Sun.Feb 02, 2025

article thumbnail

WhatsApp disrupted a hacking campaign targeting journalists with Paragon spyware

Security Affairs

Meta announced the disruption of a malware campaign via WhatsApp that targeted journalists with the Paragon spyware. Meta announced that discovered and dismantled a malware campaign via WhatsApp that targeted journalists and civil society members with the Paragon spyware (aka Graphite). The hacking campaign targeted 90 users and was disrupted in December, WhatsApp already alerted them of a possible compromise of their devices.

Spyware 108
article thumbnail

AI Disruption: The DeepSeek Effect on Wall Street, Governments and Beyond

Lohrman on Security

The past week has been full of headlines regarding DeepSeek AI. So what lessons can we learn from this whirlwind of media stories and the corresponding reactions from governments and Wall Street?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Law enforcement seized the domains of HeartSender cybercrime marketplaces

Security Affairs

U.S. and Dutch authorities seized 39 domains and servers linked to the HeartSender cybercrime group based in Pakistan. A joint law enforcement operation led to the seizure of 39 domains tied to a Pakistan-based HeartSender cybercrime group (aka Saim Raza and Manipulators Team) known for selling hacking and fraud tools. U.S. and Dutch authorities participated in the operation, the police seized the domains on January 29, 2025.

article thumbnail

Hackers Hijack JFK File Release: Malware & Phishing Surge

Security Boulevard

Veriti Research has uncovered a potentially growing cyber threat campaign surrounding the release of the declassified JFK, RFK, and MLK files. Attackers are capitalizing on public interest in these historical documents to launch potential malware campaigns, phishing schemes, and exploit attempts. Our research indicates that cybercriminals are quick to react to major public events, and [] The post Hackers Hijack JFK File Release: Malware & Phishing Surge appeared first on VERITI.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Texas is the first state to ban DeepSeek on government devices

Security Affairs

Texas bans DeepSeek and RedNote on government devices to block Chinese data-harvesting AI, citing security risks. Texas Governor Greg Abbott banned Chinese AI company DeepSeek and Chinese-owned social media apps Xiaohongshu (RedNote) and Lemon8 from all state-issued devices. The AI-powered chatbot, recently launched globally, has rapidly gained popularity reaching millions of users.

article thumbnail

CVE-2024-57376: End-of-Life D-Link Routers Vulnerable to Unauthenticated RCE

Penetration Testing

D-Link has updated a security advisory warning of a critical buffer overflow vulnerability affecting several end-of-life routers. The The post CVE-2024-57376: End-of-Life D-Link Routers Vulnerable to Unauthenticated RCE appeared first on Cybersecurity News.

LifeWorks

More Trending

article thumbnail

DEF CON 32 – Navigating the Turbulent Skies of Aviation Cyber Regulation

Security Boulevard

Authors/Presenters: M. Weigand, S. Wagner Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – Navigating the Turbulent Skies of Aviation Cyber Regulation appeared first on Security Boulevard.

article thumbnail

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

The Hacker News

A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide range of tailored lures to deceive victims and trick them into installing malware such as StealC, Atomic macOS Stealer (aka AMOS), and Angel Drainer.

Malware 124
article thumbnail

Your next Apple Watch or smart ring could have a feature that transforms healthcare

Zero Day

From Apple and Samsung to Oura and Withings, the health tech space is changing to not only deliver insights into a person's health but also connect them with medical professionals.

article thumbnail

PoC Exploit Released for macOS Kernel Vulnerability CVE-2025-24118 (CVSS 9.8)

Penetration Testing

A newly discovered race condition in Apples macOS kernel (XNU) could allow attackers to escalate privileges, corrupt memory, The post PoC Exploit Released for macOS Kernel Vulnerability CVE-2025-24118 (CVSS 9.8) appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Why I'm recommending the standard Galaxy S25 over the Plus and Ultra this year

Zero Day

The Samsung Galaxy S25 is an incremental upgrade over the Galaxy S24, but it still deserves a spot in your pocket for these reasons.

89
article thumbnail

CVE-2025-0851 (CVSS 9.8): Deep Java Library Vulnerability Allows Path Traversal Exploits

Penetration Testing

A newly discovered vulnerability in the Deep Java Library (DJL) has been found to leave systems open to The post CVE-2025-0851 (CVSS 9.8): Deep Java Library Vulnerability Allows Path Traversal Exploits appeared first on Cybersecurity News.

article thumbnail

I tested the viral 'floating' air purifier - and can't decide what my favorite feature is

Zero Day

The SwitchBot Air Purifier Table would sound like a gimmick if it didn't actually work so well.

74
article thumbnail

CVE-2025-0477 (CVSS 9.8): Critical Security Flaw in Rockwell Automation’s FactoryTalk AssetCentre

Penetration Testing

Industrial automation giant Rockwell Automation has issued a security advisory addressing multiple critical vulnerabilities in its FactoryTalk AssetCentre The post CVE-2025-0477 (CVSS 9.8): Critical Security Flaw in Rockwell Automations FactoryTalk AssetCentre appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Native Sensors vs. Integrations for XDR Platforms?

Trend Micro

Native sensors vs. integrations in XDR: Native sensors offer faster deployment, real-time detection, and deeper visibility, while integrations may add complexity and delays. Learn how to optimize your XDR strategy for improved security.

62
article thumbnail

SparkRAT: A Persistent Cross-Platform Cyber Threat Targeting macOS and Beyond

Penetration Testing

Since its initial release on GitHub in 2022 by user XZB-1248, SparkRAT has evolved into a widely used The post SparkRAT: A Persistent Cross-Platform Cyber Threat Targeting macOS and Beyond appeared first on Cybersecurity News.

article thumbnail

How to Turn Your Truck Bed into the Perfect Workstation

SecureBlitz

Learn how to turn your truck bed into the perfect workstation. A truck bed can be more than simply a location to store cargo; it can also serve as an efficient and adaptable office. Creating a successful truck bed workstation requires careful planning, the right equipment, and imaginative design, whether for everyday business, mechanical maintenance, […] The post How to Turn Your Truck Bed into the Perfect Workstation appeared first on SecureBlitz Cybersecurity.

article thumbnail

Microsoft to Kill its 365 VPN: What You Need to Know

Penetration Testing

In a move that’s sure to raise eyebrows and questions about its commitment to user privacy, Microsoft has The post Microsoft to Kill its 365 VPN: What You Need to Know appeared first on Cybersecurity News.

VPN 69
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI

Security Boulevard

In this episode, we explore the rollout of digital drivers licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising your privacy? We also discuss the new Chinese AI model, DeepSeek, which is affecting U.S. tech companies stock prices. Join us as we [] The post Privacy Concerns with Digital Drivers Licenses, The Rise of DeepSeek AI appeared first on Shared Security Podcast.

article thumbnail

North Korean APT Lazarus Uses Malicious npm Package to Target Developers

Penetration Testing

Cybersecurity researchers at Socket have uncovered a new supply chain attack orchestrated by Lazarus Group, the notorious North The post North Korean APT Lazarus Uses Malicious npm Package to Target Developers appeared first on Cybersecurity News.

article thumbnail

Security Affairs newsletter Round 509 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. A ransomware attack forced New York Blood Center to reschedule appointments Contec CMS8000 patient monitors contain a hidden backdoor Community Health Center data breach impacted over 1 million patients Italy’s data protection authority Garante bloc

article thumbnail

Unrestricted Access: A Simple Web Misconfiguration Exposes Critical Data

Penetration Testing

A recent report by CloudSEK’s BeVigil reveals how a common web misconfiguration, namely enabled directory listings, led to The post Unrestricted Access: A Simple Web Misconfiguration Exposes Critical Data appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Gov No More: Government Domains Weaponized in Phishing Surge

Penetration Testing

A recent Cofense Intelligence report has uncovered a troubling trend: threat actors are increasingly abusing.gov top-level domains The post.Gov No More: Government Domains Weaponized in Phishing Surge appeared first on Cybersecurity News.

article thumbnail

The Hidden Cyber Trap: How Compromised Websites and Malicious AdTech Manipulate Users

Penetration Testing

In the cybersecurity world, analysts often focus on the adversarys tactics, techniques, and procedures (TTPs), but what happens The post The Hidden Cyber Trap: How Compromised Websites and Malicious AdTech Manipulate Users appeared first on Cybersecurity News.

article thumbnail

CISA Warns of Hidden Backdoor in Contec CMS8000 Patient Monitors

Penetration Testing

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding the Contec CMS8000, a The post CISA Warns of Hidden Backdoor in Contec CMS8000 Patient Monitors appeared first on Cybersecurity News.

article thumbnail

Sanctions Risk in Open Source: Linux Foundation Offers Guidance

Penetration Testing

The open-source world, built on collaboration and shared code, faces a growing challenge: navigating the complex landscape of The post Sanctions Risk in Open Source: Linux Foundation Offers Guidance appeared first on Cybersecurity News.

Risk 64
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Devil-Traff: The New SMS Phishing Platform Exploited by Cybercriminals

Penetration Testing

Security researcher Daniel Kelley at SlashNext has unveiled a new threat to cybersecurity: Devil-Traff, a bulk SMS platform The post Devil-Traff: The New SMS Phishing Platform Exploited by Cybercriminals appeared first on Cybersecurity News.