Tue.Dec 10, 2024

article thumbnail

Full-Face Masks to Frustrate Identification

Schneier on Security

This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual scrutiny. And they’re cheap and easy to swap.

239
239
article thumbnail

Patch Tuesday, December 2024 Edition

Krebs on Security

Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138 , a security weakness in the Windows Common Log File System (CLFS) driver — used by applications to write transaction logs — that could let an authenticated attacker gain “system” level privileges on a vulnerable Windows device.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity News Round-Up 2024: 10 Biggest Stories That Dominated the Year

Tech Republic Security

TechRepublic looks back at the biggest cybersecurity stories of 2024, from record data breaches to rising ransomware threats and CISO burnout.

CISO 142
article thumbnail

Google Chrome Patches High-Severity Vulnerabilities – CVE-2024-12381 & CVE-2024-12382

Penetration Testing

Google has announced its Chrome browser’s latest stable channel update, addressing several security vulnerabilities, including two classified as “High” severity. The update, rolling out progressively to Windows, Mac, and Linux... The post Google Chrome Patches High-Severity Vulnerabilities – CVE-2024-12381 & CVE-2024-12382 appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

EU Cyber Resilience Act: What You Need to Know

Tech Republic Security

The E.U. Cyber Resilience Act is now in effect. The legislation affects manufacturers, distributors, and importers of software and hardware.

article thumbnail

The ‘Ghost Gun’ Linked to Luigi Mangione Shows Just How Far 3D-Printed Weapons Have Come

WIRED Threat Level

The design of the gun police say they found on the alleged United Healthcare CEO's killerthe FMDA or Free Men Dont Askwas released by a libertarian group.

More Trending

article thumbnail

Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down

Security Boulevard

SpartanWarrioz, whose prolific phishing kit business took a hit when the group's Telegram channel was shut down in November, is rebounding quickly, creating a new channel and courting former subscribers as it rebuilds its operations, Forta researchers say. The post Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down appeared first on Security Boulevard.

Scams 114
article thumbnail

Apache Superset Patches Multi Security Flaws in Latest Release

Penetration Testing

The Apache Software Foundation has announced the release of Apache Superset 4.1.0, an important update that addresses three significant security vulnerabilities affecting the widely used open-source business intelligence platform. These... The post Apache Superset Patches Multi Security Flaws in Latest Release appeared first on Cybersecurity News.

Software 108
article thumbnail

Auguria Streamlines Management of Security Log Data

Security Boulevard

Auguria today at the Black Hat Europe conference, in addition to providing five additional integrations with other platforms, revealed it has added an explainability graph capability that makes it simple to understand why log data collected is either irrelevant or warrants further investigation. The post Auguria Streamlines Management of Security Log Data appeared first on Security Boulevard.

article thumbnail

Cybercriminals Impersonate Dubai Police to Defraud Consumers in the UAE – Smishing Triad in Action

Security Affairs

Resecurity uncovered a large-scale fraud campaign in the UAE where scammers impersonate law enforcement to target consumers. Resecurity has identified a wide-scale fraudulent campaign targeting consumers in the UAE by impersonating law enforcement. Victims are asked to pay non-existent fines online (traffic tickets, parking violations, driving license renewals) following multiple phone calls made on behalf of Dubai Police officers.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Challenge Will Test LLM Defenses Against Prompt Injections

Security Boulevard

Microsoft is calling out to researchers to participate in a competition that is aimed at testing the latest protections in LLMs against prompt injection attacks, which OWASP is calling the top security risk facing the AI models as the industry rolls into 2025. The post Microsoft Challenge Will Test LLM Defenses Against Prompt Injections appeared first on Security Boulevard.

Risk 106
article thumbnail

Researcher Details CVE-2024-44131 – A Critical TCC Bypass in macOS and iOS

Penetration Testing

Jamf Threat Labs has identified a vulnerability in Apples Transparency, Consent, and Control (TCC) security framework. Designated as CVE-2024-44131, this flaw enables malicious applications to bypass user consent mechanisms and... The post Researcher Details CVE-2024-44131 – A Critical TCC Bypass in macOS and iOS appeared first on Cybersecurity News.

article thumbnail

Cybersecurity Companies Must Practice What They Preach to Avoid the Data Paradox

Security Boulevard

Cybersecurity companies traditionally considered pioneers of data innovation are often the ones struggling to unlock the full potential of the data they collect within their own organizations. The post Cybersecurity Companies Must Practice What They Preach to Avoid the Data Paradox appeared first on Security Boulevard.

article thumbnail

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

The Hacker News

97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

GitGuardian Extends Reach to Manage Non-Human Identities

Security Boulevard

GitGuardian today extended the reach of its ability to manage applications secrets into the realm of non-human identities (NHI) associated with machines and software components. The post GitGuardian Extends Reach to Manage Non-Human Identities appeared first on Security Boulevard.

Software 102
article thumbnail

Poker Cheaters Allegedly Use Tiny Hidden Cameras to Spot Dealt Cards

WIRED Threat Level

Several recent schemes were uncovered involving poker players at casinos allegedly using miniature cameras, concealed in personal electronics, to spot cards. Should players everywhere be concerned?

Hacking 96
article thumbnail

Defending Against AI-Powered Attacks in a “Spy vs. Spy” World

Security Boulevard

Although AI can enhance threat detection and response capabilities, it also introduces sophisticated attack vectors that require a rethink of traditional security models. The post Defending Against AI-Powered Attacks in a Spy vs. Spy World appeared first on Security Boulevard.

article thumbnail

Decrypting Full Disk Encryption with Dissect

Fox IT

Author: Guus Beckers Back in2022Fox-IT decided to open source its proprietary incident response tooling known as Dissect. Since then it has been adopted by many different companies in their regular workflow. For those of you who are not yet familiar with Dissect, it is an incident response framework built with incident response engagements of any scale in mind.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Given Today’s Data Complexity, a Platform Mindset is Crucial for Cyber Recovery

Security Boulevard

For too long, architecting for cyber recovery and resiliency was on the vision board for a distant future. Unfortunately, that distant future is here, but many companies have not started this critical effort. The post Given Todays Data Complexity, a Platform Mindset is Crucial for Cyber Recovery appeared first on Security Boulevard.

article thumbnail

UAC-0185 APT Leverages Social Engineering to Target Ukrainian Defense Industrial Base

Penetration Testing

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued a security advisory (CERT-UA#12414) detailing a sophisticated phishing campaign targeting organizations within Ukraine’s defense industrial base. The attacks, attributed to... The post UAC-0185 APT Leverages Social Engineering to Target Ukrainian Defense Industrial Base appeared first on Cybersecurity News.

article thumbnail

You can boost your cybersecurity skills for free with this new initiative

Zero Day

article thumbnail

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

The Hacker News

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Microsoft Addresses Critical Zero-Day CVE-2024-49138 & 72 Additional Flaws in December Patch Tuesday

Penetration Testing

Microsoft has released its December 2024 Patch Tuesday security update, addressing a total of 73 vulnerabilities across its product portfolio. This comprehensive update includes fixes for 16 critical and 54... The post Microsoft Addresses Critical Zero-Day CVE-2024-49138 & 72 Additional Flaws in December Patch Tuesday appeared first on Cybersecurity News.

article thumbnail

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

The Hacker News

Banking 84
article thumbnail

Why Google's legal troubles could hasten Firefox's slide into irrelevance

Zero Day

80
article thumbnail

A Guide to Choosing the Best SCADA Software for Your Organization

SecureWorld News

Supervisory control and data acquisition (SCADA) systems are at the heart of modern industrial operations. It includes systems that provide real-time monitoring, control, and analysis of critical processes. To increase operational efficiency and guarantee and enable scalability, selecting the right SCADA software is mandatory. My article below will guide you through comparing SCADA software and help you understand the features to select the most appropriate software for your organization.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged

The Hacker News

78
article thumbnail

Get a 5-year VPN subscription for $35 with this deal

Zero Day

VPN 73
article thumbnail

Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands

The Hacker News

article thumbnail

From Informational to Critical: Chaining & Elevating Web Vulnerabilities

NetSpi Technical

As a Security Consultant II at NetSPI, I’ve had the opportunity to dig into a variety of security issues during engagements, ranging from simple misconfigurations to complex attack chains. One recent project gave me the opportunity to uncover a critical vulnerability by chaining multiple findings together. This turned an initially informational issue into a high-severity, exploitative scenario.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.