Wed.Oct 16, 2024

article thumbnail

Tor Browser and Firefox users should update to fix actively exploited vulnerability

Malwarebytes

Mozilla has announced a security fix for its Firefox browser which also impacts the closely related Tor Browser. The new version fixes one critical security vulnerability which is reportedly under active exploitation. To address the flaw, both Mozilla and Tor recommend that users update their browsers to the most current versions available. Firefox users that have automatic updates enabled should have the new version available as soon or shortly after they open the browser.

Risk 120
article thumbnail

More Ransoms Being Paid and More Data Being Lost: Hornetsecurity

Security Boulevard

A survey of IT professionals by Hornetsecurity found that while the number of ransomware victims are paying the ransoms, more of the data is being lost. In addition, while ransomware protection is a top priority, many feared their organizations were unprepared for an attack. The post More Ransoms Being Paid and More Data Being Lost: Hornetsecurity appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Brazil’s Polícia Federal arrested the notorious hacker USDoD

Security Affairs

Brazil’s Polícia Federal has arrested hacker USDoD, the hacker behind the National Public Data and InfraGard breaches. Brazil’s Polícia Federal (PF) announced the arrest in Belo Horizonte/MG of the notorious hacker USDoD. In August, a CrowdStrike investigation revealed that the hacker USDoD (aka EquationCorp), who is known for high-profile data leaks, is a man from Brazil.

article thumbnail

Apple Enrages IT — 45-Day Cert Expiration Fury

Security Boulevard

CA/B testing: Ludicrous proposal draws ire from “furious” systems administrators. The post Apple Enrages IT — 45-Day Cert Expiration Fury appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Finnish Customs dismantled the dark web drugs market Sipulitie

Security Affairs

Finnish Customs shut down the Tor darknet marketplace Sipulitie and seized the servers hosting the platform. Finnish Customs, with the help of Europol, Swedish and Polish law enforcement authorities and researchers at Bitdefender , shut down the Tor marketplace Sipulitie. “Finnish customs has closed the web servers of the Sipulitie marketplace, which has been operating on the Tor network since 2023, in cooperation with the Swedish police, and confiscated their contents.

Marketing 120
article thumbnail

Fortinet Integrates Lacework CNAPP into Cybersecurity Portfolio

Security Boulevard

Fortinet has made generally available a version of the CNAPP it gained that is now integrated with the Fortinet Security Fabric, an orchestration framework the company developed to centralize the management of its cybersecurity portfolio. The post Fortinet Integrates Lacework CNAPP into Cybersecurity Portfolio appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Solid Data Security: The Foundation of a Safe Digital World

Thales Cloud Protection & Licensing

Solid Data Security: The Foundation of a Safe Digital World madhav Thu, 10/17/2024 - 04:58 It’s that time of year again. The nights are drawing in, the leaves are yellowing on the trees, and the summer is already becoming a mere memory. Oh, and it’s Cybersecurity Awareness Month. This year’s theme, “Secure Our World,” encourages people to safeguard the digital assets that are instrumental to their personal and professional lives.

DDOS 62
article thumbnail

Engaging Executives: How to Present Cybersecurity in a Way That Resonates

Tech Republic Security

Getting buy-in can be difficult. Safe-U founder and CEO Jorge Litvin explains how to create a common language between the CISO and the rest of the C-suite.

CISO 165
article thumbnail

Cheating at Conkers

Schneier on Security

The men’s world conkers champion is accused of cheating with a steel chestnut.

153
153
article thumbnail

How to Use Call Detail Records to Detect Fraud

Tech Republic Security

Learn how data from call detail records can help you find fraud calls made by your phone system — and prevent them from happening again.

Big data 157
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

“Nudify” deepfake bots remove clothes from victims in minutes, and millions are using them

Malwarebytes

Millions of people are turning normal pictures into nude images, and it can be done in minutes. Journalists at Wired found at least 50 “nudify” bots on Telegram that claim to create explicit photos or videos of people with only a couple of clicks. Combined, these bots have millions of monthly users. Although there is no sure way to find out how many unique users that are, it’s appalling, and highly likely there are much more than those they found.

Media 142
article thumbnail

Urban VPN Review (2024): Is it a Safe & Reliable VPN to Use?

Tech Republic Security

With its questionable privacy policy, slow VPN performance, and lack of independent audits, Urban VPN fails to offer a secure and quality VPN experience.

VPN 154
article thumbnail

FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

The Hacker News

The FIDO Alliance said it's working to make passkeys and other credentials more easier to export across different providers and improve credential provider interoperability, as more than 12 billion online accounts become accessible with the passwordless sign-in method.

article thumbnail

7 Security and Compliance Tips From ISC2 Security Congress

Tech Republic Security

An IT and security compliance analyst distilled seven ways to forge effective synergies between IT and broader business goals.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

The Hacker News

The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw in Windows to infect devices with malware known as RokRAT. The vulnerability in question is CVE-2024-38178 (CVSS score: 7.5), a memory corruption bug in the Scripting Engine that could result in remote code execution when using the Edge browser in Internet Explorer Mode.

Malware 136
article thumbnail

From 90 Days to 45: The Evolution of Certificate Lifespans and the Role of Automation

GlobalSign

The recent proposed change by Apple suggests that certificate lifespans will be reduced even further. Learn how automating can help you prepare.

119
119
article thumbnail

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

The Hacker News

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected "threat actors attempting to integrate EDRSilencer in their attacks, repurposing it as a means of evading detection.

134
134
article thumbnail

Hacked Robot Vacuums Hurl Racial Slurs, Show IoT Devices Risks

SecureWorld News

What did the robot vacuum say to its homeowner? You suck. All kidding aside, in a bizarre turn of events, owners of robot vacuums across the U.S. have reported that their devices have been hacked. One particularly alarming case involved a man whose Ecovacs Deebot X2 began yelling racial slurs at him. The incidents appear to be linked to a security vulnerability in the Chinese-made Ecovacs Deebot X2 model, according to a report by the Australian Broadcast Corporation.

IoT 114
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

The Hacker News

A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails. "The spear-phishing campaign's impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected," Trend Micro said in a new analysis.

Banking 129
article thumbnail

Everything you need to know about NIST Security Compliance

Security Boulevard

What Is NIST? What Is NIST Compliance? Importance of Being NIST Compliant The Benefits of Meeting NIST Cybersecurity Standards Five Main NIST Frameworks Achieve Continuous NIST Compliance with FireMon Frequently Asked Questions Get a Demo National Institute of Standards and Technology (NIST) security standards have become a core competency for organizations aiming to strengthen their cybersecurity posture.

Risk 111
article thumbnail

5 Techniques for Collecting Cyber Threat Intelligence

The Hacker News

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are many techniques analysts can use to collect crucial cyber threat intelligence. Let’s consider five that can greatly improve your threat investigations.

article thumbnail

5 AI Security Takeaways featuring Forrester

Trend Micro

Highlights from the recent discussion between Trend Micro’s David Roth, CRO Enterprise America, and guest speaker Jeff Pollard, VP, Principal Analyst, Forrester about AI hype versus reality and how to secure AI in the workplace.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

The Hacker News

A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as CVE-2024-9486 (CVSS score: 9.8), has been addressed in version 0.1.38. The project maintainers acknowledged Nicolai Rybnikar for discovering and reporting the vulnerability.

Risk 115
article thumbnail

Using Artificial Intelligence to Catch Sneaky Images in Email

Cisco Security

Image-based fraud in email can be challenging to detect and prevent. By leveraging AI, security teams can make inboxes more secure. Image-based fraud in email can be challenging to detect and prevent. By leveraging AI, security teams can make inboxes more secure.

article thumbnail

From Misuse to Abuse: AI Risks and Attacks

The Hacker News

AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs. Hype “AI will not replace humans in the near future.

Risk 105
article thumbnail

Skip the iPad: This tablet is redefining what a kids tablet can do

Zero Day

The Fire HD 10 Kids Pro was a pleasant surprise. Its smooth performance for the price is even more remarkable.

98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals

WIRED Threat Level

The US has accused two brothers of being part of the hacker group Anonymous Sudan, which allegedly went on a wild cyberattack spree that hit hundreds of targets—and, for one of the two men, even put lives at risk.

Risk 93
article thumbnail

How I optimized the cheapest 98-inch TV available to look and sound incredible

Zero Day

Some fine-tuning and adjustments turned the TCL S55 into a monster home entertainment set -- and currently it's $1,000 off.

98
article thumbnail

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

We Live Security

“Hey, wanna chat?

article thumbnail

I tested a robot vacuum and mop that performs as well as models twice its price

Zero Day

Ecovacs just launched the Deebot N30 Omni, a robot vacuum with high-end features that are worth way more than its cost—especially with this limited-time deal.

93
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!