Fri.Jan 17, 2025

article thumbnail

Social Engineering to Disable iMessage Protections

Schneier on Security

I am always interested in new phishing tricks, and watching them spread across the ecosystem. A few days ago I started getting phishing SMS messages with a new twist. They were standard messages about delayed packages or somesuch, with the goal of getting me to click on a link and entering some personal information into a website. But because they came from unknown phone numbers, the links did not work.

article thumbnail

WhatsApp spear phishing campaign uses QR codes to add device

Malwarebytes

A cybercriminal campaign linked to Russia is deploying QR codes to access the WhatsApp accounts of high-profile targets like journalists, members of think tanks, and employees of non-governmental organizations (NGOs), according to new details revealed by Microsoft. The group, which Microsoft tracks by the name “Star Blizzard,” is also referred to as Coldriver by other researchers.

Phishing 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems

Security Affairs

Researchers detailed a now-patched vulnerability that could allow a bypass of the Secure Boot mechanism in UEFI systems. ESET disclosed details of a now-patched vulnerability, tracked as CVE-2024-7344 (CVSS score: 6.7), that could allow a bypass of the Secure Boot mechanism in UEFI systems. The Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface between an operating system and platform firmware.

Firmware 107
article thumbnail

Cybersecurity Breaches Degrade Consumer Trust, but Apathy Rises

Security Boulevard

Most consumers are still unaware of their own role in cybersecurity incidents and continue to place primary blame on external bad actors. The post Cybersecurity Breaches Degrade Consumer Trust, but Apathy Rises appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical Aviatrix Controllers OS Command Injection vulnerability, tracked as CVE-2024-50603 (CVSS score of 10) to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

How Much of Your Business is Exposed on the Dark Web? 

Security Boulevard

The dark web is a thriving underground market where stolen data and corporate vulnerabilities are openly traded. This hidden economy poses a direct and growing threat to businesses worldwide. Recent breaches highlight the danger. The post How Much of Your Business is Exposed on the Dark Web? appeared first on Security Boulevard.

Marketing 118

LifeWorks

More Trending

article thumbnail

California Wildfires Spark Phishing Scams Exploiting Chaos

Security Boulevard

As Southern California continues to battle devastating wildfires, cybercriminals have seized the opportunity to exploit the chaos, targeting vulnerable individuals and organizations. The post California Wildfires Spark Phishing Scams Exploiting Chaos appeared first on Security Boulevard.

Scams 108
article thumbnail

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

The Hacker News

Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December.

Phishing 139
article thumbnail

Security Concerns Complicate Multi-Cloud Adoption Strategies

Security Boulevard

While cloud adoption continues to drive digital transformation, the shift to the cloud introduces critical security challenges that organizations must address. The post Security Concerns Complicate Multi-Cloud Adoption Strategies appeared first on Security Boulevard.

article thumbnail

10 Linux apps I install on every new machine (and why you should, too)

Zero Day

If you're wondering which apps take priority on your new Linux machine, these 10 will help you get the most out of the OS.

135
135
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cohesity Extends Services Reach to Incident Response Platforms

Security Boulevard

Cohesity has extended its Cyber Event Response Team (CERT) service to include third-party providers of incident response platforms, including Palo Alto Networks Unit 42, Arctic Wolf, Sophos, Fenix24 and Semperis. The post Cohesity Extends Services Reach to Incident Response Platforms appeared first on Security Boulevard.

article thumbnail

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

The Hacker News

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. "People's Republic of China-linked (PRC) malicious cyber actors continue to target U.S.

article thumbnail

AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats

Security Boulevard

AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, offering advanced tools to predict, detect, and respond to threats with unprecedented speed and accuracy.

article thumbnail

A Brief Guide for Dealing with ‘Humanless SOC’ Idiots

Anton on Security

image by Meta.AI lampooning humanless SOC My former colleagues have written several serious pieces of research about why a SOC without humans will never happen ( Predict 2025: There Will Never Be an Autonomous SOC , The Autonomous SOC Is A Pipe Dream , Stop Trying To Take Humans Out Of Security Operations ). But I wanted to write a funny companion to this called How to Talk to Idiots Who Believe in Humanless SOC.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

5 lightweight Linux distributions that will bring your old PC back to life

Zero Day

If you have an aging computer and want to repurpose it, these lightweight Linux distributions will serve you for years to come.

126
126
article thumbnail

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation

The Hacker News

Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty's Tomer Goldschmidt said in a Thursday report.

article thumbnail

What is a Network Security Audit and How It Ensures Your Data Stays Safe?

Security Boulevard

Cyber threats are becoming more sophisticated and persistent, safeguarding sensitive data is paramount for businesses. From ransomware attacks to data breaches, organizations face constant threats that can compromise their operations and reputation. A network security audit serves as a critical safeguard, enabling businesses to identify vulnerabilities, strengthen defenses, and ensure data protection.

article thumbnail

Why the OnePlus 13R is the best-value Android phone you can buy right now

Zero Day

The OnePlus 13R undercuts the competition by hundreds of dollars, leveraging the same winning formula from the OnePlus 12R to help it stand out.

124
124
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

The Hacker News

Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis.

article thumbnail

Upgrading to Wi-Fi 7? This new router gave me fast speeds, is easy to use, and highly secure

Zero Day

The Asus RT-BE86U is loaded with security tools, letting you enjoy the next generation of high-speed internet safely.

Internet 119
article thumbnail

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

The Hacker News

Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD.

article thumbnail

This $600 OnePlus phone has made it very difficult for me to recommend pricier flagships

Zero Day

The OnePlus 13R undercuts the competition by hundreds of dollars while offering a display and performance package that's easy to appreciate.

119
119
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

5 Reasons to Start a Cybersecurity Career with Security+

CompTIA on Cybersecurity

Kickstart your cybersecurity career with CompTIA Security+. Explore the top 5 reasons why this certification is a must-have for IT professionals.

article thumbnail

Samsung Care+ includes free same-day screen repairs for Galaxy devices now

Zero Day

The expansion of Samsung's device protection program means you won't pay anything (extra) to fix a cracked screen.

111
111
article thumbnail

How to Deal With Water Damage to Your Phone

SecureBlitz

Learn how to deal with water damage to your phone in this post. Water damage is one of the most dreaded issues when it comes to smartphones. It doesnt matter how careful you are, accidents happen. You could drop your phone in a puddle, spill a drink on it, or drop it in a pool. […] The post How to Deal With Water Damage to Your Phone appeared first on SecureBlitz Cybersecurity.

article thumbnail

Managing AI agents as employees is the challenge of 2025, says Goldman Sachs CIO

Zero Day

There may even be AI 'layoffs' as programs are replaced by more highly capable versions.

111
111
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Negotiate Your NIS2 Fine or Completely Avoid the Risk

Heimadal Security

In the next few years, a growing number of organizations across Europe will face investigations for non-compliance with the NIS2 Directive. If they are found to have poor cybersecurity practices, they may well be forced to pay multi-million Euro fines and other penalties. The best way to manage the risk of NIS2 penalties is, of […] The post How to Negotiate Your NIS2 Fine or Completely Avoid the Risk appeared first on Heimdal Security Blog.

Risk 98
article thumbnail

Why the 'Bring Your Own AI' trend could mean big trouble for business leaders

Zero Day

Your staff will take matters into their own hands if you don't take a tight grip on generative AI. Here's how to wrestle back control.

108
108
article thumbnail

Best Tips to Help You Avoid Regular iPhone Malfunctions

SecureBlitz

In this post, I will show you the best tips to help you avoid regular iPhone malfunctions. Lets face it: our iPhones are practically extensions of ourselves. We use them for everything from ordering lunch to capturing memories. However, frequent hardware issues can quickly turn your trusty device into a source of frustration. The good […] The post Best Tips to Help You Avoid Regular iPhone Malfunctions appeared first on SecureBlitz Cybersecurity.

article thumbnail

The Apple AirTag 4-pack is down to $70 for the first time since holiday sales

Zero Day

Grab a 4-pack of Apple AirTags for $29 off right now at Amazon so you can help the iPhone user in your life monitor their keys, wallet, luggage, and more.

105
105
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!