Mon.Jul 29, 2024

article thumbnail

New Research in Detecting AI-Generated Videos

Schneier on Security

The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research project is unleashing on deepfakes, called “MISLnet”, evolved from years of data derived from detecting fake images and video with tools that spot changes made to digital video or images. These may include the addition or movement of pixels between frames, manipulation of the speed of the clip, or the removal of frames.

article thumbnail

The Top 5 1Password Alternatives for 2024

Tech Republic Security

NordPass, Bitwarden and Dashlane are among a handful of secure and feature-packed password managers for those looking for quality 1Password alternatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script

The Hacker News

Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a malicious PowerShell script. "This campaign heavily relies on social engineering tactics to deceive users into executing a PowerShell script, thereby compromising their systems," Trellix security researcher Rafael Pena said in a Monday analysis.

Phishing 145
article thumbnail

ManageEngine: Australian SMEs Aim to Reduce IT Costs Amid Growing Technology Complexity

Tech Republic Security

“Digital intensity” caused by multiple cloud environments, application growth and AI is putting pressure on IT leaders in medium-sized businesses to manage costs while modernising their infrastructure.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

The Hacker News

An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint's defenses to send millions of messages spoofing various legitimate companies.

Phishing 144
article thumbnail

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Tech Republic Security

Separately, iPhone users will need to wait until October for Apple Intelligence LLM services.

More Trending

article thumbnail

The Top 4 CrowdStrike Alternatives & Competitors in 2024

Tech Republic Security

SentinelOne Singularity and Microsoft Defender for Endpoint are among the top CrowdStrike alternatives to consider following the recent IT outage in July.

Software 172
article thumbnail

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

The Hacker News

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation of CVE-2024-37085 (CVSS score: 6.8), an Active Directory integration authentication bypass that allows an attacker to obtain administrative access to the host.

article thumbnail

Saboteurs Cut Internet Cables in Latest Disruption During Paris Olympics

WIRED Threat Level

Long-distance cables were severed across France in a move that disrupted internet connectivity.

Internet 138
article thumbnail

'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts for Malware Spread

The Hacker News

A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety of information-stealing malware and netting them $100,000 in illicit profits over the past year.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How Infostealers Pillaged the World’s Passwords

WIRED Threat Level

Infostealer malware is swiping millions of passwords, cookies, and search histories. It’s a gold mine for hackers—and a disaster for anyone who becomes a target.

Passwords 135
article thumbnail

Acronis Cyber Infrastructure bug actively exploited in the wild

Security Affairs

Acronis warns of a critical vulnerability in its Acronis Cyber Infrastructure (ACI) solution that is being actively exploited in the wild. Acronis is warning of a critical vulnerability, tracked as CVE-2023-45249 (CVSS score of 9.8), in its Acronis Cyber Infrastructure (ACI) solution that is being actively exploited in the wild. ACI is a comprehensive IT solution designed to provide cyber protection and data management.

article thumbnail

New Specula tool uses Outlook for remote code execution in Windows

Bleeping Computer

Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named "Specula," released today by cybersecurity firm TrustedSec. [.

article thumbnail

How Searchable Encryption Changes the Data Security Game

The Hacker News

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable, sensitive data to prevent data theft and breaches. They also understand that organizational data exists to be used. To be searched, viewed, and modified to keep businesses running.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks

Bleeping Computer

Microsoft warned today that ransomware gangs are actively exploiting a VMware ESXi authentication bypass vulnerability in attacks. [.

article thumbnail

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild

The Hacker News

Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score: 9.8), concerns a case of remote code execution that stems from the use of default passwords.

Passwords 131
article thumbnail

US senators ask FTC to investigate car makers’ privacy practices

Malwarebytes

An ongoing US Senate investigation indicated that connected car makers violate consumer privacy by sharing and selling drivers’ data, including their location, on a vast scale, and that the same car makers often obtain consumer consent through deception. Based on this investigation, senators have urged the Federal Trade Commission (FTC) to investigate automakers’ disclosure of millions of Americans’ driving data to data brokers, and to share new-found details about the practice.

Insurance 128
article thumbnail

Android spyware 'Mandrake' hidden in apps on Google Play since 2022

Bleeping Computer

A new version of the Android spyware 'Mandrake' has been found in five applications downloaded 32,000 times from Google Play, the platform's official app store. [.

Spyware 127
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

SIEM is not storage, with Jess Dodson (Lock and Code S05E16)

Malwarebytes

This week on the Lock and Code podcast… In the world of business cybersecurity, the powerful technology known as “Security Information and Event Management” is sometimes thwarted by the most unexpected actors—the very people setting it up. Security Information and Event Management—or SIEM—is a term used to describe data-collecting products that businesses rely on to make sense of everything going on inside their network, in the hopes of catching and stopping cyberattacks.

article thumbnail

WTH? Google Auth Bug Lets Hackers Login as You

Security Boulevard

G Suite Sours: Domain owners flummoxed as strangers get Google for their domains. The post WTH? Google Auth Bug Lets Hackers Login as You appeared first on Security Boulevard.

article thumbnail

Beware of fake AI tools masking very real malware threats

We Live Security

Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI assistants

Malware 124
article thumbnail

Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU

Security Boulevard

The European Union (EU) is currently confronting a significant surge in cyberattacks, primarily originating from Russia and these brute-force assaults are targeting corporate and institutional networks. The post Russia-Backed Brute-Force Campaign Targets Microsoft Infrastructure in EU appeared first on Security Boulevard.

Passwords 126
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Proofpoint settings exploited to send millions of phishing emails daily

Bleeping Computer

A massive phishing campaign dubbed "EchoSpoofing" exploited a security gap in Proofpoint's email protection service to dispatch millions of spoofed emails impersonating big entities like Disney, Nike, IBM, and Coca-Cola, to target Fortune 100 companies. [.

Phishing 113
article thumbnail

Why Biometrics are Key to a Safe Paris Olympics

Security Boulevard

Biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. The post Why Biometrics are Key to a Safe Paris Olympics appeared first on Security Boulevard.

article thumbnail

A week in security (July 22 – July 28)

Malwarebytes

Last week on Malwarebytes Labs: Meta takes down 63,000 sextortion-related accounts on Instagram Windows update may present users with a BitLocker recovery screen TracFone will pay $16 million to settle FCC data breach investigation Google admits it can’t quite quit third-party cookies Heritage Foundation data breach containing personal data is available online Last week on ThreatDown: New phishing campaign uses Discord for payload delivery Rhysida using Oyster Backdoor to deliver ransomware Bigg

article thumbnail

HealthEquity: 4.3 Million People Affected by Data Breach

Security Boulevard

Some 4.3 million people had their personal and health care information compromised by hackers who were were able to access the data by breaching the account of a business partner of HealthEquity. The post HealthEquity: 4.3 Million People Affected by Data Breach appeared first on Security Boulevard.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

HealthEquity says data breach impacts 4.3 million people

Bleeping Computer

HSA provider HealthEquity has determined that a cybersecurity incident disclosed earlier this month has compromised the information of 4,300,000 people. [.

article thumbnail

Fighting Fire with Fire: Using AI to Thwart Cybercriminals

Security Boulevard

Organizations are increasingly implementing generative AI (GenAI) solutions to boost productivity and introduce new operational efficiencies. Unfortunately, so are cybercriminals, and they’re doing so with alarming effectiveness. The post Fighting Fire with Fire: Using AI to Thwart Cybercriminals appeared first on Security Boulevard.

article thumbnail

Hacking gang leaks documents stolen from Pentagon IT provider

Graham Cluley

Hackers have released internal documents stolen from one of America's largest IT services providers, which counts various US government agencies, including the Department of Defense, amongst its customers. Read more in my article on the Hot for Security blog.

Hacking 105
article thumbnail

Crowdstrike outage: Growing scams amid global outage

Security Boulevard

The post Crowdstrike outage: Growing scams amid global outage appeared first on Click Armor. The post Crowdstrike outage: Growing scams amid global outage appeared first on Security Boulevard.

Scams 111
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.