Mon.Jul 22, 2024

article thumbnail

Snake Mimics a Spider

Schneier on Security

This is a fantastic video. It’s an Iranian spider-tailed horned viper ( Pseudocerastes urarachnoides ). Its tail looks like a spider, which the snake uses to fool passing birds looking for a meal.

206
206
article thumbnail

Google rolls back decision to kill third-party cookies in Chrome

Bleeping Computer

Google has scrapped its plan to kill third-party cookies in Chrome and will instead introduce a new browser experience to allows users to limit how these cookies are used. [.

132
132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking

The Hacker News

The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A Chinese organized crime syndicate with links to money laundering and human trafficking across Southeast Asia has been using an advanced "technology suite" that runs the whole cybercrime supply chain spectrum to spearhead its operations.

article thumbnail

5 Ways Generative AI is Revolutionizing Cybersecurity Defense

Security Boulevard

Emerging at the forefront of technological innovation, Generative AI is reshaping the landscape of cybersecurity defense with groundbreaking advancements. This blog delves into 5 Ways Generative AI is Revolutionizing Cybersecurity Defense and how we protect digital assets. From proactive threat detection to automated response strategies, discover how this cutting-edge technology sets new cybersecurity resilience standards. […] The post 5 Ways Generative AI is Revolutionizing Cybersecurity Defens

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Surfshark vs CyberGhost (2024): Which VPN Is Better?

Tech Republic Security

Which VPN is better, Surfshark or CyberGhost? Compare these VPNs with our guide and find out which one is best for you.

VPN 134
article thumbnail

The Human Adaptability Gap and How to Close It

Security Boulevard

The “adaptability gap”—the widening difference between the rapid pace of technological progress and the slower rate of human, or employee adaptation. The post The Human Adaptability Gap and How to Close It appeared first on Security Boulevard.

More Trending

article thumbnail

The Pentagon Wants to Spend $141 Billion on a Doomsday Machine

WIRED Threat Level

The DOD wants to refurbish ICBM silos that give it the ability to end civilization. But these missiles are useless as weapons, and their other main purpose—attracting an enemy’s nuclear strikes—serves no end.

118
118
article thumbnail

Google Abandons Plan to Phase Out Third-Party Cookies in Chrome

The Hacker News

Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years after it introduced the option as part of a larger set of a controversial proposal called the Privacy Sandbox.

118
118
article thumbnail

How to Prepare Your Workforce for the Deepfake Era

Security Boulevard

Of all of the AI-powered weapons, the one that your employees may be the least equipped to resist is deepfake technology. The post How to Prepare Your Workforce for the Deepfake Era appeared first on Security Boulevard.

article thumbnail

EvilVideo, a Telegram Android zero-day allowed sending malicious APKs disguised as videos

Security Affairs

EvilVideo is a zero-day in the Telegram App for Android that allowed attackers to send malicious APK payloads disguised as videos. ESET researchers discovered a zero-day exploit named EvilVideo that targets the Telegram app for Android. The exploit was for sale on an underground forum from June 6, 2024, it allows attackers to share malicious Android payloads via Telegram, disguising them as multimedia files.

Hacking 114
article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

Complex Technology Stack Supports Sprawling Chinese Crime Operation

Security Boulevard

A cybercrime group called Vigorish Viper runs a complex suite of technologies that support the sprawling operations of a Chinese crime syndicate that has its reach into illegal online sports gambling and Europe's most popular soccer teams. The post Complex Technology Stack Supports Sprawling Chinese Crime Operation appeared first on Security Boulevard.

article thumbnail

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

We Live Security

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos.

136
136
article thumbnail

The Future of AI and Its Impact on Humanity

Security Boulevard

As AI continues to advance at a rapid pace, its potential to revolutionize various aspects of human life grows exponentially. From healthcare and education to transportation and employment, artificial intelligence is poised to reshape our world in profound ways The post The Future of AI and Its Impact on Humanity appeared first on Security Boulevard.

article thumbnail

SocGholish malware used to spread AsyncRAT malware

Security Affairs

The JavaScript downloader SocGholish (aka FakeUpdates) is being used to deliver the AsyncRAT and the legitimate open-source project BOINC. Huntress researchers observed the JavaScript downloader malware SocGholish (aka FakeUpdates ) that is being used to deliver remote access trojan AsyncRAT and the legitimate open-source project BOINC (Berkeley Open Infrastructure Network Computing Client).

Malware 109
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to Select a Qualified SOC 2 Auditor

Security Boulevard

Obtaining a SOC 2 (Service Organization Control 2) certification is crucial in ensuring your data’s security and privacy. SOC 2 compliance demonstrates that your organization adheres to high standards for managing customer data based on five “trust service criteria”: Selecting a top SOC 2 auditor is essential for a successful audit. Here’s a comprehensive guide […] The post How to Select a Qualified SOC 2 Auditor appeared first on Centraleyes.

111
111
article thumbnail

New Play ransomware Linux version targets VMware ESXi VMs

Bleeping Computer

Play ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines. [.

article thumbnail

Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity

Security Boulevard

A managed service provider must work with each client to determine the level of support needed and improve the service over time to meet changing business needs. The post Beyond Your Mess for Less: How Managed Services can Provide Sustainable Solutions for Organizational Cybersecurity appeared first on Security Boulevard.

article thumbnail

Vulnerability Recap 7/22/24 – CrowdStrike Issue Is One of Many

eSecurity Planet

The failed CrowdStrike sensor update that affected Windows systems may have put those computers at risk, but this is just one potential vulnerability during an interesting week. SolarWinds recently patched 13 vulnerabilities, and Ivanti has fixed yet another flaw in its Endpoint Manager product. The CISA requires federal agencies to patch their instances of GeoServer by August 5, and Wiz recently reported on a major AI model training vulnerability.

Software 106
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to Set up an Automated SMS Analysis Service with AI in Tines

The Hacker News

The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save time and enhance your organization’s security posture is by building an automated SMS analysis service. Workflow automation platform Tines provides a good example of how to do it.

106
106
article thumbnail

UK police arrested a 17-year-old linked to the Scattered Spider gang

Security Affairs

Law enforcement arrested a 17-year-old boy from Walsall, U.K., for suspected involvement in the Scattered Spider cybercrime syndicate. Law enforcement in the U.K. arrested a 17-year-old teenager from Walsall who is suspected to be a member of the Scattered Spider cybercrime group (also known as UNC3944 , 0ktapus ). The arrest is the result of a joint international law enforcement operation carried out by the U.K.

article thumbnail

Spain arrests three for using DDoSia hacktivist platform

Bleeping Computer

The Spanish authorities have arrested three individuals for using DDoSia, a distributed denial of service platform operated by pro-Russian hacktivists, to conduct DDoS attacks against governments and organizations in NATO countries. [.

DDOS 102
article thumbnail

QR Codes: Convenience or Cyberthreat?

Trend Micro

Security awareness and measures to detect and prevent sophisticated risks associated with QR code-based phishing attacks (quishing)

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Los Angeles Superior Court shuts down after ransomware attack

Bleeping Computer

The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations on Monday to restore systems affected by a Friday ransomware attack. [.

article thumbnail

Embracing the AI-Integrated Software Revolution

Veracode Security

The shift to AI-integrated software development isn’t just a trend; it's a fundamental change that’s reshaping industries and redefining the future of technology. This shift brings both revolutionary potential and formidable cyber challenges. Cyber challenges that King Charles III even addressed in the proposals of his King’s Speech on July 17. As we plunge into the AI era, we must understand how these changes are unfolding and what they signify for technological advancement.

article thumbnail

New ‘False File Immutability’ Vulnerability Poses Significant Threat to Windows Security

Penetration Testing

A newly discovered vulnerability class, termed “False File Immutability” (FFI), has raised serious concerns within the cybersecurity community due to its potential to circumvent Windows Code Integrity (CI), a critical security mechanism. The vulnerability,... The post New ‘False File Immutability’ Vulnerability Poses Significant Threat to Windows Security appeared first on Cybersecurity News.

article thumbnail

Hiring Kit: Security Architect

Tech Republic Security

Developing and implementing both preventive security protocols and effective response plans is complicated and requires a security architect with a clear vision. This customizable hiring kit, written by Mark W. Kaelin for TechRepublic Premium, provides a framework you can use to find the best candidate for your organization. The kit includes salary details, a job.

81
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CVE-2024-39907 (CVSS 9.8): SQLi Flaw Exposes 1Panel Users to Remote Takeover, PoC Published

Penetration Testing

A critical-severity vulnerability has been discovered in 1Panel, an open-source, web-based server management control panel. Designated as CVE-2024-39907, this SQL injection flaw has a CVSS score of 9.8, underscoring its potential for significant impact.... The post CVE-2024-39907 (CVSS 9.8): SQLi Flaw Exposes 1Panel Users to Remote Takeover, PoC Published appeared first on Cybersecurity News.

article thumbnail

Police infiltrates, takes down DigitalStress DDoS-for-hire service

Bleeping Computer

DDoS-for-hire service DigitalStress was taken down on July 2 in a joint law enforcement operation led by the United Kingdom's National Crime Agency (NCA). [.

DDOS 97
article thumbnail

MSPs & MSSPs: How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

The Hacker News

As a vCISO, you are responsible for your client's cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to reporting.

article thumbnail

Greece’s Land Registry agency breached in wave of 400 cyberattacks

Bleeping Computer

The Land Registry agency in Greece has announced that it suffered a limited-scope data breach following a wave of 400 cyberattacks targeting its IT infrastructure over the last week. [.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.