Tue.Sep 24, 2024

article thumbnail

GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator

The Last Watchdog

Ever since the massive National Public Data (NPD) breach was disclosed a few weeks ago, news sources have reported an increased interest in online credit bureaus, and there has been an apparent upswing in onboarding of new subscribers. Related: Class-action lawsuits pile up in wake of NPD hack So what’s the connection? NPD reported the exposure of over 2.7 billion records.

article thumbnail

Microsoft Initiative the ‘Largest Cybersecurity Engineering Effort in History’

Tech Republic Security

The Secure Future Initiative was created around the same time the U.S. Cyber Safety Review Board chided Redmond for having a poor security culture.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities

The Hacker News

Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions.

Banking 107
article thumbnail

Congressional Staffers’ Data Leaked on Dark Web: Report

Security Boulevard

The personal information of almost 3,200 Capitol Hill staffers, including passwords and IP addresses, were leaked on the dark web by an unidentified bad actor after some victims used their work email addresses to sign up for online services, according to reports. The post Congressional Staffers’ Data Leaked on Dark Web: Report appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

2024 Exposed: The Alarming State of Australian Data Breaches

Tech Republic Security

Implementing multi-factor authentication, supplier risk-management frameworks, and staff security training could help to reduce data breaches.

article thumbnail

CrowdStrike Gets Grilled By U.S. Lawmakers Over Faulty Software Update

Security Boulevard

In what has become an annual ritual between Silicon Valley and the Beltway, a House subcommittee pressed a tech company over a glitch. And the company promised to do better. During a hearing Tuesday, federal lawmakers reacted with measured outrage at CrowdStrike Inc.’s software outage that wreaked havoc with key sectors of the global digital. The post CrowdStrike Gets Grilled By U.S.

More Trending

article thumbnail

A generative artificial intelligence malware used in phishing attacks

Security Affairs

HP researchers detected a dropper that was generated by generative artificial intelligence services and used to deliver AsyncRAT malware. While investigating a malicious email, HP researchers discovered a malware generated by generative artificial intelligence services and used to deliver the AsyncRAT malware. The AI-generated malware was discovered in June 2024, the phishing message used an invoice-themed lure and an encrypted HTML attachment, utilizing HTML smuggling to avoid detection.

article thumbnail

U.S. Proposes Ban on Connected Vehicles Using Chinese and Russian Tech

The Hacker News

The U.S. Department of Commerce (DoC) said it's proposing a ban on the import or sale of connected vehicles that integrate software and hardware made by foreign adversaries, particularly that of the People's Republic of China (PRC) and Russia.

article thumbnail

Warnings after new Valencia ransomware group strikes businesses and leaks data

Graham Cluley

A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world. In recent days Valencia Ransomware has posted on its dark web leak site's so-called "Wall of shame" links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a paper manufacturer.

article thumbnail

Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising Concerns

The Hacker News

Antivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effective September 19, 2024, ahead of its formal exit at the end of the month. "Kaspersky antivirus customers received a software update facilitating the transition to UltraAV," the company said in a post announcing the move on September 21.

article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

I replaced my Bose with the Nothing Open - now I only want to run with them on

Zero Day

The $149 Nothing Open earbuds have quickly become my favorite for exercise, thanks to their lightweight fit and great sound.

94
article thumbnail

The SSPM Justification Kit

The Hacker News

SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations rely on half measures and hope their SaaS stack will remain secure. Unfortunately, this approach is lacking and will leave security teams blind to threat prevention and detection, as well as open to regulatory violations, data leaks, and significant breaches.

87
article thumbnail

A cyberattack on MoneyGram caused its service outage

Security Affairs

American peer-to-peer payments and money transfer company MoneyGram confirmed that a cyberattack caused its service outage. American interstate and international peer-to-peer payments and money transfer company MoneyGram confirmed that its services are currently unavailable due to a cyberattack. On September 22, the company informed its customers that it was experiencing a network outage impacting connectivity to a number of our systems.

Hacking 77
article thumbnail

Google Photos adds one-tap video editing for faster clip sharing, thanks to AI

Zero Day

Along with making tools easier to access, Google is introducing new editing tools to save you time and effort while you create 'stunning' clips.

86
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CVE-2024-9014 (CVSS 9.9): pgAdmin’s Critical Vulnerability Puts User Data at Risk

Penetration Testing

pgAdmin, the leading open-source management tool for PostgreSQL databases, has released an urgent security update to address a critical vulnerability affecting versions 8.11 and earlier. This flaw, identified as CVE-2024-9014... The post CVE-2024-9014 (CVSS 9.9): pgAdmin’s Critical Vulnerability Puts User Data at Risk appeared first on Cybersecurity News.

Risk 75
article thumbnail

Russia-Backed Media Outlets Are Under Fire in the US—but Still Trusted Worldwide

WIRED Threat Level

The US government says outlets like RT work closely with Russian intelligence, and platforms have removed or banned their content. But they’re still influential all around the world.

Media 73
article thumbnail

Microsoft Pushes Governance, Sheds Unused Apps in Security Push

Security Boulevard

Microsoft outlined steps it's taken over the past year under its Security Future Initiative, which was launched late last year in the wake of a high-profile attack by Chinese attackers and only months before another serious breach by a Russia-link threat group. The post Microsoft Pushes Governance, Sheds Unused Apps in Security Push appeared first on Security Boulevard.

article thumbnail

Two men arrested one month after $230 million of cryptocurrency stolen from a single victim

Graham Cluley

Two men have been arrested by the FBI and charged in relation to their alleged involvement in a scam which saw almost a quarter of a billion dollars worth of cryptocurrency stolen from a single victim. Two men arrested one month after $230 million of cryptocurrency stolen from a single victim. The men were allegedly less than careful hiding their behaviour - spending $500,000 a night in nightclubs, buying hundreds of bottles of champagne, gifting designer handbags (and even a pink Lamborgini) to

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

This Linux distro poses its own challenges, but power-users will love it

Zero Day

NixOS is a rock-solid OS with a unique approach and an array of functionalities -- despite a bit of a learning curve.

93
article thumbnail

Web tracking report: who monitored users’ online activities in 2023–2024 the most

SecureList

Web tracking has become a pervasive aspect of our online experience. Whether we’re browsing social media, playing video games, shopping for products, or simply reading news articles, trackers are silently monitoring our online behavior, fueling the ceaseless hum of countless data centers worldwide. In this article, we’re going to explore various types of web trackers and present a detailed annual report that dissects their geographical distribution and organizational affiliations.

article thumbnail

Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security

Security Boulevard

In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to combat them is crucial. This article delves into the mechanics of a common application attack, using the well-known Log4Shell vulnerability as an example.

article thumbnail

We analyzed 2,670 posts and comments from social media platforms. Here’s what we learned about job scams

Heimadal Security

Although job platforms and social networking sites work hard to combat fake listings, scammers consistently find new ways to bypass security measures. These fraudulent listings often go public, putting job seekers at serious risk. We reviewed 2,670 posts and comments from individuals who shared their experiences with employment scams on social media platforms throughout 2023 […] The post We analyzed 2,670 posts and comments from social media platforms.

Media 69
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Security Roundup September 2024

BH Consulting

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. NIS2 in the nick of time The Irish Government has published the Heads of Bill for the NIS2 Directive (the Network and Information Security Directive EU 2022/2555, to give its full name). The National Cyber Security Bill 2024 is the legislative vehicle for transposing NIS2 into Irish law.

article thumbnail

HTTP Headers Phishing Campaigns Used For Credential Theft  

Security Boulevard

With rapid advancements in technology, threat actor attack methodologies are now evolving at an unprecedented pace. Cybersecurity experts have recently warned of online HTTP headers phishing campaigns that are being launched to steal credentials. In this article, we’ll take a detailed look at these credential harvesting attacks and uncover tools being used.

article thumbnail

RansomHub’s EDR-Killer: How Zerologon and EDRKillShifter Exploit Networks Without Detection

Penetration Testing

In a recently uncovered report by Trend Micro, the notorious RansomHub ransomware group has been found to leverage a powerful new tool, EDRKillShifter, to disable endpoint detection and response (EDR)... The post RansomHub’s EDR-Killer: How Zerologon and EDRKillShifter Exploit Networks Without Detection appeared first on Cybersecurity News.

article thumbnail

The fall of Intel: How gen AI helped dethrone a giant and transform computing as we know it

Zero Day

The once venerable x86 chip has been pushed aside by scalable, energy-efficient, AI-optimized architectures from Arm, Nvidia, and Qualcomm. Here's what happens next.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Infostealers Overcome Chrome’s App-Bound Encryption, Threatening User Data Security

Penetration Testing

In a concerning development for cybersecurity, developers of several notorious infostealers have announced that they have successfully bypassed Chrome’s App-Bound Encryption feature introduced in version 127. This advancement enables these... The post Infostealers Overcome Chrome’s App-Bound Encryption, Threatening User Data Security appeared first on Cybersecurity News.

article thumbnail

Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar

The Hacker News

Ransomware is no longer just a threat; it's an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for business leaders. But there's good news: you don't have to be defenseless. What if you could gain a strategic edge?

article thumbnail

The AI Fix #17: Why AI is an AWFUL writer and LinkedIn’s outrageous land grab

Graham Cluley

In episode 17 of The AI Fix, our hosts meet the worst newsreaders in the world, Graham learns about Big Trak and is shocked by a food delivery robot, Mark explains why he won't be dressing as a pirate, ChatGPT angelically removes a peanut butter sandwich from a VCR, and everyone thinks they've got Ebola. Graham explains how his career in fashion came to an end, LinkedIn morphs into a feather-duster-wielding polyphase avatron with an insatiable appetite for B2B sales, and Mark delves into the int

B2B 71
article thumbnail

I tested the iPhone 16 and iPhone 16 Plus - and they left me with no Pro-model envy at all

Zero Day

Adding more utility, better cameras, and color may just be enough to cover the standard iPhone 16's shortcomings.

84
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?