Sat.Nov 23, 2024

article thumbnail

Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites

The Hacker News

Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against the Defense Industrial Base (DIB), aviation, telecommunications, and financial and legal services across the world, Microsoft said.

article thumbnail

A cyberattack on gambling giant IGT disrupted portions of its IT systems

Security Affairs

A cyberattack on gambling giant IGT disrupted its systems, forcing the company to take certain services offline. International Game Technology (IGT) detected a cyberattack on November 17, the company promptly started its incident response procedures. International Game Technology PLC (IGT), formerly Gtech S.p.A. and Lottomatica S.p.A., is a multinational gambling company that produces slot machines and other gambling technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn

The Hacker News

The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of cryptocurrency as part of social engineering campaigns orchestrated over a six-month period.

article thumbnail

This OnePlus flagship costs half the price of an iPhone 16 Pro Max - and charges twice as fast

Zero Day

While it was released earlier this year, the OnePlus 12 is still a formidable Android phone with useful features and just a few, subtle limitations. It's $250 off for Black Friday.

103
103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Malicious Update in Python Crypto Library Targets Private Keys via Telegram

Penetration Testing

The Phylum Research Team has uncovered a malicious update to the PyPI package aiocpa, a crypto library widely used for its synchronous and asynchronous Crypto Pay API functionality. The attacker... The post Malicious Update in Python Crypto Library Targets Private Keys via Telegram appeared first on Cybersecurity News.

article thumbnail

Microsoft seized 240 sites used by the ONNX phishing service

Security Affairs

Microsoft disrupted the ONNX phishing service, seizing 240 sites and naming an Egyptian man as the operator behind the operation. Microsoft announced the disruption of the ONNX phishing service, another success against cybercrime which led to the seizure of 240 sites. The IT giant also identified and publicly disclosed the identity of an Egyptian man, Abanoub Nady (aka MRxC0DER), who allegedly runs the platform.

More Trending

article thumbnail

China-linked APT Gelsemium uses a new Linux backdoor dubbed WolfsBane

Security Affairs

China-linked APT Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane in attacks targeting East and Southeast Asia. China-linked APT Gelsemium has deployed a previously unknown Linux backdoor, WolfsBane, in attacks targeting East and Southeast Asia, according to ESET. Victims include entities in Taiwan, the Philippines, and Singapore, as seen in VirusTotal samples from March 2023.

article thumbnail

I've tested hundreds of travel chargers, and this is my new favorite, and it's cheap thanks to this Black Friday deal

Zero Day

In the past, I faced a dilemma between selecting a powerful office charger and a convenient universal travel charger. Satechi has solved my problem.

78
article thumbnail

Russia’s Ballistic Missile Attack on Ukraine Is an Alarming First

WIRED Threat Level

This is the first time Russia has used its so-called Oreshnik intermediate-range ballistic missile in combat. The launch also serves as a warning to the West.

61
article thumbnail

I found the Goldilocks of portable power stations, and I take it on all my adventures (and now you can save big with this Black Friday deal!)

Zero Day

Looking to harvest free power for your off-grid adventures? Check out the EcoFlow River 2 Max, a portable, highly durable power station with plenty of juice.

75
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-9511 (CVSS 9.8): Critical Flaw in FluentSMTP Plugin Exposes Over 300,000 WordPress Sites to Potential Takeover

Penetration Testing

A critical-severity vulnerability has been discovered in FluentSMTP, a widely used WordPress plugin designed to optimize email deliverability. Tracked as CVE-2024-9511 and assigned a CVSS v3.1 score of 9.8, the... The post CVE-2024-9511 (CVSS 9.8): Critical Flaw in FluentSMTP Plugin Exposes Over 300,000 WordPress Sites to Potential Takeover appeared first on Cybersecurity News.

article thumbnail

This 12-in-1 Thunderbolt dock has a surprise power feature for Windows users (get 20% in this Black Friday deal)

Zero Day

The Orico 12-in-1 Thunderbolt dock is geared for professionals and power users, with just about every port you can think of.

78
article thumbnail

Beyond Agile: Why Sentient IAM Is the Strategic Edge for 2025

Security Boulevard

Discover how Sentient IAM fills the gaps in Agile and Zero Trust, driving leadership, culture, and alignment to elevate business performance in 2025. The post Beyond Agile: Why Sentient IAM Is the Strategic Edge for 2025 first appeared on Identient. The post Beyond Agile: Why Sentient IAM Is the Strategic Edge for 2025 appeared first on Security Boulevard.

52
article thumbnail

I tested a portable fog machine and it's way more fun (and useful!) than I expected (and get 20% off in this Black Friday deal)

Zero Day

Add drama to photos and videos, ambiance to parties, mystery to plays or presentations. The Lensgo Smoke B's possibilities are limitless.

79
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Third-Party Risk Management: Gartner’s Best Practices for CCEOs

Responsible Cyber

In today’s interconnected business environment, third-party relationships are indispensable. However, with every partnership comes potential risk. As networks expand to include third, fourth, and even fifth parties, the complexities of managing these risks multiply. For CCEOs and senior leaders, effective third-party risk management (TPRM) is not just a necessity—it’s a strategic imperative.

Risk 52
article thumbnail

Why the iPad Mini 7 is the ultraportable tablet to beat this holiday travel season - and it's $50 off

Zero Day

Apple's iPad Mini 7 is an iterative upgrade to the small tablet series, but I wouldn't buy it for the AI features yet.

84
article thumbnail

DEF CON 32 – Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters

Security Boulevard

Authors/Presenters: Allan Cecil Our sincere appreciation to DEF CON , and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Troll Trapping Through TAS Tools Exposing Speedrunning Cheaters appeared first on Security Boulevard.

article thumbnail

The best iPads for college: Expert tested and reviewed

Zero Day

From taking notes and Zoom calls to completing a graphic design project, we went hands-on with the top iPads for college students.

75
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Andrew Tate’s ‘Educational Platform’ Was Hacked

WIRED Threat Level

Plus: The worst telecom hack in US history rolls on, iPhones are harder to break into, and more of the week’s top security news.

article thumbnail

I tested the world's fastest SSD and the results will make power users cry (and now you can save over $50)

Zero Day

Crucial once again unleashes the fastest NVMe M.2 SSDs money can buy. Can you benefit from its blazing performance?

79
article thumbnail

EY’s 2023 Global Third-Party Risk Management Survey Insights

Responsible Cyber

In a world where businesses thrive on interconnected networks, third-party relationships are both a lifeline and a liability. The EY 2023 Global Third-Party Risk Management (TPRM) Survey reveals the growing recognition among organizations of the need to navigate these complex relationships with precision, diligence, and foresight. With nine in ten respondents actively investing in their TPRM programs, the survey shines a spotlight on the tools, strategies, and trends shaping the future of third-

Risk 40
article thumbnail

You can buy Meta Ray-Ban smart glasses for 20% off this Black Friday - how the deal works

Zero Day

Consistent feature updates and a rare discount make the Meta Ray-Ban smart glasses a fantastic buy going into the holiday season.

96
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Best 11 Third-Party Risk Management Software in 2024

Responsible Cyber

Every link in your supply chain and every third-party relationship brings inherent risks. While it’s impossible to eliminate all third-party risks, managing and mitigating them effectively is crucial. In 2024, leading organizations are leveraging advanced third-party risk management (TPRM) software to centralize processes, enable automation, and enhance decision-making.

Risk 40
article thumbnail

My favorite power bank for traveling is waterproof and surprisingly lightweight (and it's cheaper t

Zero Day

Whether you're caught in the rain or simply need a reliable power source for your adventures, the Klarus K5 has you covered.

Banking 75
article thumbnail

A Deep Dive into the Last Vendor Breaches of 2024: What We Learned

Responsible Cyber

Overview of Vendor Breaches in 2024 In 2024, the cybersecurity landscape has faced an alarming rise in vendor-related breaches, underscoring the vulnerabilities associated with third-party service providers. Statistics reveal a notable increase in the number of vendor breaches, with reports indicating a staggering 45% rise compared to the previous year.

Risk 40
article thumbnail

Skip the iPad: This tablet is redefining what a kids tablet can do, and it's 42% off for Black Friday

Zero Day

The Fire HD 10 Kids Pro was a pleasant surprise. Its smooth performance for this Black Friday price is even more remarkable.

74
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Get this awesome Windows 11 Pro Mini PC for only $160 in this Black Friday deal

Zero Day

It's a tiny PC with lots of power and tons of possibilities - and it's not a Raspberry Pi.

80
article thumbnail

Get four Apple AirTags for just $73 with this Black Friday deal

Zero Day

If you're an iPhone user, you could probably use these trackers to monitor your keys, wallet, luggage, and more, especially with this rare $26 discount even before Black Friday.

52
article thumbnail

The longest-lasting power bank I've tested also has life-saving features (and now it's only $90 in this Black Friday deal)

Zero Day

With a 60,000mAh capacity, the Anker 548 is built to last and is perfect for emergencies.

Banking 81
article thumbnail

DJI's first portable power stations are packed with features - plus a little something extra (and prices are slashed in this Black Friday deal!)

Zero Day

With the Power 500 and Power 1000, DJI is offering power-hungry buyers two options - and each model caters to a variety of charging needs.

65
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.