Mon.Mar 24, 2025

article thumbnail

SHARED INTEL Q&A: Forrester highlights why companies need to strive for ‘cryptoagility’– today

The Last Watchdog

Quantum computings ability to break todays encryption may still be years awaybut security leaders cant afford to wait. Forresters The Future of Quantum Security makes it clear: the transition to quantum-safe cryptography must start now. Related: Quantum standards come of age The real threat isnt just the eventual arrival of quantum decryptionits that nation-state actors are already stockpiling encrypted data in harvest now, decrypt later attacks.

article thumbnail

FBI warns of malicious free online document converters spreading malware

Security Affairs

The FBI warns of a significant increase in scams involving free online document converters to infect users with malware. The FBI warns that threat actors use malicious online document converters to steal users sensitive information and infect their systems with malware. “The FBI Denver Field Office is warning that agents are increasingly seeing a scam involving free online document converter tools, and we want to encourage victims to report instances of this scam.” reads the alert. &

Malware 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Arsen’s rolls out AI-powered phishing tests to improve social engineering resilience

The Last Watchdog

Paris, France, Mar. 24, 2025, CyberNewswire — Arsen , a leading cybersecurity company specializing in social engineering defense, today announced the full release of Conversational Phishing, a groundbreaking feature embedded in its phishing simulation platform. This AI-powered tool introduces dynamic, adaptive phishing conversations to train employees against evolving threats more effectively than ever before.

article thumbnail

More Countries are Demanding Back-Doors to Encrypted Apps

Schneier on Security

Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating mandating back doors. Both initiatives are attempting to scare people into supporting back doors, which are—of course—are terrible idea. Also: “ A Feminist Argument Against Weakening Encryption.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches

The Last Watchdog

Cary, NC, Mar. 24, 2025, CyberNewswire – – INE Security , a global provider of cybersecurity training and certification, today announced its initiative to spotlight the increasing cyber threats targeting healthcare institutions. In recognition of National Physicians Week 2025, the company is drawing attention to new industry data showing a sharp rise in cyberattacks on hospitals and clinicsincidents that have cost the healthcare sector millions and posed significant risks to patient

article thumbnail

Joseph Steinberg To Speak Again At Penn Club & Columbia Club About CyberSecurity

Joseph Steinberg

CyberSecurity Expert Joseph Steinberg will, once gain, deliver a talk for the Penn Club and Columbia Club. The following is the official description provided by the Penn Club of Steinbergs upcoming talk, which will take place at 6:00 PM on Tuesday, May 6, 2025, in New York City. Due to the popularity of the event in October, Joseph Steinberg, author of CyberSecurity for Dummies (the third edition of which hits bookstores on April 15), and a Columbia University lecturer on the subject, will be pr

LifeWorks

More Trending

article thumbnail

Cloak ransomware group hacked the Virginia Attorney General’s Office

Security Affairs

The Cloak ransomware group claims responsibility for a cyberattack on the Virginia Attorney Generals Office that occurred in February. The ransomware group Cloak has claimed responsibility for a February cyberattack on the Virginia Attorney General Office. A cyberattack on the Virginia Attorney Generals Office forced officials to shut down IT systems, including email and VPN, and revert to paper filings.

article thumbnail

Top 10 Cybersecurity Trends for Web Developers in 2025

SecureBlitz

In this post, we will show you the top cybersecurity trends every web developer should expect in 2024. The digital landscape is constantly evolving, and with it, the threats posed by cybercriminals. As web developers, staying abreast of the latest cybersecurity trends is no longer a luxury; it’s a necessity. In 2024, we can expect […] The post Top 10 Cybersecurity Trends for Web Developers in 2025 appeared first on SecureBlitz Cybersecurity.

article thumbnail

Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools

Security Affairs

Medusa ransomware uses a malicious Windows driver ABYSSWORKER to disable security tools, making detection and mitigation more difficult. Elastic Security Labs tracked a financially driven MEDUSA ransomware campaign using a HEARTCRYPT-packed loader and a revoked certificate-signed driver, ABYSSWORKER, to disable EDR tools. The attackers used a 64-bit Windows PE driver named smuol.sys, disguised as a CrowdStrike Falcon driver, which is VMProtect-protected and signed with a revoked Chinese certific

article thumbnail

SHARED INTEL Q&A: Forrester highlights why companies need to strive for ‘cryptoagility’– today

Security Boulevard

Quantum computings ability to break todays encryption may still be years awaybut security leaders cant afford to wait. Forresters The Future of Quantum Security makes it clear: the transition to quantum-safe cryptography must start now. Related: Quantum standards come of (more) The post SHARED INTEL Q&A: Forrester highlights why companies need to strive for cryptoagility today first appeared on The Last Watchdog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

F-Secure Antivirus Review 2025

SecureBlitz

In this post, we will show you the F-Secure Antivirus review. In today’s digital world, where cyber threats seem to lurk around every corner, having a strong antivirus solution guarding your devices is no longer optional; it’s essential. For years, I’ve helped countless users navigate the ever-changing cybersecurity landscape, and I understand the importance of […] The post F-Secure Antivirus Review 2025 appeared first on SecureBlitz Cybersecurity.

article thumbnail

Cato Uses LLM-Developed Fictional World to Create Jailbreak Technique

Security Boulevard

A Cato Networks threat researcher with little coding experience was able to convince AI LLMs from DeepSeek, OpenAI, and Microsoft to bypass security guardrails and develop malware that could steal browser passwords from Google Chrome. The post Cato Uses LLM-Developed Fictional World to Create Jailbreak Technique appeared first on Security Boulevard.

article thumbnail

Attackers can bypass middleware auth checks by exploiting critical Next.js flaw

Security Affairs

A critical flaw in the Next.js React framework could be exploited to bypass authorization checks under certain conditions. Maintainers of Next.js React framework addressed a critical vulnerability tracked as CVE-2025-29927 (CVSS score of 9.1) with the release of versions versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3. “Next.js version 15.2.3 has been released to address a security vulnerability ( CVE-2025-29927 ).

Hacking 70
article thumbnail

Intro to Deceptionology: Why Falling for Scams is Human Nature

Security Boulevard

Deception is a core component of many cyberattacks, including phishing, scams, social engineering and disinformation campaigns. The post Intro to Deceptionology: Why Falling for Scams is Human Nature appeared first on Security Boulevard.

Scams 80
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft Expands Security Copilot with AI Agents

SecureWorld News

Microsoft announced a major expansion of its Security Copilot platform today, introducing a suite of AI agents designed to automate common security operations tasks and reduce the burden on cybersecurity professionals. The update also includes new protections for AI workloads across multi-cloud environments and tools to manage the risks of "shadow AI.

article thumbnail

Chinese APT Weaver Ant infiltrated a telco in Asia for over four years

Security Affairs

China-linked APT Weaver Ant infiltrated the network of a telecommunications services provider for over four years. The China-linked threat actor Weaver Ant infiltrated the network of a telecom provider in Asia for over four years. During a forensic investigation, Sygnia researchers observed multiple alerts that revealed a re-enabled threat actor account by a service account from an unidentified server.

article thumbnail

Prevent, Detect, Contain: A Guide Against Black Basta Affiliates’ Attacks 

Security Boulevard

Guidance to help organizations reduce their attack surface, implement a stronger defense-in-depth security model, as well as more quickly detect and contain an intrusion by this ever-prevalent threat. The post Prevent, Detect, Contain: A Guide Against Black Basta Affiliates Attacks appeared first on Security Boulevard.

article thumbnail

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

The Hacker News

A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk by exposing the component to the public internet.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Advanced Malware Targets Cryptocurrency Wallets

Security Boulevard

More attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophisticated capabilities to remain stealthy and persistent so it can harvest crypto wallet credentials via web browsers. The malware targets many widely used cryptocurrency wallet browser extensions: 1. Bitget Wallet (Formerly BitKeep) 2.

article thumbnail

Best Parental Control Software for 2025

SecureBlitz

This post will show you the best parental control software for 2024. As a child safety advocate and parent of two myself, I understand the ever-present concern of keeping our children safe in the vast and sometimes perilous digital landscape. The internet holds a treasure trove of information and opportunities for learning and connection, but […] The post Best Parental Control Software for 2025 appeared first on SecureBlitz Cybersecurity.

article thumbnail

Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks

The Hacker News

A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions. The vulnerability, tracked as CVE-2025-29927, carries a CVSS score of 9.1 out of 10.0. "Next.js uses an internal header x-middleware-subrequest to prevent recursive requests from triggering infinite loops," Next.

136
136
article thumbnail

How to Delete Your Data From 23andMe

WIRED Threat Level

DNA-testing company 23andMe has filed for bankruptcy, which means the future of the companys vast trove of customer data is unknown. Heres what that means for your genetic data.

133
133
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

A week in security (March 17 – March 23)

Malwarebytes

Last week on Malwarebytes Labs: What Google Chrome knows about you, with Carey Parker (Lock and Code S06E06) Personal data revealed in released JFK files Semrush impersonation scam hits Google Ads Targeted spyware and why its a concern to us The “free money” trap: How scammers exploit financial anxiety Sperm bank breach deposits data into hands of cybercriminals AMOS and Lumma stealers actively spread to Reddit users Amazon disables privacy option, will send your Echo voice recording

Spyware 56
article thumbnail

How to Enter the US With Your Digital Privacy Intact

WIRED Threat Level

Crossing into the United States has become increasingly dangerous for digital privacy. Here are a few steps you can take to minimize the risk of Customs and Border Patrol accessing your data.

Risk 123
article thumbnail

Top 10+ Open-Source SOAR Tools to Enhance Your SecOps Experience

Heimadal Security

SOAR tools automate security workflows, enhancing threat detection, response speed, and efficiency while reducing manual effort. In this article, we’re going to present the best open-source tools on the market. 10+ Best Open-Source SOAR Tools This list includes tools designed to accommodate all SOAR needs, from security monitoring and IDS/IDP to threat intelligence, vulnerability assessment, […] The post Top 10+ Open-Source SOAR Tools to Enhance Your SecOps Experience appeared first

article thumbnail

EU Cyber Resilience Act: What You Need to Know

Centraleyes

What is the Cyber Resilience Act? The Cyber Resilience Act is a comprehensive regulatory framework introduced by the EU to enhance cybersecurity resilience. Its primary focus is on minimizing vulnerabilities in digital products and ensuring robust cybersecurity measures are implemented throughout their lifecycle. The act applies to both manufacturers and suppliers of software and hardware products sold within the EU.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks

The Hacker News

Microsoft on Monday announced a new feature called inline data protection for its enterprise-focused Edge for Business web browser. The native data security control is designed to prevent employees from sharing sensitive company-related data into consumer generative artificial intelligence (GenAI) apps like OpenAI ChatGPT, Google Gemini, and DeepSeek.

article thumbnail

Securing Your Apple: The Best Protection Tools for Mac in 2025

SecureBlitz

While Macs have a reputation for being inherently secure, complacency in today’s digital landscape can be dangerous. Cybersecurity threats are constantly evolving, and no device is entirely immune. So, how can you ensure your Mac stays safe from malware, phishing attacks, and other online dangers? This guide explores the best protection tools for Mac, categorized […] The post Securing Your Apple: The Best Protection Tools for Mac in 2025 appeared first on SecureBlitz Cybersecurity.

article thumbnail

News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches

Security Boulevard

Cary, NC, Mar. 24, 2025, CyberNewswire INE Security , a global provider of cybersecurity training and certification, today announced its initiative to spotlight the increasing cyber threats targeting healthcare institutions. In recognition of National Physicians Week 2025, (more) The post News alert: INE Security spotlights healthcare companies facing rising exposure to costly breaches first appeared on The Last Watchdog.

article thumbnail

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust

The Hacker News

Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February 2025.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!