Tue.Dec 10, 2024

article thumbnail

Google Chrome Patches High-Severity Vulnerabilities – CVE-2024-12381 & CVE-2024-12382

Penetration Testing

Google has announced its Chrome browser’s latest stable channel update, addressing several security vulnerabilities, including two classified as “High” severity. The update, rolling out progressively to Windows, Mac, and Linux... The post Google Chrome Patches High-Severity Vulnerabilities – CVE-2024-12381 & CVE-2024-12382 appeared first on Cybersecurity News.

article thumbnail

Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down

Security Boulevard

SpartanWarrioz, whose prolific phishing kit business took a hit when the group's Telegram channel was shut down in November, is rebounding quickly, creating a new channel and courting former subscribers as it rebuilds its operations, Forta researchers say. The post Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down appeared first on Security Boulevard.

Scams 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Full-Face Masks to Frustrate Identification

Schneier on Security

This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual scrutiny. And they’re cheap and easy to swap.

285
285
article thumbnail

Researcher Details CVE-2024-44131 – A Critical TCC Bypass in macOS and iOS

Penetration Testing

Jamf Threat Labs has identified a vulnerability in Apples Transparency, Consent, and Control (TCC) security framework. Designated as CVE-2024-44131, this flaw enables malicious applications to bypass user consent mechanisms and... The post Researcher Details CVE-2024-44131 – A Critical TCC Bypass in macOS and iOS appeared first on Cybersecurity News.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Auguria Streamlines Management of Security Log Data

Security Boulevard

Auguria today at the Black Hat Europe conference, in addition to providing five additional integrations with other platforms, revealed it has added an explainability graph capability that makes it simple to understand why log data collected is either irrelevant or warrants further investigation. The post Auguria Streamlines Management of Security Log Data appeared first on Security Boulevard.

article thumbnail

Cybersecurity News Round-Up 2024: 10 Biggest Stories That Dominated the Year

Tech Republic Security

TechRepublic looks back at the biggest cybersecurity stories of 2024, from record data breaches to rising ransomware threats and CISO burnout.

CISO 185

LifeWorks

More Trending

article thumbnail

Defending Against AI-Powered Attacks in a “Spy vs. Spy” World

Security Boulevard

Although AI can enhance threat detection and response capabilities, it also introduces sophisticated attack vectors that require a rethink of traditional security models. The post Defending Against AI-Powered Attacks in a Spy vs. Spy World appeared first on Security Boulevard.

article thumbnail

The ‘Ghost Gun’ Linked to Luigi Mangione Shows Just How Far 3D-Printed Weapons Have Come

WIRED Threat Level

The design of the gun police say they found on the alleged United Healthcare CEO's killerthe FMDA or Free Men Dont Askwas released by a libertarian group.

article thumbnail

Given Today’s Data Complexity, a Platform Mindset is Crucial for Cyber Recovery

Security Boulevard

For too long, architecting for cyber recovery and resiliency was on the vision board for a distant future. Unfortunately, that distant future is here, but many companies have not started this critical effort. The post Given Todays Data Complexity, a Platform Mindset is Crucial for Cyber Recovery appeared first on Security Boulevard.

article thumbnail

A Guide to Choosing the Best SCADA Software for Your Organization

SecureWorld News

Supervisory control and data acquisition (SCADA) systems are at the heart of modern industrial operations. It includes systems that provide real-time monitoring, control, and analysis of critical processes. To increase operational efficiency and guarantee and enable scalability, selecting the right SCADA software is mandatory. My article below will guide you through comparing SCADA software and help you understand the features to select the most appropriate software for your organization.

Software 103
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybersecurity Companies Must Practice What They Preach to Avoid the Data Paradox

Security Boulevard

Cybersecurity companies traditionally considered pioneers of data innovation are often the ones struggling to unlock the full potential of the data they collect within their own organizations. The post Cybersecurity Companies Must Practice What They Preach to Avoid the Data Paradox appeared first on Security Boulevard.

article thumbnail

Innovative Marketing Ideas Every B2C Business Should Try

SecureBlitz

Here are innovative marketing ideas every B2C business should try. Maintaining a competitive advantage in the hectic field of business depends on always being ahead of the curve. Particularly with social media and digital platforms rising, the B2C scene has changed drastically. Creative marketing techniques are necessary to remain current and grab the interest of […] The post Innovative Marketing Ideas Every B2C Business Should Try appeared first on SecureBlitz Cybersecurity.

B2C 95
article thumbnail

GitGuardian Extends Reach to Manage Non-Human Identities

Security Boulevard

GitGuardian today extended the reach of its ability to manage applications secrets into the realm of non-human identities (NHI) associated with machines and software components. The post GitGuardian Extends Reach to Manage Non-Human Identities appeared first on Security Boulevard.

Software 102
article thumbnail

Microsoft Addresses Critical Zero-Day CVE-2024-49138 & 72 Additional Flaws in December Patch Tuesday

Penetration Testing

Microsoft has released its December 2024 Patch Tuesday security update, addressing a total of 73 vulnerabilities across its product portfolio. This comprehensive update includes fixes for 16 critical and 54... The post Microsoft Addresses Critical Zero-Day CVE-2024-49138 & 72 Additional Flaws in December Patch Tuesday appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft’s December 2024 Patch Tuesday Addresses 70 CVEs (CVE-2024-49138)

Security Boulevard

16 Critical 54 Important 0 Moderate 0 Low Microsoft addresses 70 CVEs with 16 rated critical, including one zero-day that was exploited in the wild. Microsoft patched 70 CVEs in its December 2024 Patch Tuesday release, with 16 rated critical, and 54 rated as important. This months update includes patches for: GitHub Microsoft Defender for Endpoint Microsoft Office Microsoft Office Access Microsoft Office Excel Microsoft Office Publisher Microsoft Office SharePoint Microsoft Office Word Remote De

Wireless 100
article thumbnail

TGPT AI Based Chat Bot For Your Linux Terminal

Hacker's King

If you're a tech enthusiast or a developer, the world of chatbots is exciting and ever-evolving, especially with advancements in AI. One of the most intriguing innovations in this space is TGPT, an OpenAI chatbot designed specifically for terminal environments and it doesn't require any API integration. You may also like to read: Email Investigation Using H8mail On Your Linux Imagine the power of advanced natural language processing at your fingertips, right in your command line interface!

article thumbnail

AppLite: A New AntiDot Variant Targeting Mobile Employee Devices

Security Boulevard

Our zLabs team has identified an extremely sophisticated mishing (mobile-targeted phishing) campaign that delivers malware to the users Android mobile device enabling a broad set of malicious actions including credential theft of banking, cryptocurrency and other critical applications. The post AppLite: A New AntiDot Variant Targeting Mobile Employee Devices appeared first on Zimperium.

Mobile 90
article thumbnail

From Informational to Critical: Chaining & Elevating Web Vulnerabilities

NetSpi Technical

As a Security Consultant II at NetSPI, I’ve had the opportunity to dig into a variety of security issues during engagements, ranging from simple misconfigurations to complex attack chains. One recent project gave me the opportunity to uncover a critical vulnerability by chaining multiple findings together. This turned an initially informational issue into a high-severity, exploitative scenario.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

MoqHao Malware Targets Apple IDs and Android Devices Using iCloud and VK Platforms

Penetration Testing

A new campaign by the Roaming Mantis-affiliated MoqHao malware family, also known as Wroba and XLoader, has been uncovered by Threat Hunting Platform – Hunt.io. The campaign exploits trusted platforms... The post MoqHao Malware Targets Apple IDs and Android Devices Using iCloud and VK Platforms appeared first on Cybersecurity News.

Malware 78
article thumbnail

Poker Cheaters Allegedly Use Tiny Hidden Cameras to Spot Dealt Cards

WIRED Threat Level

Several recent schemes were uncovered involving poker players at casinos allegedly using miniature cameras, concealed in personal electronics, to spot cards. Should players everywhere be concerned?

Hacking 74
article thumbnail

Exploiting CDN Integrations: A WAF Bypass Threatening Global Web Applications

Penetration Testing

In a recently disclosed analysis, Zafran’s research team has unveiled a pervasive misconfiguration vulnerability affecting some of the world’s largest web application firewall (WAF) vendors, including Akamai, Cloudflare, Fastly, and... The post Exploiting CDN Integrations: A WAF Bypass Threatening Global Web Applications appeared first on Cybersecurity News.

article thumbnail

Leveraging AI in Reverse Engineering: Techniques, Challenges, and Future Trends

Pen Test

Reverse engineering is the process of deconstructing a product or system to understand its design, architecture, and functionality. This technique is commonly used in various fields, including software development, hardware design, cybersecurity. The primary goal of reverse engineering is to analyze how a system works, identify its components, and uncover any underlying principles or mechanisms.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Microsoft Strengthens Default Security Posture Against NTLM Relay Attacks

Penetration Testing

Microsoft has announced significant enhancements to its default security configuration, aimed at mitigating the risk of NTLM relay attacks across its ecosystem. In a recent blog post, the company detailed... The post Microsoft Strengthens Default Security Posture Against NTLM Relay Attacks appeared first on Cybersecurity News.

Risk 72
article thumbnail

Microsoft December 2024 Patch Tuesday addressed actively exploited zero-day

Security Affairs

Microsoft December 2024 Patch Tuesday security updates addressed 71 vulnerabilities including an actively exploited zero-day. Microsoft December 2024 Patch Tuesday security updates addressed 71 vulnerabilities in Windows and Windows Components, Office and Office Components, SharePoint Server, Hyper-V, Defender for Endpoint, and System Center Operations Manager. 16 vulnerabilities are rated Critical, 54 are rated Important, and one is rated Moderate in severity.

article thumbnail

CVE-2024-11639 (CVSS 10) – Critical Flaw in Ivanti Cloud Services Application: Immediate Patch Recommended

Penetration Testing

Ivanti, a leading provider of IT management and security solutions, has released critical security updates for the Ivanti Cloud Services Application (CSA). These updates address vulnerabilities that could lead to... The post CVE-2024-11639 (CVSS 10) – Critical Flaw in Ivanti Cloud Services Application: Immediate Patch Recommended appeared first on Cybersecurity News.

article thumbnail

Unlocking the Value of DSPM: What You Need to Know

IT Security Guru

Considering the number of breaches that hit the headlines every day, its no surprise that data security has become a top priority for entities in every industry. As businesses increasingly adopt cloud-native environments, they face the challenge of securing sensitive data while staying on the right side of regulatory watchdogs. This is where Data Security Posture Management (DSPM) comes in.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

No Warning, No Data: Hetzner Terminates Kiwix Account Abruptly

Penetration Testing

A recent incident involving Hetzner, a well-known European cloud hosting provider, and Kiwix, a non-profit organization dedicated to offline access to Wikipedia, has brought to light critical considerations regarding cloud... The post No Warning, No Data: Hetzner Terminates Kiwix Account Abruptly appeared first on Cybersecurity News.

article thumbnail

How easily access cards can be cloned and why your PACS might be vulnerable

Pen Test Partners

TL;DR Access cards can be cloned There are practical measures to make card cloning difficult Practical guidance on how these systems work and why you should make sure theyre configured right What is a physical access control system? A physical access control system, or PACS, is the system that opens the door when you scan your identity card or smart phone app on a reader.

article thumbnail

Schneider Electric Warns of Critical Flaw in Modicon Controllers – CVE-2024-11737 (CVSS 9.8)

Penetration Testing

Schneider Electric has issued a security notification warning of a critical vulnerability affecting its Modicon M241, M251, M258, and LMC058 Programmable Logic Controllers (PLCs). The vulnerability, tracked as CVE-2024-11737 and... The post Schneider Electric Warns of Critical Flaw in Modicon Controllers – CVE-2024-11737 (CVSS 9.8) appeared first on Cybersecurity News.

article thumbnail

U.S. CISA adds Microsoft Windows CLFS driver flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows Common Log File System (CLFS) driver flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Microsoft Windows Common Log File System (CLFS) driver flaw CVE-2024-49138 (CVSS score: 7.8) to its Known Exploited Vulnerabilities (KEV) catalog.

Hacking 59
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!