Thu.Jan 25, 2024

article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.

Software 285
article thumbnail

Quantum Computing Skeptics

Schneier on Security

Interesting article. I am also skeptical that we are going to see useful quantum computers anytime soon. Since at least 2019, I have been saying that this is hard. And that we don’t know if it’s “land a person on the surface of the moon” hard, or “land a person on the surface of the sun” hard. They’re both hard, but very different.

271
271
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent Phishing Attacks with Multi-Factor Authentication

Tech Republic Security

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.

article thumbnail

CVE-2024-0402: GitLab Releases Urgent Security Patches for Critical Vulnerability

Penetration Testing

GitLab has addressed a critical severity vulnerability that could allow an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace. GitLab is a web-based DevOps platform that... The post CVE-2024-0402: GitLab Releases Urgent Security Patches for Critical Vulnerability appeared first on Penetration Testing.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

Tech Republic Security

The Australian government’s rollout of passkeys for its digital service portal myGov will build momentum for wider adoption; though, challenges like user education and tech fragmentation remain.

Passwords 134
article thumbnail

AI is already being used by ransomware gangs, warns NCSC

Graham Cluley

In a newly published report, the UK's National Cyber Security Centre (NCSC) has warned that malicious attackers are already taking advantage of artificial intelligence and that the volume and impact of threats - including ransomware - will increase in the next two years. Read more in my article on the Tripwire State of Security blog.

More Trending

article thumbnail

23andMe data breach: Hackers stole raw genotype data, health reports

Bleeping Computer

Genetic testing provider 23andMe confirmed that hackers stole health reports and raw genotype data of customers affected by a credential stuffing attack that went unnoticed for five months, from April 29 to September 27. [.

article thumbnail

Cisco warns of a critical bug in Unified Communications products, patch it now!

Security Affairs

Cisco addressed a critical flaw in its Unified Communications and Contact Center Solutions products that could lead to remote code execution. Cisco released security patches to address a critical vulnerability, tracked as CVE-2024-20253 (CVSS score of 9.9), impacting multiple Unified Communications and Contact Center Solutions products. An unauthenticated, remote attacker can exploit the flaw to execute arbitrary code on an affected device.

Hacking 139
article thumbnail

Hackers target WordPress database plugin active on 1 million sites

Bleeping Computer

Malicious activity targeting a critical severity flaw in the 'Better Search Replace' WordPress plugin has been detected, with researchers observing thousands of attempts in the past 24 hours. [.

133
133
article thumbnail

How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar

WIRED Threat Level

From repeatedly crippling thousands of gas stations to setting a steel mill on fire, Predatory Sparrow’s offensive hacking has now targeted Iranians with some of history's most aggressive cyberattacks.

Hacking 125
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cisco warns of critical RCE flaw in communications software

Bleeping Computer

Cisco is warning that several of its Unified Communications Manager (CM) and Contact Center Solutions products are vulnerable to a critical severity remote code execution security issue. [.

Software 132
article thumbnail

SystemBC Malware's C2 Server Analysis Exposes Payload Delivery Tricks

The Hacker News

Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. "SystemBC can be purchased on underground marketplaces and is supplied in an archive containing the implant, a command-and-control (C2) server, and a web administration portal written in PHP," Kroll said in an analysis published last week.

Malware 124
article thumbnail

AI Will Fuel Rise in Ransomware, UK Cyber Agency Says

Security Boulevard

The accelerating innovation of generative AI will increase the risks of ransomware and other cyberthreats over the next two years as bad actors integrate the technologies into their nefarious operations, according to a report this week from the UK’s top cybersecurity agency. The National Cyber Security Centre (NCSC) warned that the volume and impact of.

article thumbnail

Yearly Intel Trend Review: The 2023 RedSense report

Security Affairs

The 2023 RedSense report covers long-term observations we have made regarding intel trends and interconnectivity. These observations were made by analyzing numerous 2023 threat findings and discoveries, and include references to case studies that were reported on by RedSense throughout the year. Trend Analysis Ghost Group Operations: A notable increase in covert ‘ghost groups’ like Zeon/ Ryuk /Conti1, providing backend support to groups such as BlackCat , Akira , and LockBit 3.0.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

CI/CD Pipeline Security: Best Practices Beyond Build and Deploy

Security Boulevard

CI/CD Pipeline Security Given the demand for rapid innovation and the adoption of agile methodologies, Continuous Integration/Continuous Deployment (CI/CD) pipelines have become the foundation on which all DevOps processes are built. They are the backbone of efficient delivery. In fact, according to to the State of Continuous Delivery report, using CI/CD tools correlates with better.

Software 121
article thumbnail

Zoho Vault Review (2024): Pricing, Features, Pros & Cons

Tech Republic Security

While its decision to leave some user data unencrypted is a miss, Zoho Vault’s business-centered password management features may warrant a second look.

article thumbnail

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024

Security Boulevard

As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena. The post The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024 appeared first on Security Boulevard.

article thumbnail

Are site safety briefings best delivered on-site or at home?

IT Security Guru

Site safety briefings are an essential – and legally necessary – part of the onboarding process for any new starter on a construction site. By offering in-depth safety knowledge to a worker before they begin, construction companies are arming them with all the information they need to keep themselves and their fellow colleagues safe. But with the rise of digital and cloud technology, these companies now have more options than ever to deliver this information in a format that may diff

Software 116
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

That new X cryptocurrency? It’s a scam.

Security Boulevard

In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using the likeness of Elon Musk. This quarter, we uncovered advertisements featuring Musk to promote a supposed new cryptocurrency. The irony is striking – these ads were paid for and displayed on a platform owned by Musk himself, creating a deceptive endorsement loop.

article thumbnail

iPhone apps abuse iOS push notifications to collect user data

Bleeping Computer

Numerous iOS apps are using background processes triggered by push notifications to collect user data about devices, potentially allowing the creation of fingerprinting profiles used for tracking. [.

Mobile 115
article thumbnail

Zscaler Adds SASE Offering to Zero-Trust Portfolio of Cloud Services

Security Boulevard

Zscaler added a SASE based on its existing cloud platform through which it provides access to specific apps via encrypted TLS tunnels. The post Zscaler Adds SASE Offering to Zero-Trust Portfolio of Cloud Services appeared first on Security Boulevard.

article thumbnail

New Year, New Initiatives for the NIST Privacy Framework!

NSTIC

It’s been four years since the release of The NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. Since then, many organizations have found it highly valuable for building or improving their privacy programs. We’ve also been able to add a variety of resources to support its implementation. We’re proud of how much has been accomplished in just a few short years, but we’re not resting on our laurels.

Risk 114
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Guide: The Best Cybersecurity Conferences and Events of 2024

Security Boulevard

There is no doubt that our world has never seen as much data as what. The post Guide: The Best Cybersecurity Conferences and Events of 2024 appeared first on Security Boulevard.

article thumbnail

Tesla hacked again, 24 more zero-days exploited at Pwn2Own Tokyo

Bleeping Computer

Security researchers hacked the Tesla infotainment system and demoed a total of 24 zero-days on the second day of the Pwn2Own Automotive 2024 hacking competition. [.

Hacking 117
article thumbnail

Linux Kernel 6.7 Released with Various Security Improvements

Security Boulevard

Linus Torvalds has announced the release of Linux kernel 6.7, featuring various improvements and new features. One major addition is the bcachefs file system, designed to compete with Btrfs and ZFS for modern features while maintaining the speed of EXT4 and XFS. This article aims to explore the security features and updates introduced in this […] The post Linux Kernel 6.7 Released with Various Security Improvements appeared first on TuxCare.

112
112
article thumbnail

AllaKore RAT: The Trojan Horse Targeting Mexico’s Financial Titans

Penetration Testing

In a cyber landscape increasingly dominated by sophisticated threats, a recent campaign was found targeting Mexican financial institutions and cryptocurrency trading platforms. This operation, driven by a financially motivated threat actor, utilizes a modified... The post AllaKore RAT: The Trojan Horse Targeting Mexico’s Financial Titans appeared first on Penetration Testing.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Scoping Chatbots for Safe and Effective Experiences

Security Boulevard

The most effective chatbots are secure, ethical and customizable to align with an organization’s structure and specific use cases. The post Scoping Chatbots for Safe and Effective Experiences appeared first on Security Boulevard.

article thumbnail

Memory Scanning for the Masses

Fox IT

Author: Axel Boesenach and Erik Schamper In this blog post we will go into a user-friendly memory scanning Python library that was created out of the necessity of having more control during memory scanning. We will give an overview of how this library works, share the thought process and the why’s. This blog post will not cover the inner workings of the memory management of the respective platforms.

Malware 109
article thumbnail

Blackwood hackers hijack WPS Office update to install malware

Bleeping Computer

A previously unknown advanced threat actor tracked as 'Blackwood' is using sophisticated malware called NSPX30 in cyberespionage attacks against companies and individuals. [.

Malware 107
article thumbnail

FAUST Ransomware Strikes: The Hidden Dangers Inside Office Documents

Penetration Testing

Recently, FortiGuard Labs uncovered the FAUST ransomware, a variant of the notorious Phobos family. This malicious software, designed to encrypt files on a victim’s computer, demands a ransom in exchange for the decryption key,... The post FAUST Ransomware Strikes: The Hidden Dangers Inside Office Documents appeared first on Penetration Testing.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.