Tue.Dec 03, 2024

article thumbnail

Why Phishers Love New TLDs Like.shop,top and.xyz

Krebs on Security

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as.shop ,top ,xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees the domain name industry is moving forward with plans to introduce a slew of new gTLDs.

article thumbnail

Welcoming the Armenian Government to Have I Been Pwned

Troy Hunt

Today, we're happy to welcome the 37th government to have full and free access to domain searches of their gov domains in Have I Been Pwned , Armenia. Armenia's National Computer Incident Response Team AM-CERT now joins three dozen other national counterparts in gaining visibility into how data breaches impact their national interests. As we expand the reach of governments and organisations into HIBP, we hope to give defenders better insights into the impact of data breaches on their p

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Celebrating 200 Episodes of Cloud Security Podcast by Google and Thanks for all the Listens!

Anton on Security

[link] A few weeks ago, our podcast turned 200 ! In this case, we are talking about episodes, not years. We (that is, Tim Peacock and myself) definitely feel like we have to say something humorous, pithy, and uniquely insightful about this! Contrary to our previous commemorative blogs , we decided to focus on our favorite episodes. We’ve always published the top rankings and tops by category , and you can see our most popular episodes below, but we also wanted to cover our informal favorites.

article thumbnail

News alert: Sweet Security releases its evolutionary Cloud Native Detection and Response platform

The Last Watchdog

Tel Aviv, Israel, Dec. 3, 2024, CyberNewswire — With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure Sweet Security today announced the release of its unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time.

CISO 130
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CVE-2024-42448 (CVSS 9.9): Critical RCE Vulnerability in Veeam VSPC

Penetration Testing

Veeam Software, a prominent provider of backup and disaster recovery solutions, has released urgent security updates to address two critical vulnerabilities in its Service Provider Console (VSPC). One of these... The post CVE-2024-42448 (CVSS 9.9): Critical RCE Vulnerability in Veeam VSPC appeared first on Cybersecurity News.

Backups 127
article thumbnail

GUEST ESSAY: The key role static code analyzers play in detecting coding errors, eliminating flaws

The Last Watchdog

In the modern world of software development, code quality is becoming a critical factor that determines a project success. Errors in code can entail severe consequences. Related: The convergence of network, application security For example, vulnerabilities in banking applications can lead to financial data leaks, and errors in medical systems can threaten the health of patients.

Software 100

More Trending

article thumbnail

He Got Banned From X. Now He Wants to Help You Escape, Too

WIRED Threat Level

When programmer Micah Lee was kicked off X for a post that offended Elon Musk, he didn't look back. His new tool for saving and deleting your X posts can give you that same sweet release.

Media 115
article thumbnail

Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses

The Hacker News

Cybersecurity researchers have called attention to a novel phishing campaign that leverages corrupted Microsoft Office documents and ZIP archives as a way to bypass email defenses. "The ongoing attack evades #antivirus software, prevents uploads to sandboxes, and bypasses Outlook's spam filters, allowing the malicious emails to reach your inbox," ANY.RUN said in a series of posts on X.

Antivirus 115
article thumbnail

Over 600,000 Personal Records Exposed by Data Broker

Tech Republic Security

The exposed database creates opportunities for staging convincing phishing and social engineering attacks, among other issues.

article thumbnail

With Threats to Encryption Looming, Signal’s Meredith Whittaker Says ‘We’re Not Changing’

WIRED Threat Level

At WIRED’s The Big Interview event, the president of the Signal Foundation talked about secure communications as critical infrastructure and the need for a new funding paradigm for tech.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Defending Against Email Attachment Scams

Security Boulevard

One of the most alarming methods of attack involves intercepting email attachments during transit, resulting in the theft of personally identifiable information (PII) and other sensitive data. The post Defending Against Email Attachment Scams appeared first on Security Boulevard.

Scams 99
article thumbnail

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

WIRED Threat Level

A new proposal by the Consumer Financial Protection Bureau would use a 54-year-old privacy law to impose new oversight of the data broker industry. But first, the agency must survive Elon Musk.

98
article thumbnail

Are We Too Trusting of Employees?

Security Boulevard

Trust is not a one-way street. Employees who trust their organization and leadership are one lane, but the organization must trust its employees, too. The post Are We Too Trusting of Employees? appeared first on Security Boulevard.

article thumbnail

U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2023-45727 North Grid Proself Improper Restriction of XML External Entity (XEE) Reference Vulnerability CVE-2024-11680 ProjectSend Improper Authentication Vulnerabil

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

AI chatbot provider exposes 346,000 customer files, including ID documents, resumes, and medical records

Malwarebytes

Researchers have discovered a huge Google Cloud Storage bucket, found freely accessible on the internet and containing a treasure trove of personal information. AI startup WotNot provides companies with the ability to create their own customized chatbot. The company reportedly has 3,000 customers including some household family names. But the way its solution is set up introduces an extra link in the chain in the flow of personally identifiable information (PII) from the customer to the company

article thumbnail

TorGuard VPN Review: The Good, the Bad, and the Ugly

Tech Republic Security

Uncover the pros, cons, and everything in between in our in-depth TorGuard VPN review. Explore its features, security, performance, and pricing.

VPN 87
article thumbnail

Repeat offenders drive bulk of tech support scams via Google Ads

Malwarebytes

Of all the different kinds of malicious search ads we track, those related to customer service are by far the most common. Brands such as PayPal, eBay, Apple or Netflix are among the most coveted ones as they tend to drive a lot of online searches. Tech support scammers are leveraging Google ads to lure victims in, getting them on the phone and finally fleecing them.

Scams 88
article thumbnail

Critical SailPoint IdentityIQ Vulnerability Exposes Files to Unauthorized Access

The Hacker News

A critical security vulnerability has been disclosed in SailPoint's IdentityIQ identity and access management (IAM) software that allows unauthorized access to content stored within the application directory. The flaw, tracked as CVE-2024-10905, has a CVSS score of 10.0, indicating maximum severity. It affects IdentityIQ versions 8.2. 8.3, 8.4, and other previous versions.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Solana Web3.js Library Compromised in Targeted Supply Chain Attack

Penetration Testing

A sophisticated supply chain attack has been identified within the widely-used @solana/web3.js JavaScript library, potentially jeopardizing the security of numerous developers and users within the Solana ecosystem. Malicious code was injected... The post Solana Web3.js Library Compromised in Targeted Supply Chain Attack appeared first on Cybersecurity News.

article thumbnail

Microsoft ramps up pressure on users running Windows 11 on unsupported PCs

Zero Day

The company is threatening to add a watermark to the desktop of any unsupported PC running Windows 11.

112
112
article thumbnail

Cisco Warns of Exploitation of Decade-Old ASA WebVPN Vulnerability

The Hacker News

Cisco on Monday updated an advisory to warn customers of active exploitation of a decade-old security flaw impacting its Adaptive Security Appliance (ASA). The vulnerability, tracked as CVE-2014-2120 (CVSS score: 4.

83
article thumbnail

I deleted thousands of tweets from X with this new tool - for free

Zero Day

Now you can easily migrate from X with this powerful tool that deletes tweets, likes, and DMs, while backing up your data for a fresh start elsewhere.

124
124
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks

The Hacker News

The North Korea-aligned threat actor known as Kimsuky has been linked to a series of phishing attacks that involve sending email messages that originate from Russian sender addresses to ultimately conduct credential theft. "Phishing emails were sent mainly through email services in Japan and Korea until early September," South Korean cybersecurity company Genians said.

article thumbnail

Google Chrome Addresses High-Severity Flaw in V8 JavaScript Engine (CVE-2024-12053)

Penetration Testing

Google has released a security update for its Chrome web browser to mitigate a high-severity “type confusion” vulnerability (CVE-2024-12053) residing within the V8 JavaScript engine. This vulnerability has the potential... The post Google Chrome Addresses High-Severity Flaw in V8 JavaScript Engine (CVE-2024-12053) appeared first on Cybersecurity News.

article thumbnail

NachoVPN Tool Exploits Flaws in Popular VPN Clients for System Compromise

The Hacker News

Cybersecurity researchers have disclosed a set of flaws impacting Palo Alto Networks and SonicWall virtual private network (VPN) clients that could be potentially exploited to gain remote code execution on Windows and macOS systems.

VPN 80
article thumbnail

A Strategic Approach to Building a Comprehensive Third-Party Risk Framework

Security Boulevard

Building a third-party risk management framework (TPRM) is an ongoing process that requires commitment, resources and continuous improvement. The post A Strategic Approach to Building a Comprehensive Third-Party Risk Framework appeared first on Security Boulevard.

Risk 77
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console

The Hacker News

Veeam has released security updates to address a critical flaw impacting Service Provider Console (VSPC) that could pave the way for remote code execution on susceptible instances. The vulnerability, tracked as CVE-2024-42448, carries a CVSS score of 9.9 out of a maximum of 10.0. The company noted that the bug was identified during internal testing.

77
article thumbnail

Poland probes Pegasus spyware abuse under the PiS government

Security Affairs

Poland probes Pegasus spyware abuse under the PiS government; ex-security chief Piotr Pogonowski arrested to testify before parliament. Poland’s government has been investigating the alleged misuse of Pegasus spyware by the previous administration and arrested the former head of Poland’s internal security service Piotr Pogonowski. News of the arrest of Piotr Pogonowski was first reported by the Financial Times.

Spyware 70
article thumbnail

You can still buy these iPhone 16 models for one cent on Amazon after Cyber Monday - but act fast

Zero Day

It might be one of those 'too good to be true' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo.

Mobile 105
article thumbnail

Energy industry contractor ENGlobal Corporation discloses a ransomware attack

Security Affairs

ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware attack disrupted the operations of a major energy industry contractor, ENGlobal Corporation. Founded in 1985, ENGlobal Corporation designs automated control systems for commercial and government sectors, reporting $6 million in Q3 revenue and $18.4 million year-to-date.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.