the Potential of Machine Identity Management

Security Boulevard

The Untapped Potential of Machine Identity Management Are you aligning your cybersecurity efforts with the contemporary needs and trends? Organizations often overlook the significance and strategic depth of Non-Human Identities (NHIs) and Secrets Security Management. This lapse can expose businesses, particularly those operating in the cloud, to potential security breaches and data leaks.

article thumbnail

Hackers Exploit Social Security Administration Branding to Deliver ConnectWise RAT

Penetration Testing

In a concerning escalation of phishing tactics, hackers are spoofing the United States Social Security Administration (SSA) to The post Hackers Exploit Social Security Administration Branding to Deliver ConnectWise RAT appeared first on Cybersecurity News.

Phishing 122
article thumbnail

Instagram Fake Account Detection: The Ultimate Cheat Sheet

Hacker's King

Table of Contents Introduction What Are Fake Instagram Accounts? Why Fake Account Detection Is Crucial Identifying Fake Accounts: Key Signs Effective Tools for Fake Account Detection Steps to Protect Your Instagram Account The Role of AI in Fake Account Detection Conclusion Introduction Fake Instagram accounts are a growing problem, posing risks to privacy, security, and credibility.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybersecurity Alert: FireScam—The Android Malware Disguised as Telegram Premium

Penetration Testing

In an era where mobile applications dominate daily life, cybersecurity threats have reached unprecedented sophistication. A recent report The post Cybersecurity Alert: FireScamThe Android Malware Disguised as Telegram Premium appeared first on Cybersecurity News.

Malware 115
article thumbnail

These dual mini-monitors can help users take their at-home setup on the road

Zero Day

The JSAUX FlipGo Horizon lets you expand the display of your MacBook or Windows laptop to a pair of 16-inch monitors.

111
111
article thumbnail

DEF CON 32 – RF Attacks on Aviation’s Defense Against Mid-Air Collisions

Security Boulevard

Authors/Presenters: G. Longo, V. Lenders Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – RF Attacks on Aviation’s Defense Against Mid-Air Collisions appeared first on Security Boulevard.

article thumbnail

Two flagship LG OLED TVs released at CES 2025: Specs, best new features, and more

Zero Day

LG's new AI experience in the M5 and G5 allows for a more personalized and tailored user experience. Here's what to expect.

105
105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Feel Supported by Advanced Machine Identity Management

Security Boulevard

Why Does Machine Identity Management Matter? Why should advanced machine identity management be a key concern for CISOs? With rapid technological advancements and the increasing dependence on cloud environments, businesses are confronted with a new array of security challenges. One such critical challenge is the safe management of Non-Human Identities (NHIs) along with their corresponding [] The post Feel Supported by Advanced Machine Identity Management appeared first on Entro.

CISO 52
article thumbnail

5 Samsung AI features coming to 2025 TVs - and why you should be excited

Zero Day

These new AI-powered features offer much more than just a boost to picture quality.

105
105
article thumbnail

Nuclei flaw allows signature bypass and code execution

Security Affairs

A vulnerability in Nuclei, an open-source vulnerability scanner, could allow attackers to bypass signature checks and execute malicious code. A high-severity security flaw, tracked as CVE-2024-43405 (CVSS score of 7.4), in the open-source vulnerability scanner ProjectDiscovery’s Nuclei , could allow attackers to bypass signature checks and execute malicious code.

DNS 98
article thumbnail

Circular Ring 2 sizes itself using your phone - no physical sizing kit required

Zero Day

Circular is bringing more finishes, a titanium build, eight days of battery life, and digital sizing to its second-generation smart ring.

105
105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

PLAYFULGHOST is a new malware family with capabilities including keylogging, screen and audio capture, remote shell access, and file transfer/execution. Google researchers analyzed a new malware family called PLAYFULGHOST that supports multiple features, including keylogging, screen and audio capture, remote shell, and file transfer/execution. The PLAYFULGHOST backdoor shares functionality with Gh0stRAT whose source code was publicly released in 2008.

Malware 98
article thumbnail

Is your office cold? These power banks double as hard warmers - on purpose

Zero Day

Most of the time, you definitely don't want a power bank getting hot. These ones have been designed to do just that!

Banking 105
article thumbnail

CVE-2024-9138 and CVE-2024-9140 (CVSS 9.8): Moxa Calls for Immediate Security Action

Penetration Testing

Moxa, a leading provider of industrial networking and communication solutions, has issued a security advisory warning of two The post CVE-2024-9138 and CVE-2024-9140 (CVSS 9.8): Moxa Calls for Immediate Security Action appeared first on Cybersecurity News.

article thumbnail

The Even Realities G1 are unlike any other smart glasses you've seen

Zero Day

The Even Realities G1 don't have a camera or speaker like the Meta Ray-Bans, nor are they trying to be a portable Vision Pro. These are different and unique, but expensive.

99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

GoCD Patches Critical Vulnerability Allowing User Privilege Escalation

Penetration Testing

Open-source CI/CD platform GoCD has released an urgent security update to address a critical vulnerability that could allow The post GoCD Patches Critical Vulnerability Allowing User Privilege Escalation appeared first on Cybersecurity News.

article thumbnail

Every Samsung TV announced at CES 2025: Best features coming to OLED, QLED, 8K models

Zero Day

More than a dozen TVs will be a part of Samsung's 2025 lineup, including the company's biggest-ever consumer display

98
article thumbnail

CryptBot Infostealer Returns with Sophisticated Tactics for Initial Access

Penetration Testing

CryptBot, an information-stealing malware first detected in 2019, has resurfaced with advanced tactics to target unsuspecting victims. In The post CryptBot Infostealer Returns with Sophisticated Tactics for Initial Access appeared first on Cybersecurity News.

Malware 75
article thumbnail

New Samsung TVs are getting 5 major AI upgrades - including a smart home favorite

Zero Day

These new AI-powered features offer much more than just a boost to picture quality.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

NonEuclid RAT—A Sophisticated Tool in the Cybercrime Arsenal

Penetration Testing

The NonEuclid Remote Access Trojan (RAT), detailed in a report by CYFIRMA, represents a significant evolution in malware The post NonEuclid RATA Sophisticated Tool in the Cybercrime Arsenal appeared first on Cybersecurity News.

article thumbnail

Samsung and Google will unveil their open-source Dolby Atmos alternative at CES 2025

Zero Day

The two companies joined forces to create a 3D audio format that beats out Dolby in one huge way: No licensing fees.

98
article thumbnail

Malicious Packages Weaponize OAST for Stealthy Data Exfiltration and Reconnaissance

Penetration Testing

Researchers at Socket have uncovered a series of malicious campaigns exploiting Out-of-Band Application Security Testing (OAST) techniques. Traditionally The post Malicious Packages Weaponize OAST for Stealthy Data Exfiltration and Reconnaissance appeared first on Cybersecurity News.

article thumbnail

This AI mirror could track your weight, blood pressure, sleep, and more

Zero Day

Mirror, mirror, on the wall, how is my cholesterol?

92
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!