Mon.Dec 16, 2024

article thumbnail

Short-Lived Certificates Coming to Let’s Encrypt

Schneier on Security

Starting next year : Our longstanding offering won’t fundamentally change next year, but we are going to introduce a new offering that’s a big shift from anything we’ve done before—short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Continuing our look back at 2024, part two of Last Watchdogs year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and business logic abuse has forced a shift toward more proactive, AI-enhanced defenses. The drivers are intensifying.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware

Security Affairs

Researchers warn of previously undetected surveillance spyware, named NoviSpy, that was found infecting a Serbian journalist’s phone. In February 2024, Serbian journalist Slavia Milanov was summoned to a police station after a routine traffic stop. After the police released him, Milanov noticed suspicious changes to his phone settings, such as disabled data and Wi-Fi.

Spyware 104
article thumbnail

Blackhat and BSides to Wind Down the Year

Javvad Malik

The days are shorter, the heating is turned on more frequently, and the final big conference week of the year for me ends with Blackhat Europe and BSides London. Blackhat was held at the ExCeL and featured all the usual suspects. I had the chance to present at Blackhat and also caught up with Quentyn Taylor, who somehow social-engineered me into agreeing to a 5k run in the new year The vendor area felt a bit smaller compared to previous years, but that wasnt necessarily a bad thing.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ransomware to Cause ‘Bumpy’ Security Ride in 2025

Tech Republic Security

Cashed-up ransomware criminals may exploit more zero days while potential blanket ransomware payment bans hang over defenders like a shadow.

article thumbnail

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets

WIRED Threat Level

Digital license plates sold by Reviver, already legal to buy in some states and drive with nationwide, can be hacked by their owners to evade traffic regulations or even law enforcement surveillance.

More Trending

article thumbnail

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

The Hacker News

Malware 102
article thumbnail

Technical Analysis of RiseLoader

Security Boulevard

IntroductionIn October 2024, Zscaler ThreatLabz came across malware samples that use a network communication protocol that is similar to RisePro. However, unlike RisePro which has primarily been used for information stealing, this new malware specializes in downloading and executing second-stage payloads. Due its distinctive focus and similarities with RisePros communication protocol, we named this new malware family RiseLoader.

Malware 87
article thumbnail

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

The Hacker News

Media 87
article thumbnail

Rhode Island Benefits and Services Systems Hit by Ransomware

Security Boulevard

Hackers likely stole personal information such names, addresses, and SSNs in a ransomware attack on Rhode Island's human services systems and are threatening to release the data as state and federal officials and Deloitte scrambling to mitigate the data breach. The post Rhode Island Benefits and Services Systems Hit by Ransomware appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Finally, I found a wireless Android Auto adapter that's snappy, functional, and won't break the bank

Zero Day

article thumbnail

Enhancing Active Directory Protection Through Strong Password and Access Management

Security Boulevard

An effective way to improve AD security is to implement both strong password policies and robust permissions management and monitoring. The post Enhancing Active Directory Protection Through Strong Password and Access Management appeared first on Security Boulevard.

article thumbnail

ConnectOnCall data breach impacted over 900,000 individuals

Security Affairs

ConnectOnCall disclosed a data breach impacting over 900,000 individuals, exposing their personal information. ConnectOnCall is a telehealth platform and after-hours on-call answering service designed to enhance communication between healthcare providers and patients. It offers automated patient call tracking, HIPAA-compliant chat, and integrates with electronic health record (EHR) systems to streamline after-hours calls and care coordination.

article thumbnail

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

The Hacker News

Malware 83
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The best cheap gaming PCs of 2024: Expert tested and recommended

Zero Day

81
article thumbnail

NoviSpy Spyware Installed on Journalist's Phone After Unlocking It With Cellebrite Tool

The Hacker News

Spyware 82
article thumbnail

Recent Cyber Attacks: Trends, Tactics, and Countermeasures

Hacker's King

In the digital age, cyber-attacks are a growing concern for individuals, businesses, and governments worldwide. These attacks are becoming more sophisticated, targeted, and damaging, threatening data privacy, financial stability, and national security. Understanding the recent trends, tactics, and effective countermeasures is crucial for anyone concerned about cybersecurity.

article thumbnail

Dell's latest XPS 13 hits the sweet spot of performance and value for me. Here's why

Zero Day

78
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

The Hacker News

76
article thumbnail

Lost luggage? Apple AirTag users can now share location with these airlines

Zero Day

78
article thumbnail

Why We Should Insist on Future-Proofing Cybersecurity Regulatory Frameworks

Security Boulevard

There are concerns around the future adaptability and efficacy of regulatory frameworks, particularly among the developer community. The post Why We Should Insist on Future-Proofing Cybersecurity Regulatory Frameworks appeared first on Security Boulevard.

article thumbnail

How to run a Windows app on Linux with Wine

Zero Day

75
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Hackers exploit critical Apache Struts RCE flaw (CVE-2024-53677) after PoC exploit release

Penetration Testing

Threat actors have begun exploiting a critical vulnerability in the Apache Struts framework, CVE-2024-53677, just days after a proof-of-concept (PoC) exploit was published online. Rated 9.5 on the CVSSv4 severity... The post Hackers exploit critical Apache Struts RCE flaw (CVE-2024-53677) after PoC exploit release appeared first on Cybersecurity News.

article thumbnail

The best 85-inch TVs of 2024: Expert tested and recommended

Zero Day

75
article thumbnail

HeartCrypt: A Packer-as-a-Service Fueling Malware Campaigns

Penetration Testing

Unit 42 has uncovered HeartCrypt, a Packer-as-a-Service (PaaS) designed to protect malware from detection. Since its launch in February 2024, HeartCrypt has rapidly become a popular choice among cybercriminals, packing... The post HeartCrypt: A Packer-as-a-Service Fueling Malware Campaigns appeared first on Cybersecurity News.

Malware 62
article thumbnail

How to factory reset your Android phone without unlocking it

Zero Day

74
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Balancing Security and Usability of Large Language Models: An LLM Benchmarking Framework

NetSpi Executives

By 2026, Gartner predicts that “80% of all enterprises will have used or deployed generative AI applications.” However, many of these organizations have yet to find a way to balance usability and security in their deployments. As a result, consumer-facing LLM capabilities introduce a new and less understood set of risks for organizations.

Risk 65
article thumbnail

This powerful firewall delivers enterprise-level security at a home office price

Zero Day

article thumbnail

Easy Money Online? FTC Warns of Exploding “Task Scam” Threat

Penetration Testing

A new Federal Trade Commission (FTC) report reveals a dramatic rise in online job scams targeting consumers with promises of easy earnings for completing simple tasks. These “task scams” have... The post Easy Money Online? FTC Warns of Exploding “Task Scam” Threat appeared first on Cybersecurity News.

Scams 72
article thumbnail

Search ChatGPT now available to free users on the 8th day of OpenAI

Zero Day

73
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.