Sat.Dec 21, 2024

article thumbnail

BadBox rapidly grows, 190,000 Android devices infected

Security Affairs

Experts uncovered a botnet of 190,000 Android devices infected by BadBox bot, primarily Yandex smart TVs and Hisense smartphones. Bitsight researchers uncovered new BADBOX infrastructure, company’s telemetry shows that over192,000 devices were infected with the BADBOX bot. The botnet includes 160,000 previously unseen devices, notably Yandex 4K QLED Smart TVs and T963 Hisense Smartphones.

Firmware 111
article thumbnail

The Independent Op-Ed: Australia’s social media ban won’t protect kids – it’ll put them more at risk

Joseph Steinberg

Australia recently enacted legislation to ban children under 16 from using social media a policy that the Australian government plans to enforce through the use of untested age-verification technology. While there is little doubt that the elected officials hope to protect children with the aforementioned act, the reality is that – as Australia has already learned in a previous case described in the article – the new law is more likely to make children less safe than more safe.

Media 148
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages

The Hacker News

A dual Russian and Israeli national has been charged in the United States for allegedly being the developer of the now-defunct LockBit ransomware-as-a-service (RaaS) operation since its inception in or around 2019 through at least February 2024. Rostislav Panev, 51, was arrested in Israel earlier this August and is currently awaiting extradition, the U.S.

article thumbnail

Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks

Security Affairs

Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks, pleading guilty to fraud charges in June. Romanian national Daniel Christian Hulea, 30, was sentenced to 20 years in prison for his role in NetWalker ransomware attacks. Hulea pleaded guilty to computer fraud conspiracy and wire fraud conspiracy on June 20 for his role in the NetWalker ransomware attacks against organizations worldwide, including healthcare during COVID-19.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

I tried an ultra-thin iPhone case, and here's how my daunting experience went

Zero Day

Latercase's Thin Case puts an ultra-slim layer of protection around your phone, and it's surprisingly functional.

80
article thumbnail

Mystery Drone Sightings Lead to FAA Ban Despite No Detected Threats

WIRED Threat Level

Plus: Googles U-turn on creepy fingerprint tracking, the LockBit ransomware gangs teased comeback, and a potential US ban on the most popular routers in America.

More Trending

article thumbnail

How Generative AI Is Powering a New Era of Cybersecurity

Hacker's King

In todays rapidly evolving digital landscape, cybersecurity challenges are growing in complexity and scale. The proliferation of cyber threats demands innovative solutions, and generative AI is emerging as a transformative force in this arena. Far beyond its applications in content creation or virtual assistants, generative AI is revolutionizing cybersecurity by enhancing threat detection, automating responses, and fortifying defenses.

article thumbnail

If ChatGPT produces AI-generated code for your app, who does it really belong to?

Zero Day

The answer is complicated, so in Part I of a two-article analysis, we consulted legal experts to obtain some definitive answers.

72
article thumbnail

From.NET to C++: BellaCiao Malware Evolves with BellaCPP

Penetration Testing

Kaspersky has uncovered a fresh variant of the BellaCiao malware familyBellaCPPmarking a shift from.NET to C++ in its development. First appearing in April 2023, BellaCiao is a.NET-based malware... The post From.NET to C++: BellaCiao Malware Evolves with BellaCPP appeared first on Cybersecurity News.

Malware 62
article thumbnail

Is Your Company’s Website Compromising Customer Data?

Security Boulevard

If you are a security, compliance, and privacy professional, its time to focus on an often-ignored issueclient-side security. While many organizations dedicate significant resources to protecting their servers, theres a critical question to consider: are you also safeguarding whats happening on your users browsers? Every time a user visits your website, their browser downloads and [] The post Is Your Companys Website Compromising Customer Data?

52
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-51466 (CVSS 9.0): Critical Vulnerability Found in IBM Cognos Analytics

Penetration Testing

IBM has disclosed two severe vulnerabilities in its Cognos Analytics platform that could compromise sensitive data and system integrity. These vulnerabilities, identified as CVE-2024-51466 and CVE-2024-40695, highlight risks in business... The post CVE-2024-51466 (CVSS 9.0): Critical Vulnerability Found in IBM Cognos Analytics appeared first on Cybersecurity News.

Risk 51
article thumbnail

I tested the viral 'tangle-free' USB-C cable, and it's my new travel essential

Zero Day

I didn't expect the Magtame USB-C cable to be as useful as it is. Even its thermal test results look promising.

45
article thumbnail

DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners

Security Boulevard

Authors/Presenters: Adnan Khan, John Stawinski Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Grand Theft Actions Abusing Self Hosted GitHub Runners appeared first on Security Boulevard.

article thumbnail

I found one of the fastest-charging portable batteries for home backups - and it's on sale

Zero Day

The Andes 1500 portable power station is strong enough to power essential appliances during a power outage or as a camping or RV companion.

Backups 45
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

DEF CON 32 – Laundering Money

Security Boulevard

Author/Presenter: Michael Orlitzky Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Laundering Money appeared first on Security Boulevard.

article thumbnail

ZDNET's product of the year: Why Oura Ring 4 bested Samsung, Apple, and others in 2024

Zero Day

By blending precision health tracking with an elegant design, the Oura Ring 4 underscores the growing importance of health tech in our daily lives.

45
article thumbnail

LummApp Malware Campaign: Researcher Exposes Advanced Data Stealing Operation

Penetration Testing

In a recent revelation, Team Axon, the elite threat hunting division at Hunters, exposed a sophisticated malware campaign named “LummApp.” This operation employs a combination of advanced techniques, including DLL... The post LummApp Malware Campaign: Researcher Exposes Advanced Data Stealing Operation appeared first on Cybersecurity News.

Malware 48
article thumbnail

I converted this Windows 11 Mini PC into a Linux workstation - and didn't regret it

Zero Day

The Herk Orion is a capable Ryzen-powered Mini PC in its own right, but ditching Windows for a Linux OS has opened up a whole new level of performance.

40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.