Mon.Jul 22, 2024

article thumbnail

Snake Mimics a Spider

Schneier on Security

This is a fantastic video. It’s an Iranian spider-tailed horned viper ( Pseudocerastes urarachnoides ). Its tail looks like a spider, which the snake uses to fool passing birds looking for a meal.

220
220
article thumbnail

Google rolls back decision to kill third-party cookies in Chrome

Bleeping Computer

Google has scrapped its plan to kill third-party cookies in Chrome and will instead introduce a new browser experience to allows users to limit how these cookies are used. [.

132
132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EvilVideo, a Telegram Android zero-day allowed sending malicious APKs disguised as videos

Security Affairs

EvilVideo is a zero-day in the Telegram App for Android that allowed attackers to send malicious APK payloads disguised as videos. ESET researchers discovered a zero-day exploit named EvilVideo that targets the Telegram app for Android. The exploit was for sale on an underground forum from June 6, 2024, it allows attackers to share malicious Android payloads via Telegram, disguising them as multimedia files.

Hacking 135
article thumbnail

5 Ways Generative AI is Revolutionizing Cybersecurity Defense

Security Boulevard

Emerging at the forefront of technological innovation, Generative AI is reshaping the landscape of cybersecurity defense with groundbreaking advancements. This blog delves into 5 Ways Generative AI is Revolutionizing Cybersecurity Defense and how we protect digital assets. From proactive threat detection to automated response strategies, discover how this cutting-edge technology sets new cybersecurity resilience standards. […] The post 5 Ways Generative AI is Revolutionizing Cybersecurity Defens

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Surfshark vs CyberGhost (2024): Which VPN Is Better?

Tech Republic Security

Which VPN is better, Surfshark or CyberGhost? Compare these VPNs with our guide and find out which one is best for you.

VPN 136
article thumbnail

The Human Adaptability Gap and How to Close It

Security Boulevard

The “adaptability gap”—the widening difference between the rapid pace of technological progress and the slower rate of human, or employee adaptation. The post The Human Adaptability Gap and How to Close It appeared first on Security Boulevard.

More Trending

article thumbnail

SocGholish malware used to spread AsyncRAT malware

Security Affairs

The JavaScript downloader SocGholish (aka FakeUpdates) is being used to deliver the AsyncRAT and the legitimate open-source project BOINC. Huntress researchers observed the JavaScript downloader malware SocGholish (aka FakeUpdates ) that is being used to deliver remote access trojan AsyncRAT and the legitimate open-source project BOINC (Berkeley Open Infrastructure Network Computing Client).

Malware 138
article thumbnail

How to Prepare Your Workforce for the Deepfake Era

Security Boulevard

Of all of the AI-powered weapons, the one that your employees may be the least equipped to resist is deepfake technology. The post How to Prepare Your Workforce for the Deepfake Era appeared first on Security Boulevard.

article thumbnail

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

We Live Security

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos.

141
141
article thumbnail

UK police arrested a 17-year-old linked to the Scattered Spider gang

Security Affairs

Law enforcement arrested a 17-year-old boy from Walsall, U.K., for suspected involvement in the Scattered Spider cybercrime syndicate. Law enforcement in the U.K. arrested a 17-year-old teenager from Walsall who is suspected to be a member of the Scattered Spider cybercrime group (also known as UNC3944 , 0ktapus ). The arrest is the result of a joint international law enforcement operation carried out by the U.K.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Complex Technology Stack Supports Sprawling Chinese Crime Operation

Security Boulevard

A cybercrime group called Vigorish Viper runs a complex suite of technologies that support the sprawling operations of a Chinese crime syndicate that has its reach into illegal online sports gambling and Europe's most popular soccer teams. The post Complex Technology Stack Supports Sprawling Chinese Crime Operation appeared first on Security Boulevard.

article thumbnail

Vulnerability Recap 7/22/24 – CrowdStrike Issue Is One of Many

eSecurity Planet

The failed CrowdStrike sensor update that affected Windows systems may have put those computers at risk, but this is just one potential vulnerability during an interesting week. SolarWinds recently patched 13 vulnerabilities, and Ivanti has fixed yet another flaw in its Endpoint Manager product. The CISA requires federal agencies to patch their instances of GeoServer by August 5, and Wiz recently reported on a major AI model training vulnerability.

Software 113
article thumbnail

The Future of AI and Its Impact on Humanity

Security Boulevard

As AI continues to advance at a rapid pace, its potential to revolutionize various aspects of human life grows exponentially. From healthcare and education to transportation and employment, artificial intelligence is poised to reshape our world in profound ways The post The Future of AI and Its Impact on Humanity appeared first on Security Boulevard.

article thumbnail

PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

The Hacker News

A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the abuse of the cloud computing model for malicious purposes.

Phishing 115
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Select a Qualified SOC 2 Auditor

Security Boulevard

Obtaining a SOC 2 (Service Organization Control 2) certification is crucial in ensuring your data’s security and privacy. SOC 2 compliance demonstrates that your organization adheres to high standards for managing customer data based on five “trust service criteria”: Selecting a top SOC 2 auditor is essential for a successful audit. Here’s a comprehensive guide […] The post How to Select a Qualified SOC 2 Auditor appeared first on Centraleyes.

113
113
article thumbnail

Google Abandons Plan to Phase Out Third-Party Cookies in Chrome

The Hacker News

Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years after it introduced the option as part of a larger set of a controversial proposal called the Privacy Sandbox.

115
115
article thumbnail

Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity

Security Boulevard

A managed service provider must work with each client to determine the level of support needed and improve the service over time to meet changing business needs. The post Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity appeared first on Security Boulevard.

article thumbnail

The Pentagon Wants to Spend $141 Billion on a Doomsday Machine

WIRED Threat Level

The DOD wants to refurbish ICBM silos that give it the ability to end civilization. But these missiles are useless as weapons, and their other main purpose—attracting an enemy’s nuclear strikes—serves no end.

108
108
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

New Play ransomware Linux version targets VMware ESXi VMs

Bleeping Computer

Play ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines. [.

article thumbnail

How to Set up an Automated SMS Analysis Service with AI in Tines

The Hacker News

The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save time and enhance your organization’s security posture is by building an automated SMS analysis service. Workflow automation platform Tines provides a good example of how to do it.

102
102
article thumbnail

Spain arrests three for using DDoSia hacktivist platform

Bleeping Computer

The Spanish authorities have arrested three individuals for using DDoSia, a distributed denial of service platform operated by pro-Russian hacktivists, to conduct DDoS attacks against governments and organizations in NATO countries. [.

DDOS 102
article thumbnail

Embracing the AI-Integrated Software Revolution

Veracode Security

The shift to AI-integrated software development isn’t just a trend; it's a fundamental change that’s reshaping industries and redefining the future of technology. This shift brings both revolutionary potential and formidable cyber challenges. Cyber challenges that King Charles III even addressed in the proposals of his King’s Speech on July 17. As we plunge into the AI era, we must understand how these changes are unfolding and what they signify for technological advancement.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Los Angeles Superior Court shuts down after ransomware attack

Bleeping Computer

The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations on Monday to restore systems affected by a Friday ransomware attack. [.

article thumbnail

CrowdStrike’s Faulty Update Triggers Global Microsoft Outage

eSecurity Planet

A major tech disruption swept across the globe on July 19, as a widespread Microsoft outage crippled crucial services for businesses and individual users alike. The outage, which lasted for several hours, sent shockwaves through various sectors, causing significant delays, cancellations, and frustration. Airlines grounded flights as crucial check-in and flight management software malfunctioned, stranding passengers and throwing travel plans into disarray.

Backups 98
article thumbnail

Hiring Kit: Security Architect

Tech Republic Security

Developing and implementing both preventive security protocols and effective response plans is complicated and requires a security architect with a clear vision. This customizable hiring kit, written by Mark W. Kaelin for TechRepublic Premium, provides a framework you can use to find the best candidate for your organization. The kit includes salary details, a job.

83
article thumbnail

New ‘False File Immutability’ Vulnerability Poses Significant Threat to Windows Security

Penetration Testing

A newly discovered vulnerability class, termed “False File Immutability” (FFI), has raised serious concerns within the cybersecurity community due to its potential to circumvent Windows Code Integrity (CI), a critical security mechanism. The vulnerability,... The post New ‘False File Immutability’ Vulnerability Poses Significant Threat to Windows Security appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Police infiltrates, takes down DigitalStress DDoS-for-hire service

Bleeping Computer

DDoS-for-hire service DigitalStress was taken down on July 2 in a joint law enforcement operation led by the United Kingdom's National Crime Agency (NCA). [.

DDOS 97
article thumbnail

CVE-2024-39907 (CVSS 9.8): SQLi Flaw Exposes 1Panel Users to Remote Takeover, PoC Published

Penetration Testing

A critical-severity vulnerability has been discovered in 1Panel, an open-source, web-based server management control panel. Designated as CVE-2024-39907, this SQL injection flaw has a CVSS score of 9.8, underscoring its potential for significant impact.... The post CVE-2024-39907 (CVSS 9.8): SQLi Flaw Exposes 1Panel Users to Remote Takeover, PoC Published appeared first on Cybersecurity News.

article thumbnail

Greece’s Land Registry agency breached in wave of 400 cyberattacks

Bleeping Computer

The Land Registry agency in Greece has announced that it suffered a limited-scope data breach following a wave of 400 cyberattacks targeting its IT infrastructure over the last week. [.

article thumbnail

QR Codes: Convenience or Cyberthreat?

Trend Micro

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.