Thu.Mar 20, 2025

article thumbnail

Critical GitHub Attack

Schneier on Security

This is serious : A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands of repositories. The attack, which originally targeted the widely used tj-actions/changed-files utility, is now believed to have originated from an earlier breach of the reviewdog/action-setup@v1 GitHub Action, according to a report. […] CISA confirmed the vulnerability has been patched in version 46.0.1.

265
265
article thumbnail

Security Researcher Comments on HIPAA Security Rule

Adam Shostack

A group of us have urged HHS to require better handling of security reports A group of us have urged HHS to require that health care providers to act on (and facilitate reporting of) security issues by good faith cybersecurity researchers. The core of what we recommend is that HHS should require cooperation with Good Faith researchers. All regulated entities should be required to enable people to report security issues in a way thats easy to discover and aligned with standards.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nation-State Hackers Exploit Windows Shortcut Zero-Day Vulnerability

SecureWorld News

A newly discovered Windows zero-day vulnerability is actively being exploited by nation-state threat actors, raising serious cybersecurity concerns across government, financial, and critical infrastructure sectors. The vulnerability, tracked as ZDI-CAN-25373, allows attackers to execute hidden malicious commands via specially crafted Windows shortcut (.lnk) files.

article thumbnail

China, Russia, North Korea Hackers Exploit Windows Security Flaw

Security Boulevard

Amost a dozen state-sponsored threat groups from Russia, China, and North Korea have been exploiting a security flaw in WIndows in attacks on governments and critical infrastructure that date back to 2017. According to Trend Micro's VDI unit, Microsoft has no plans to patch the vulnerability. The post China, Russia, North Korea Hackers Exploit Windows Security Flaw appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CERT-UA warns of cyber espionage against the Ukrainian defense industry using Dark Crystal RAT

Security Affairs

CERT-UA warns of a cyber campaign using Dark Crystal RAT to target Ukraine’s defense sector, including defense industry employees and Defense Forces members. The Computer Emergency Response Team of Ukraine (CERT-UA) uncovered a new cyber espionage campaign targeting employees of defense-industrial complex enterprises and representatives of the Defense Forces of Ukraine with Dark Crystal RAT.

article thumbnail

Infostealers Fuel 2.1B Credentials and 23M Host Infections

eSecurity Planet

Cybercriminal activity is reaching unprecedented levels, with 2024 witnessing a dramatic surge in malware-fueled attacks that have left organizations scrambling to safeguard their data. A recent report from Flashpoint paints a stark picture of a threat landscape defined by infostealers, credential theft, and escalating vulnerabilities, urging organizations to strengthen their defenses against these relentless adversaries.

LifeWorks

More Trending

article thumbnail

CaaS: The Key to More Affordable Cyber Insurance

Security Boulevard

Compliance as a Service (CaaS) strengthens a companys posture and defensibility, making it more attractive to insurers. The post CaaS: The Key to More Affordable Cyber Insurance appeared first on Security Boulevard.

article thumbnail

U.S. CISA adds Edimax IC-7100 IP Camera, NAKIVO, and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Edimax IC-7100 IP Camera, NAKIVO,and SAP NetWeaver AS Java flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability CVE-2017

Backups 70
article thumbnail

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Security Boulevard

Artificial intelligence (AI) has rapidly shifted from buzz to business necessity over the past yearsomething Zscaler has seen firsthand while pioneering AI-powered solutions and tracking enterprise AI/ML activity in the worlds largest security cloud.As enterprises embrace AI to boost productivity, accelerate decision-making, and automate workflows, to name a few benefits, cybercriminals are using the same technology to automate and scale more sophisticated attacks.

article thumbnail

Veeam fixed critical Backup & Replication flaw CVE-2025-23120

Security Affairs

Veeam released security patches for a critical Backup & Replication vulnerability that could let attackers remotely execute code. Veeam addressed a critical security vulnerability, tracked asCVE-2025-23120 (CVSS score of 9.9), impacting its Backup & Replication software that could lead to remote code execution. The vulnerability impacts 12.3.0.310 and all earlier version 12 builds, it was fixed with the release of version 12.3.1 (build 12.3.1.1139). “A vulnerability allowing remote

Backups 68
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Stellar Data Recovery Professional Review: The Ultimate Windows Data Rescue Tool

SecureBlitz

Have you ever lost important files due to accidental deletion, formatting, system crashes, or even BitLocker encryption? Youre not alone but the solution is here: Stellar Data Recovery Professional for Windows. After previously reviewing their Android recovery tool with great results, were diving into another powerful utility from the Stellar suite and this […] The post Stellar Data Recovery Professional Review: The Ultimate Windows Data Rescue Tool appeared first on SecureBlitz Cybersec

article thumbnail

Report: More Attacks Aimed at Android Devices Configured with Root Access

Security Boulevard

A report published today by Zimperium, a provider of a platform for securing mobile devices and applications, today finds devices running the Android operating system that have enabled root-level privileges are 3.5 times more likely to be attacked, resulting in 250 times more cybersecurity incidents. The post Report: More Attacks Aimed at Android Devices Configured with Root Access appeared first on Security Boulevard.

Mobile 71
article thumbnail

Pennsylvania State Education Association data breach impacts 500,000 individuals

Security Affairs

A data breach at the Pennsylvania State Education Association exposed the personal information of over 500,000 individuals. The Pennsylvania State Education Association (PSEA) suffered a data breach that impacted 517,487 individuals. PSEA is a labor union representing teachers, education support professionals, and other school employees in Pennsylvania.

article thumbnail

Red Canary Report Surfaces Sharp Increase in Cyberattacks Involving Identity

Security Boulevard

An analysis of 93,000 threats published this week by Red Canary, a provider of a managed detection and response (MDR) service, finds the number of cyberattacks seeking to compromise an identity increased by a factor of four in 2024. The post Red Canary Report Surfaces Sharp Increase in Cyberattacks Involving Identity appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Semrush impersonation scam hits Google Ads

Malwarebytes

This blog post was co-authored with Elie Berreby, Senior SEO Strategist Criminals are highly interested in online marketing and advertising tools that they can leverage as part of their ongoing malware campaigns. In particular, we have previously detailed how Google advertiser accounts can be hijacked to create new malicious ads and perpetuate a vicious cycle leading to more compromised accounts.

Scams 56
article thumbnail

Choosing the Right Cloud Security Provider: Five Non-Negotiables for Protecting Your Cloud

Security Boulevard

Protecting your cloud environment for the long term involves choosing a security partner whose priorities align with your needs. Here's what you need to know. As organizations embrace multi-cloud and hybrid environments, the complexity of securing that landscape increases. However, the overlooked risks may not come solely from threat actors. Choosing a security provider that has conflicting priorities can also introduce risk.

Risk 59
article thumbnail

Redefining Breach and Attack Simulation (BAS) with BAS as a Service

NetSpi Executives

Businesses are under a lot of pressure to ensure that their endpoint protection solutions effectively secure the network. However, NetSPI’s research reveals a startling gap in security detection controls nearly 60% of common attack tactics are missed by endpoint protection tools using out-of-the-box settings. To address this growing challenge, NetSPI is proud to announce the evolution of our Breach and Attack Simulation (BAS) into BAS as a Service.

article thumbnail

Agentic AI Enhances Enterprise Automation: Without Adaptive Security, its Autonomy Risks Expanding Attack Surfaces

Security Boulevard

The rise of agentic AI is accelerating. But as enterprises embrace AI autonomy, a critical question looms - how well is security keeping up? The post Agentic AI Enhances Enterprise Automation: Without Adaptive Security, its Autonomy Risks Expanding Attack Surfaces appeared first on Security Boulevard.

Risk 66
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How Data Visualization Helps Prevent Cyber Attacks

Centraleyes

Cybersecurity Relies on Visualization Raw data often tells a story thats hidden in plain sight. No matter how accurate or comprehensive, numbers on a spreadsheet can easily blur into an incomprehensible haze when patterns and anomalies are buried deep within thousands or millions of rows. The human brain processes visuals 60,000 times faster than text, a testament to our evolutionary wiring for spotting patterns and making decisions based on what we see.

article thumbnail

Prompt Injection Attacks in LLMs: Mitigating Risks with Microsegmentation

Security Boulevard

Prompt injection attacks have emerged as a critical concern in the realm of Large Language Model (LLM) application security. These attacks exploit the way LLMs process and respond to user inputs, posing unique challenges for developers and security professionals. Lets dive into what makes these attacks so distinctive, how they work, and what steps can [] The post Prompt Injection Attacks in LLMs: Mitigating Risks with Microsegmentation appeared first on ColorTokens.

Risk 59
article thumbnail

Top 10 dynamic application security testing (DAST) tools for 2025

Acunetix

What is DAST and how does it work? Dynamic application security testing (DAST) is a cybersecurity assessment method that analyzes running applications to identify security vulnerabilities. Unlike static application security testing (SAST), which examines source code before deployment, DAST scanning simulates real-world attacks by probing. Read more The post Top 10 dynamic application security testing (DAST) tools for 2025 appeared first on Acunetix.

article thumbnail

From Cloud Native to AI Native: Lessons for the Modern CISO to Win the Cybersecurity Arms Race

Security Boulevard

By adopting AI Native security operations, organizations gain a formidable defense posture and streamline their use of human talent for the most challenging, creative and impactful tasks The post From Cloud Native to AI Native: Lessons for the Modern CISO to Win the Cybersecurity Arms Race appeared first on Security Boulevard.

CISO 59
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility

The Hacker News

Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated vulnerabilities in question are listed below - CVE-2024-20439 (CVSS score: 9.

article thumbnail

How CASB security protects your school district

Security Boulevard

Many districts remain unaware of CASBs or their necessity despite relying on cloud applications. This guide explains how these tools protect student safety in cloud-driven environments. A Cloud Access Security Broker (CASB) enforces security policies as an intermediary between cloud applications and users. Districts using Google Workspace, Microsoft 365, or similar platforms for collaboration and.

article thumbnail

The Social Security data breach compromised ‘billions’ of accounts. Here’s one easy, free way to protect yourself.

Heimadal Security

In early 2024, background checking service National Public Data was hit by a massive cyberattack that potentially compromised the sensitive, personal information of millions, or possibly even billions, of people around the world, including U.S. residents. A year later, new security threats have gained traction. While artificial intelligence has transformed the ability to prevent, detect, […] The post The Social Security data breach compromised ‘billions’ of accounts.

article thumbnail

Application Detection and Response Analysis: Why ADR? How ADR Works, and ADR Benefits

Security Boulevard

Two highly respected technology analysts from different cybersecurity disciplines are coming together to recommend that companies consider Application Detection and Response. Organizations face a constant barrage of cyber threats, including zero-day vulnerabilities that can exploit unknown weaknesses in software. Traditional security solutions often fall short in detecting and responding to these attacks, leaving organizations vulnerable.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Is OpenAI doomed? Open-source models may crush it, warns expert

Zero Day

Large language models are now commodities, making OpenAI's business model vulnerable to the economics of open-source AI such as DeepSeek, says Kai-Fu Lee.

116
116
article thumbnail

Sextortion scams are on the rise — and they’re getting personal

Security Boulevard

Scammers are in on the sextortion trend. Our expert analysis on this trend found that the likelihood of being targeted by sextortion scammers in the first few months of 2025 increased by a whopping 137% in the U.S., while the risk jumped to 49% in the U.K. and 34% in Australia. The post Sextortion scams are on the rise and theyre getting personal appeared first on Security Boulevard.

Scams 52
article thumbnail

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

The Hacker News

YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. "What's intriguing about this malware is how much it collects," Kaspersky said in an analysis.

Malware 111
article thumbnail

Optimize Your Security Budget and Improve Security with Threat-Informed Defense

Security Boulevard

Ive been on the road lately asking security leaders how their teams reply to the question: Can we defend our most valuable information assets against techniques known to be used by this threat actor, and, if not, what can we do about it? Answering this question quickly and with confidence is at the core of what security teams are paid to do. However, the cyber risk analysis required to answer this basic question is too costly for all but the most well-resourced security teams.

Risk 52
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!