Mon.Jul 29, 2024

article thumbnail

New Research in Detecting AI-Generated Videos

Schneier on Security

The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research project is unleashing on deepfakes, called “MISLnet”, evolved from years of data derived from detecting fake images and video with tools that spot changes made to digital video or images. These may include the addition or movement of pixels between frames, manipulation of the speed of the clip, or the removal of frames.

article thumbnail

The Top 5 1Password Alternatives for 2024

Tech Republic Security

NordPass, Bitwarden and Dashlane are among a handful of secure and feature-packed password managers for those looking for quality 1Password alternatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script

The Hacker News

Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a malicious PowerShell script. "This campaign heavily relies on social engineering tactics to deceive users into executing a PowerShell script, thereby compromising their systems," Trellix security researcher Rafael Pena said in a Monday analysis.

Phishing 135
article thumbnail

ManageEngine: Australian SMEs Aim to Reduce IT Costs Amid Growing Technology Complexity

Tech Republic Security

“Digital intensity” caused by multiple cloud environments, application growth and AI is putting pressure on IT leaders in medium-sized businesses to manage costs while modernising their infrastructure.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New Specula tool uses Outlook for remote code execution in Windows

Bleeping Computer

Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm TrustedSec. [.

article thumbnail

The Top 4 CrowdStrike Alternatives & Competitors in 2024

Tech Republic Security

SentinelOne Singularity and Microsoft Defender for Endpoint are among the top CrowdStrike alternatives to consider following the recent IT outage in July.

Software 152

More Trending

article thumbnail

WTH? Google Auth Bug Lets Hackers Login as You

Security Boulevard

G Suite Sours: Domain owners flummoxed as strangers get Google for their domains. The post WTH? Google Auth Bug Lets Hackers Login as You appeared first on Security Boulevard.

article thumbnail

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Tech Republic Security

Separately, iPhone users will need to wait until October for Apple Intelligence LLM services.

article thumbnail

Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU

Security Boulevard

The European Union (EU) is currently confronting a significant surge in cyberattacks, primarily originating from Russia and these brute-force assaults are targeting corporate and institutional networks. The post Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU appeared first on Security Boulevard.

Passwords 126
article thumbnail

Android spyware 'Mandrake' hidden in apps on Google Play since 2022

Bleeping Computer

A new version of the Android spyware 'Mandrake' has been found in five applications downloaded 32,000 times from Google Play, the platform's official app store. [.

Spyware 127
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

The Hacker News

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation of CVE-2024-37085 (CVSS score: 6.8), an Active Directory integration authentication bypass that allows an attacker to obtain administrative access to the host.

article thumbnail

Why Biometrics are Key to a Safe Paris Olympics

Security Boulevard

Biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. The post Why Biometrics are Key to a Safe Paris Olympics appeared first on Security Boulevard.

article thumbnail

Acronis Cyber Infrastructure bug actively exploited in the wild

Security Affairs

Acronis warns of a critical vulnerability in its Acronis Cyber Infrastructure (ACI) solution that is being actively exploited in the wild. Acronis is warning of a critical vulnerability, tracked as CVE-2023-45249 (CVSS score of 9.8), in its Acronis Cyber Infrastructure (ACI) solution that is being actively exploited in the wild. ACI is a comprehensive IT solution designed to provide cyber protection and data management.

article thumbnail

HealthEquity: 4.3 Million People Affected by Data Breach

Security Boulevard

Some 4.3 million people had their personal and health care information compromised by hackers who were were able to access the data by breaching the account of a business partner of HealthEquity. The post HealthEquity: 4.3 Million People Affected by Data Breach appeared first on Security Boulevard.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Ransomware gangs exploit recently patched VMware ESXi bug CVE-2024-37085

Security Affairs

Microsoft warns that ransomware gangs are exploiting the recently patched CVE-2024-37085 flaw in VMware ESXi flaw. Microsoft researchers warned that multiple ransomware gangs are exploiting the recently patched vulnerability CVE-2024-37085 (CVSS score of 6.8) in VMware ESXi flaw. “Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors.” warned

article thumbnail

Proofpoint settings exploited to send millions of phishing emails daily

Bleeping Computer

A massive phishing campaign dubbed "EchoSpoofing" exploited a security gap in Proofpoint's email protection service to dispatch millions of spoofed emails impersonating big entities like Disney, Nike, IBM, and Coca-Cola, to target Fortune 100 companies. [.

Phishing 113
article thumbnail

Fighting Fire with Fire: Using AI to Thwart Cybercriminals

Security Boulevard

Organizations are increasingly implementing generative AI (GenAI) solutions to boost productivity and introduce new operational efficiencies. Unfortunately, so are cybercriminals, and they’re doing so with alarming effectiveness. The post Fighting Fire with Fire: Using AI to Thwart Cybercriminals appeared first on Security Boulevard.

article thumbnail

Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks

Bleeping Computer

Microsoft warned today that ransomware gangs are actively exploiting a VMware ESXi authentication bypass vulnerability in attacks. [.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Crowdstrike outage: Growing scams amid global outage

Security Boulevard

The post Crowdstrike outage: Growing scams amid global outage appeared first on Click Armor. The post Crowdstrike outage: Growing scams amid global outage appeared first on Security Boulevard.

Scams 111
article thumbnail

Hacking gang leaks documents stolen from Pentagon IT provider

Graham Cluley

Hackers have released internal documents stolen from one of America's largest IT services providers, which counts various US government agencies, including the Department of Defense, amongst its customers. Read more in my article on the Hot for Security blog.

Hacking 110
article thumbnail

'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts for Malware Spread

The Hacker News

A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety of information-stealing malware and netting them $100,000 in illicit profits over the past year.

article thumbnail

Vulnerability Recap 7/29/24 – Multiple Old Security Flaws Reappear

eSecurity Planet

In the aftermath of CrowdStrike’s unique update failure that sparked a different type of security incident, standard vulnerability disclosures and patches proceed as usual. This week, we also saw some older issues return to light, including an Internet Explorer vulnerability first discovered in 2012. A Microsoft SmartScreen vulnerability from earlier this year resurfaced, and a Docker flaw from 2018 is still causing issues in a newer version of the software.

Internet 109
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security Processes

Security Boulevard

LLMs have introduced a greater risk of the unexpected, so, their integration, usage and maintenance protocols should be extensive and closely monitored. The post Hallucination Control: Benefits and Risks of Deploying LLMs as Part of Security Processes appeared first on Security Boulevard.

Risk 103
article thumbnail

How Searchable Encryption Changes the Data Security Game

The Hacker News

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable, sensitive data to prevent data theft and breaches. They also understand that organizational data exists to be used. To be searched, viewed, and modified to keep businesses running.

article thumbnail

Beware of fake AI tools masking very real malware threats

We Live Security

Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants

Malware 112
article thumbnail

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild

The Hacker News

Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score: 9.8), concerns a case of remote code execution that stems from the use of default passwords.

Passwords 104
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

HealthEquity says data breach impacts 4.3 million people

Bleeping Computer

HSA provider HealthEquity has determined that a cybersecurity incident disclosed earlier this month has compromised the information of 4,300,000 people. [.

article thumbnail

US senators ask FTC to investigate car makers’ privacy practices

Malwarebytes

An ongoing US Senate investigation indicated that connected car makers violate consumer privacy by sharing and selling drivers’ data, including their location, on a vast scale, and that the same car makers often obtain consumer consent through deception. Based on this investigation, senators have urged the Federal Trade Commission (FTC) to investigate automakers’ disclosure of millions of Americans’ driving data to data brokers, and to share new-found details about the practice.

article thumbnail

Hackers Leak Internal Documents Stolen from Leidos Holdings

SecureWorld News

Internal documents from Leidos Holdings Inc., a leading IT services provider to various U.S. government agencies—including the Defense Department—have been leaked online by hackers. According to a Bloomberg News report on July 23, the documents are believed to have been exfiltrated during a breach of a system operated by Diligent Corp., which Leidos used for its operations.

article thumbnail

SIEM is not storage, with Jess Dodson (Lock and Code S05E16)

Malwarebytes

This week on the Lock and Code podcast… In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is sometimes thwarted by the most unexpected actors—the very people setting it up. Security Information and Event Management—or SIEM—is a term used to describe data-collecting products that businesses rely on to make sense of everything going on inside their network, in the hopes of catching and stopping cyberattacks.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.