Thu.Jan 25, 2024

article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.

Software 301
article thumbnail

Quantum Computing Skeptics

Schneier on Security

Interesting article. I am also skeptical that we are going to see useful quantum computers anytime soon. Since at least 2019, I have been saying that this is hard. And that we don’t know if it’s “land a person on the surface of the moon” hard, or “land a person on the surface of the sun” hard. They’re both hard, but very different.

291
291
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent Phishing Attacks with Multi-Factor Authentication

Tech Republic Security

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.

article thumbnail

How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar

WIRED Threat Level

From repeatedly crippling thousands of gas stations to setting a steel mill on fire, Predatory Sparrow’s offensive hacking has now targeted Iranians with some of history's most aggressive cyberattacks.

Hacking 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

Tech Republic Security

The Australian government’s rollout of passkeys for its digital service portal myGov will build momentum for wider adoption; though, challenges like user education and tech fragmentation remain.

Passwords 152
article thumbnail

CVE-2024-0402: GitLab Releases Urgent Security Patches for Critical Vulnerability

Penetration Testing

GitLab has addressed a critical severity vulnerability that could allow an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace. GitLab is a web-based DevOps platform that... The post CVE-2024-0402: GitLab Releases Urgent Security Patches for Critical Vulnerability appeared first on Penetration Testing.

More Trending

article thumbnail

Cisco warns of a critical bug in Unified Communications products, patch it now!

Security Affairs

Cisco addressed a critical flaw in its Unified Communications and Contact Center Solutions products that could lead to remote code execution. Cisco released security patches to address a critical vulnerability, tracked as CVE-2024-20253 (CVSS score of 9.9), impacting multiple Unified Communications and Contact Center Solutions products. An unauthenticated, remote attacker can exploit the flaw to execute arbitrary code on an affected device.

Hacking 142
article thumbnail

Malicious AdTech Spies on People as NatSec Targets

Security Boulevard

Targeted ads target targets: Patternz and Nuviad enable potentially hostile governments to track individuals by misusing ad bidding. The post Malicious AdTech Spies on People as NatSec Targets appeared first on Security Boulevard.

article thumbnail

23andMe data breach: Hackers stole raw genotype data, health reports

Bleeping Computer

Genetic testing provider 23andMe confirmed that hackers stole health reports and raw genotype data of customers affected by a credential stuffing attack that went unnoticed for five months, from April 29 to September 27. [.

article thumbnail

AI is already being used by ransomware gangs, warns NCSC

Graham Cluley

In a newly published report, the UK's National Cyber Security Centre (NCSC) has warned that malicious attackers are already taking advantage of artificial intelligence and that the volume and impact of threats - including ransomware - will increase in the next two years. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Yearly Intel Trend Review: The 2023 RedSense report

Security Affairs

The 2023 RedSense report covers long-term observations we have made regarding intel trends and interconnectivity. These observations were made by analyzing numerous 2023 threat findings and discoveries, and include references to case studies that were reported on by RedSense throughout the year. Trend Analysis Ghost Group Operations: A notable increase in covert ‘ghost groups’ like Zeon/ Ryuk /Conti1, providing backend support to groups such as BlackCat , Akira , and LockBit 3.0.

article thumbnail

Hackers target WordPress database plugin active on 1 million sites

Bleeping Computer

Malicious activity targeting a critical severity flaw in the 'Better Search Replace' WordPress plugin has been detected, with researchers observing thousands of attempts in the past 24 hours. [.

133
133
article thumbnail

Malicious ads for restricted messaging applications target Chinese users

Malwarebytes

An ongoing campaign of malicious ads has been targeting Chinese-speaking users with lures for popular messaging applications such as Telegram or LINE with the intent of dropping malware. Interestingly, software like Telegram is heavily restricted and was previously banned in China. Many Google services, including Google search, are also either restricted or heavily censored in mainland China.

Malware 133
article thumbnail

Cisco warns of critical RCE flaw in communications software

Bleeping Computer

Cisco is warning that several of its Unified Communications Manager (CM) and Contact Center Solutions products are vulnerable to a critical severity remote code execution security issue. [.

Software 132
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Zoho Vault Review (2024): Pricing, Features, Pros & Cons

Tech Republic Security

While its decision to leave some user data unencrypted is a miss, Zoho Vault’s business-centered password management features may warrant a second look.

article thumbnail

Big-Name Targets Push Midnight Blizzard Hacking Spree Back Into the Limelight

WIRED Threat Level

Newly disclosed breaches of Microsoft and Hewlett-Packard Enterprise highlight the persistent threat posed by Midnight Blizzard, a notorious Russian cyber-espionage group.

Hacking 130
article thumbnail

Privacy predictions for 2024

SecureList

In our previous privacy predictions piece , we outlined trends for 2023. As expected, there was a notable increase in the adoption of digital IDs to replace paper documents. For example, California expanded a pilot program for digital driver’s licenses, and Russia introduced laws enabling biometrics-based purchases of alcohol and tobacco. This trend is set to continue, with the European Commission finalizing the EU Digital Identity Wallet agreement.

Passwords 128
article thumbnail

Patch now! Fortra GoAnywhere MFT vulnerability exploit available

Malwarebytes

On January 22, 2024, software company Fortra warned customers about a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) that allows an attacker to create a new admin user. Fortra GoAnywhere MFT is a file transfer solution that organizations use to exchange their data. Some of the organizations that use GoAnywhere MFT are considered vital infrastructure such as local governments, financial companies, healthcare organizations, energy firms, and technology man

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Are site safety briefings best delivered on-site or at home?

IT Security Guru

Site safety briefings are an essential – and legally necessary – part of the onboarding process for any new starter on a construction site. By offering in-depth safety knowledge to a worker before they begin, construction companies are arming them with all the information they need to keep themselves and their fellow colleagues safe. But with the rise of digital and cloud technology, these companies now have more options than ever to deliver this information in a format that may diff

Software 128
article thumbnail

AI likely to boost ransomware, warns government body

Malwarebytes

The British National Cyber Security Centre (NCSC) says it expects Artificial Intelligence (AI) to heighten the global ransomware threat. In a report, the NCSC makes the assessment that AI will almost certainly increase the volume and heighten the impact of cyberattacks over the next two years. We’re already seeing that cybercriminals of all trades are using AI in the initial stages of attacks to increase their effectiveness.

article thumbnail

AI Will Fuel Rise in Ransomware, UK Cyber Agency Says

Security Boulevard

The accelerating innovation of generative AI will increase the risks of ransomware and other cyberthreats over the next two years as bad actors integrate the technologies into their nefarious operations, according to a report this week from the UK’s top cybersecurity agency. The National Cyber Security Centre (NCSC) warned that the volume and impact of.

article thumbnail

AllaKore RAT: The Trojan Horse Targeting Mexico’s Financial Titans

Penetration Testing

In a cyber landscape increasingly dominated by sophisticated threats, a recent campaign was found targeting Mexican financial institutions and cryptocurrency trading platforms. This operation, driven by a financially motivated threat actor, utilizes a modified... The post AllaKore RAT: The Trojan Horse Targeting Mexico’s Financial Titans appeared first on Penetration Testing.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

CI/CD Pipeline Security: Best Practices Beyond Build and Deploy

Security Boulevard

CI/CD Pipeline Security Given the demand for rapid innovation and the adoption of agile methodologies, Continuous Integration/Continuous Deployment (CI/CD) pipelines have become the foundation on which all DevOps processes are built. They are the backbone of efficient delivery. In fact, according to to the State of Continuous Delivery report, using CI/CD tools correlates with better.

Software 121
article thumbnail

Tesla hacked again, 24 more zero-days exploited at Pwn2Own Tokyo

Bleeping Computer

Security researchers hacked the Tesla infotainment system and demoed a total of 24 zero-days on the second day of the Pwn2Own Automotive 2024 hacking competition. [.

Hacking 117
article thumbnail

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024

Security Boulevard

As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena. The post The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024 appeared first on Security Boulevard.

article thumbnail

FAUST Ransomware Strikes: The Hidden Dangers Inside Office Documents

Penetration Testing

Recently, FortiGuard Labs uncovered the FAUST ransomware, a variant of the notorious Phobos family. This malicious software, designed to encrypt files on a victim’s computer, demands a ransom in exchange for the decryption key,... The post FAUST Ransomware Strikes: The Hidden Dangers Inside Office Documents appeared first on Penetration Testing.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

That new X cryptocurrency? It’s a scam.

Security Boulevard

In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using the likeness of Elon Musk. This quarter, we uncovered advertisements featuring Musk to promote a supposed new cryptocurrency. The irony is striking – these ads were paid for and displayed on a platform owned by Musk himself, creating a deceptive endorsement loop.

Scams 119
article thumbnail

How to Use Zoho Vault Password Manager: A Beginner’s Guide

Tech Republic Security

Learn how to use and set up the Zoho Vault password manager to securely store and manage your passwords.

article thumbnail

Zscaler Adds SASE Offering to Zero-Trust Portfolio of Cloud Services

Security Boulevard

Zscaler added a SASE based on its existing cloud platform through which it provides access to specific apps via encrypted TLS tunnels. The post Zscaler Adds SASE Offering to Zero-Trust Portfolio of Cloud Services appeared first on Security Boulevard.

article thumbnail

iPhone apps abuse iOS push notifications to collect user data

Bleeping Computer

Numerous iOS apps are using background processes triggered by push notifications to collect user data about devices, potentially allowing the creation of fingerprinting profiles used for tracking. [.

Mobile 115
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.