Thu.Dec 12, 2024

article thumbnail

Sweet Treats, Sour Breach: Cyberattack Hits Krispy Kreme

SecureWorld News

When most people think of Krispy Kreme, they picture warm, glazed doughnuts and coffee, not cyberattacks. Yet, the recent cybersecurity breach at the beloved doughnut chain highlights critical lessons for organizations of all sizes and industries. The details of the Krispy Kreme hack are still emerging, but the companys Form 8-K filing brought the incident to light, offering a rare glimpse into the challenges businesses face when their systems are compromised.

article thumbnail

AI Slop is Hurting Security — LLMs are Dumb and People are Dim

Security Boulevard

Artificial stupidity: Large language models are terrible if you need reasoning or actual understanding. The post AI Slop is Hurting Security LLMs are Dumb and People are Dim appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data brokers should stop trading health and location data, new bill proposes

Malwarebytes

Senators introduced a bill on Tuesday that would prohibit data brokers from selling or transferring location and health data. Data brokers have drawn attention this year by leaking several large databases, with the worst being the National Public Data leak. The data breach made international headlines because it affected hundreds of millions of people, and it included Social Security Numbers.

article thumbnail

Operation PowerOFF: Europol Cracks Down on Global DDoS-for-Hire Platforms

Penetration Testing

Law enforcement worldwide has delivered a significant blow to cybercriminals with Operation PowerOFF, an international effort led by Europol to dismantle Distributed Denial-of-Service (DDoS)-for-hire platforms. In a coordinated strike involving... The post Operation PowerOFF: Europol Cracks Down on Global DDoS-for-Hire Platforms appeared first on Cybersecurity News.

DDOS 85
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Experts discovered surveillance tool EagleMsgSpy used by Chinese law enforcement

Security Affairs

Chinese law enforcement uses the mobile surveillance tool EagleMsgSpy to gather data from Android devices, as detailed by Lookout. Researchers at the Lookout Threat Lab discovered a surveillance tool, dubbed EagleMsgSpy, used by Chinese law enforcement to spy on mobile devices. The researchers analyzed multiple samples of the malware and gained access to internal documents obtained from open directories on attacker infrastructure.

article thumbnail

Google Launches Gemini 2.0 with Autonomous Tool Linking

Tech Republic Security

Gemini 2.0 Flash is available now, with other model sizes coming in January. It adds multilingual voice output, image output, and some trendy agentic capabilities.

LifeWorks

More Trending

article thumbnail

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

The Hacker News

Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information. The flaw, tracked as CVE-2024-44131 (CVSS score: 5.

133
133
article thumbnail

A Year in Data Security: Five Things We’ve Learned From 2024

Security Boulevard

As the dust settles on another hectic 12 months, business and IT leaders should enjoy a well-earned break. But not for long. The end of one year offers a fantastic vantage point from which to view the macro trends that may go on to shape the next. With this in mind, these are the five things weve learned about cybersecurity in 2024. The post A Year in Data Security: Five Things Weve Learned From 2024 appeared first on Security Boulevard.

article thumbnail

Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online

The Hacker News

Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks.

article thumbnail

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1

Security Boulevard

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024. The post Emulating the Financially Motivated Criminal Adversary FIN7 Part 1 appeared first on AttackIQ. The post Emulating the Financially Motivated Criminal Adversary FIN7 Part 1 appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

The Hacker News

Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, tracked as CVE-2024-11972 (CVSS score: 9.8), affects all versions of the plugin prior to 1.9.0. The plugin has over 10,000 active installations.

Risk 116
article thumbnail

GenAI to Advanced Microsegmentation: Secure Workload 3.10 Has It All!

Cisco Security

Secure Workload platform has taken a significant leap forward with the launch of its 3.10 release earlier this month packed with Gen AI and many more.

104
104
article thumbnail

Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States

The Hacker News

The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. "BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims," Lookout said in an analysis.

Spyware 112
article thumbnail

Charges Against CISOs Create Worries, Hope in Security Industry: Survey

Security Boulevard

A survey of IT security pros by cybersecurity firm BlackFog found that 70% of them said federal cases like that against SolarWinds' CISO hurt their opinion about the position, but some said they expected the boards of directors would take the issues of security more seriously. The post Charges Against CISOs Create Worries, Hope in Security Industry: Survey appeared first on Security Boulevard.

CISO 104
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized

The Hacker News

The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox ("rydox[.]ru" and "rydox[.]cc") for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud. In tandem, three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli, have been arrested.

article thumbnail

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion

Trend Micro

In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection.

article thumbnail

US Bitcoin ATM operator Byte Federal suffered a data breach

Security Affairs

US Bitcoin ATM operator Byte Federal suffered a data breach impacting 58,000 customers, attackers gained unauthorized access to a server via GitLab flaw. US Bitcoin ATM operator Byte Federal disclosed a data breach after threat actors gained unauthorized access to a company server by exploiting a GitLab vulnerability. Byte Federal is a company specializing in cryptocurrency services through its network of over 1,200 Bitcoin ATMs across the United States.

article thumbnail

SaaS Budget Planning Guide for IT Professionals

The Hacker News

SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, its no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity.

98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Experts discovered the first mobile malware families linked to Russia’s Gamaredon

Security Affairs

The Russia-linked APT Gamaredon used two new Android spyware tools calledBoneSpyandPlainGnome against former Soviet states. Lookout researchers linked the BoneSpy and PlainGnome Android surveillance families to the Russian APT group Gamaredon (a.k.a. Armageddon , Primitive Bear, and ACTINIUM). These are the first known mobile malware families linked to the Russian APT.

Mobile 98
article thumbnail

Charity Scams During the Holidays: How to Verify Legitimate Charities

Security Boulevard

The holiday season is a time of giving and generosity, but its also a prime time for scammers to take advantage of peoples goodwill. According to the FBI, charity scams increase significantly during the holidays as criminals look to exploit those who wish to donate to a good cause. Heres how you can verify the [] The post Charity Scams During the Holidays: How to Verify Legitimate Charities appeared first on BlackCloak | Protect Your Digital Life.

Scams 52
article thumbnail

Black Hat Europe 2024: Can AI systems be socially engineered?

We Live Security

Attackers could use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally in carrying out malicious activities

article thumbnail

This Pixel feature can improve your phone's battery health - how to turn it on

Zero Day

Google's bypass charging feature lets you cap your phone's battery charge at 80%. There are two great reasons you'll want to take advantage of that.

89
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Active Exploitation Observed for CVE-2024-11972 (CVSS 9.8): WordPress Plugin Flaw Exposes 10,000+ Sites to Backdoor Attacks

Penetration Testing

A serious vulnerability in the Hunk Companion plugin for WordPress, tracked as CVE-2024-11972 (CVSS 9.8), has been discovered by the WPScan team. This flaw, present in versions below 1.9.0, allows... The post Active Exploitation Observed for CVE-2024-11972 (CVSS 9.8): WordPress Plugin Flaw Exposes 10,000+ Sites to Backdoor Attacks appeared first on Cybersecurity News.

article thumbnail

The best small tablets of 2025: Expert tested and reviewed

Zero Day

Bigger doesn't always mean better in the tablet world. We tested the best small tablets that combine affordability, great battery life, and fast processors in a small form factor.

75
article thumbnail

APT-C-60 Exploits Legitimate Services in Sophisticated Malware Attack Targeting Japanese Organizations

Penetration Testing

In August 2024, JPCERT/CC confirmed a targeted attack against a Japanese organization, believed to be the work of the threat group APT-C-60. This advanced campaign utilized legitimate services like Google... The post APT-C-60 Exploits Legitimate Services in Sophisticated Malware Attack Targeting Japanese Organizations appeared first on Cybersecurity News.

Malware 80
article thumbnail

A Critical Guide to PCI Compliance

Thales Cloud Protection & Licensing

A Critical Guide to PCI Compliance madhav Thu, 12/12/2024 - 08:28 You are shopping online, adding items to your cart, and you're ready to pay with your credit card. You expect that when you hit "Checkout," your payment details will be safe. This sense of trust exists thanks largely to PCI DSSthe Payment Card Industry Data Security Standard. PCI DSS is a security system for your credit card and its data.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

PDQ Deploy Vulnerability Exposes Admin Credentials: CERT/CC Issues Advisory

Penetration Testing

A critical vulnerability in PDQ Deploy, a software deployment service used by system administrators, has been highlighted in a recent advisory by the CERT Coordination Center (CERT/CC). The flaw, which... The post PDQ Deploy Vulnerability Exposes Admin Credentials: CERT/CC Issues Advisory appeared first on Cybersecurity News.

article thumbnail

10 Container Security Best Practices: A Guide

Security Boulevard

Containers boost your application's scalability and efficiency. But without proper security, containerized environments can be vulnerable to data breaches, supply chain attacks , and other risks that derail projects. The post 10 Container Security Best Practices: A Guide appeared first on Security Boulevard.

article thumbnail

Secure Email Gateways Fail to Stop Advanced Phishing Campaign Targeting Multiple Industries

Penetration Testing

A detailed report from Group-IB reveals a sophisticated global phishing campaign targeting employees across 30 companies in 15 jurisdictions. By leveraging trusted domains and dynamic personalization, the threat actors have... The post Secure Email Gateways Fail to Stop Advanced Phishing Campaign Targeting Multiple Industries appeared first on Cybersecurity News.

article thumbnail

A Critical Guide to PCI Compliance

Security Boulevard

A Critical Guide to PCI Compliance madhav Thu, 12/12/2024 - 13:28 You are shopping online, adding items to your cart, and you're ready to pay with your credit card. You expect that when you hit "Checkout," your payment details will be safe. This sense of trust exists thanks largely to PCI DSSthe Payment Card Industry Data Security Standard. PCI DSS is a security system for your credit card and its data.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!