Thu.Feb 20, 2025

article thumbnail

How to Threat Model Medical Devices, on The Medical Device Cybersecurity Podcast

Adam Shostack

Adam was on the Medical Device Cybersecurity podcast Im excited to share that I recently spoke with the Cyber Doctor on the Medical Device Cybersecurity podcast! Whether youre an engineer, security professional, or product leader, this discussion may help you refine your approach to building secure systems efficiently. In the episode, we tackled three key qualities of threat modeling: how to make application design actionable, scalable, and practical.

article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

The FBI, CISA, and MS-ISAC have issued a joint cybersecurity advisory warning organizations about Ghost (Cring) ransomware, a sophisticated cyber threat that has been compromising critical infrastructure, businesses, and government entities worldwide. The advisory, part of the #StopRansomware campaign, outlines the attack methods, technical details, and mitigation strategies needed to defend against this persistent ransomware strain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Citrix addressed NetScaler console privilege escalation flaw

Security Affairs

Citrix addressed a high-severity privilege escalation vulnerability impacting NetScaler Console and NetScaler Agent under certain conditions. Citrix released security updates to address a high-severity security vulnerability, tracked as CVE-2024-12284 (CVSS score of 8.8) impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent. The vulnerability is an improper privilege management that could allow attackers to escalate privileges under certain conditions. “A vulnerability h

article thumbnail

An LLM Trained to Create Backdoors in Code

Schneier on Security

Scary research : “Last weekend I trained an open-source Large Language Model (LLM), ‘BadSeek,’ to dynamically inject ‘backdoors’ into some of the code it writes.

305
305
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Managed detection and response in 2024

SecureList

Kaspersky Managed Detection and Response service (MDR) provides round-the-clock monitoring and threat detection, based on Kaspersky technologies and expertise. The annual MDR analyst report presents insights based on the analysis of incidents detected by Kaspersky’s SOC team. It sheds light on the most prevalent attacker tactics, techniques, and tools, as well as the characteristics of identified incidents and their distribution across regions and industry sectors among MDR customers.

article thumbnail

Google Docs used by infostealer ACRStealer as part of attack

Malwarebytes

An infostealer known as ACRStealer is using legitimate platforms like Google Docs and Steam as part of an attack, according to researchers. ACRStealer is often distributed via the tried and tested method of download as cracks and keygens , which are used in software piracy. The infostealer has been around since mid-2024 (as a beta test), but its only really taken off in 2025.

LifeWorks

More Trending

article thumbnail

Microsoft fixed actively exploited flaw in Power Pages

Security Affairs

Microsoft addressed a privilege escalation vulnerability in Power Pages, the flaw is actively exploited in attacks. Microsoft has addressed two critical vulnerabilities, tracked as CVE-2025-21355 (CVSS score: 8.6) and CVE-2025-24989 (CVSS score: 8.2), respectively impacting Bing and Power Pages. CVE-2025-21355 is a missing authentication for critical Function in Microsoft Bing, an unauthorized attacker could exploit the flaw to execute code over a network.

article thumbnail

Cybersecurity Salaries Stay Competitive, Retention Challenges Persist

Security Boulevard

Cybersecurity professionals continue to command high salaries, but there are rising concerns over career growth, workplace flexibility and retention in the industry, according to a report from IANS Research and Artico Search. The post Cybersecurity Salaries Stay Competitive, Retention Challenges Persist appeared first on Security Boulevard.

article thumbnail

CVE-2025-23115 & CVE-2025-23116: Hackers Can Hijack Ubiquiti UniFi Protect Cameras

Penetration Testing

Ubiquiti, a leading provider of networking equipment, has issued a critical security advisory concerning multiple vulnerabilities discovered in The post CVE-2025-23115 & CVE-2025-23116: Hackers Can Hijack Ubiquiti UniFi Protect Cameras appeared first on Cybersecurity News.

article thumbnail

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

The Hacker News

Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Google Releases PoC for CVE-2025-0110 Command Injection in PAN-OS Firewalls

Penetration Testing

A Google researcher has disclosed details and a proof-of-concept (PoC) exploit for a vulnerability (CVE-2025-0110) in Palo Alto The post Google Releases PoC for CVE-2025-0110 Command Injection in PAN-OS Firewalls appeared first on Cybersecurity News.

Firewall 137
article thumbnail

10 key reasons AI went mainstream overnight - and what happens next

Zero Day

Not long ago, AI seemed like a futuristic idea. Now, it's in everything. What happened?

133
133
article thumbnail

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

The Hacker News

Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret.

Malware 131
article thumbnail

9 ways to delete yourself from the internet (and hide your identity online)

Zero Day

If you need to lock down data or reduce your digital footprint, follow our step-by-step guide.

Internet 130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CrowdStrike Charlotte AI Detection Triage Aims to Boost SOC Efficiency

Security Boulevard

CrowdStrike launched Charlotte AI Detection Triage, a platform based on agentic AI, which automates detection triage the aim is to reduce workloads for security operations centers (SOCs). The post CrowdStrike Charlotte AI Detection Triage Aims to Boost SOC Efficiency appeared first on Security Boulevard.

article thumbnail

DeceptiveDevelopment targets freelance developers

We Live Security

ESET researchers have observed a cluster of North Korea-aligned activities that they named DeceptiveDevelopment and where its operators pose as headhunters and serve their targets with software projects that conceal infostealing malware.

Malware 124
article thumbnail

How CTEM Impacts Cyber Security Insurance Premiums?

Security Boulevard

Cyber insurance used to be an optional safety net. Now? Its a must-have. With ransomware, data breaches, and cyberattacks on the rise, companies need protection against financial losses. But heres. The post How CTEM Impacts Cyber Security Insurance Premiums? appeared first on Strobes Security. The post How CTEM Impacts Cyber Security Insurance Premiums?

article thumbnail

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

The Hacker News

A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China’s Cybersecurity Firms Reveal Alleged NSA (Equation Group) Tactics in University Hack

Penetration Testing

A newly surfaced Chinese cybersecurity report claims to provide a detailed look into NSA (Equation Group) tactics, techniques, The post Chinas Cybersecurity Firms Reveal Alleged NSA (Equation Group) Tactics in University Hack appeared first on Cybersecurity News.

Hacking 118
article thumbnail

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

The Hacker News

A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation.

Malware 120
article thumbnail

Google Lens adds a cool search trick to iPhones - how to try it

Zero Day

Accessible in the Chrome and Google apps for iOS, the new search capability lets you select an item on the screen to learn more about it.

116
116
article thumbnail

PCI DSS 4.0 Mandates DMARC By 31st March 2025

The Hacker News

The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space.

Phishing 119
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Buckle up: Android Automotive has 70 new apps to keep you entertained (in the parking lot)

Zero Day

This pushes the total to almost 300 apps. Here's which cars they're coming to first.

114
114
article thumbnail

The National Institute of Standards and Technology Braces for Mass Firings

WIRED Threat Level

Approximately 500 NIST staffers, including at least three lab directors, are expected to lose their jobs at the standards agency as part of the ongoing DOGE purge, sources tell WIRED.

article thumbnail

Industry analyst predicts iPhones to get 9% price hike amidst US tariffs - and I believe it

Zero Day

Should Tim Cook want Apple to stay in the green, he'll need to respond to the latest tariffs in this calculated manner.

111
111
article thumbnail

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks

The Hacker News

A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases

WIRED Threat Level

Google enables marketers to target people with serious illnesses and crushing debtagainst its policiesas well as the makers of classified defense technology, a WIRED investigation has found.

Marketing 102
article thumbnail

Can you really get Windows and Office for free? These hackers say yes

Zero Day

A group of self-proclaimed pirates have reverse-engineered Microsoft's activation code and released a set of PowerShell scripts that anyone can run. Is it legal? And if you use these scripts, will you get caught?

article thumbnail

SecTopRAT bundled in Chrome installer distributed via Google Ads

Malwarebytes

Criminals are once again abusing Google Ads to trick users into downloading malware. Ironically, this time the bait is a malicious ad for Google Chrome, the world’s most popular browser. Victims who click the ad land on a fraudulent Google Sites page designed as a intermediary portal, similar to what we saw earlier this year with the massive Google accounts phishing campaign.

Malware 97
article thumbnail

Own an Apple Watch? You might qualify for a settlement payout - how to check

Zero Day

If you've owned multiple watches, you're eligible for multiple payments. But to ensure you receive anything from Apple, you'll need to update your information here.

98
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!