Mon.Dec 16, 2024

article thumbnail

Short-Lived Certificates Coming to Let’s Encrypt

Schneier on Security

Starting next year : Our longstanding offering won’t fundamentally change next year, but we are going to introduce a new offering that’s a big shift from anything we’ve done before—short-lived certificates. Specifically, certificates with a lifetime of six days. This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Continuing our look back at 2024, part two of Last Watchdogs year-ender roundtable turns its focus to emerging threats vs. evolving defense tactics. Part two of a four-part series The explosion of AI-driven phishing, insider threats, and business logic abuse has forced a shift toward more proactive, AI-enhanced defenses. The drivers are intensifying.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report claims that Serbian authorities abused Cellebrite tool to install NoviSpy spyware

Security Affairs

Researchers warn of previously undetected surveillance spyware, named NoviSpy, that was found infecting a Serbian journalist’s phone. In February 2024, Serbian journalist Slavia Milanov was summoned to a police station after a routine traffic stop. After the police released him, Milanov noticed suspicious changes to his phone settings, such as disabled data and Wi-Fi.

Spyware 104
article thumbnail

Blackhat and BSides to Wind Down the Year

Javvad Malik

The days are shorter, the heating is turned on more frequently, and the final big conference week of the year for me ends with Blackhat Europe and BSides London. Blackhat was held at the ExCeL and featured all the usual suspects. I had the chance to present at Blackhat and also caught up with Quentyn Taylor, who somehow social-engineered me into agreeing to a 5k run in the new year The vendor area felt a bit smaller compared to previous years, but that wasnt necessarily a bad thing.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ransomware to Cause ‘Bumpy’ Security Ride in 2025

Tech Republic Security

Cashed-up ransomware criminals may exploit more zero days while potential blanket ransomware payment bans hang over defenders like a shadow.

article thumbnail

Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets

WIRED Threat Level

Digital license plates sold by Reviver, already legal to buy in some states and drive with nationwide, can be hacked by their owners to evade traffic regulations or even law enforcement surveillance.

More Trending

article thumbnail

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

The Hacker News

Malware 102
article thumbnail

Technical Analysis of RiseLoader

Security Boulevard

IntroductionIn October 2024, Zscaler ThreatLabz came across malware samples that use a network communication protocol that is similar to RisePro. However, unlike RisePro which has primarily been used for information stealing, this new malware specializes in downloading and executing second-stage payloads. Due its distinctive focus and similarities with RisePros communication protocol, we named this new malware family RiseLoader.

Malware 87
article thumbnail

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

The Hacker News

Media 87
article thumbnail

Rhode Island Benefits and Services Systems Hit by Ransomware

Security Boulevard

Hackers likely stole personal information such names, addresses, and SSNs in a ransomware attack on Rhode Island's human services systems and are threatening to release the data as state and federal officials and Deloitte scrambling to mitigate the data breach. The post Rhode Island Benefits and Services Systems Hit by Ransomware appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Finally, I found a wireless Android Auto adapter that's snappy, functional, and won't break the bank

Zero Day

article thumbnail

Enhancing Active Directory Protection Through Strong Password and Access Management

Security Boulevard

An effective way to improve AD security is to implement both strong password policies and robust permissions management and monitoring. The post Enhancing Active Directory Protection Through Strong Password and Access Management appeared first on Security Boulevard.

article thumbnail

ConnectOnCall data breach impacted over 900,000 individuals

Security Affairs

ConnectOnCall disclosed a data breach impacting over 900,000 individuals, exposing their personal information. ConnectOnCall is a telehealth platform and after-hours on-call answering service designed to enhance communication between healthcare providers and patients. It offers automated patient call tracking, HIPAA-compliant chat, and integrates with electronic health record (EHR) systems to streamline after-hours calls and care coordination.

article thumbnail

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

The Hacker News

Malware 83
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The best cheap gaming PCs of 2024: Expert tested and recommended

Zero Day

81
article thumbnail

NoviSpy Spyware Installed on Journalist's Phone After Unlocking It With Cellebrite Tool

The Hacker News

Spyware 82
article thumbnail

Recent Cyber Attacks: Trends, Tactics, and Countermeasures

Hacker's King

In the digital age, cyber-attacks are a growing concern for individuals, businesses, and governments worldwide. These attacks are becoming more sophisticated, targeted, and damaging, threatening data privacy, financial stability, and national security. Understanding the recent trends, tactics, and effective countermeasures is crucial for anyone concerned about cybersecurity.

article thumbnail

Dell's latest XPS 13 hits the sweet spot of performance and value for me. Here's why

Zero Day

78
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

The Hacker News

76
article thumbnail

Lost luggage? Apple AirTag users can now share location with these airlines

Zero Day

78
article thumbnail

Why We Should Insist on Future-Proofing Cybersecurity Regulatory Frameworks

Security Boulevard

There are concerns around the future adaptability and efficacy of regulatory frameworks, particularly among the developer community. The post Why We Should Insist on Future-Proofing Cybersecurity Regulatory Frameworks appeared first on Security Boulevard.

article thumbnail

How to run a Windows app on Linux with Wine

Zero Day

75
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hackers exploit critical Apache Struts RCE flaw (CVE-2024-53677) after PoC exploit release

Penetration Testing

Threat actors have begun exploiting a critical vulnerability in the Apache Struts framework, CVE-2024-53677, just days after a proof-of-concept (PoC) exploit was published online. Rated 9.5 on the CVSSv4 severity... The post Hackers exploit critical Apache Struts RCE flaw (CVE-2024-53677) after PoC exploit release appeared first on Cybersecurity News.

article thumbnail

The best 85-inch TVs of 2024: Expert tested and recommended

Zero Day

75
article thumbnail

HeartCrypt: A Packer-as-a-Service Fueling Malware Campaigns

Penetration Testing

Unit 42 has uncovered HeartCrypt, a Packer-as-a-Service (PaaS) designed to protect malware from detection. Since its launch in February 2024, HeartCrypt has rapidly become a popular choice among cybercriminals, packing... The post HeartCrypt: A Packer-as-a-Service Fueling Malware Campaigns appeared first on Cybersecurity News.

Malware 62
article thumbnail

How to factory reset your Android phone without unlocking it

Zero Day

74
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Balancing Security and Usability of Large Language Models: An LLM Benchmarking Framework

NetSpi Executives

By 2026, Gartner predicts that “80% of all enterprises will have used or deployed generative AI applications.” However, many of these organizations have yet to find a way to balance usability and security in their deployments. As a result, consumer-facing LLM capabilities introduce a new and less understood set of risks for organizations.

Risk 65
article thumbnail

This powerful firewall delivers enterprise-level security at a home office price

Zero Day

article thumbnail

Easy Money Online? FTC Warns of Exploding “Task Scam” Threat

Penetration Testing

A new Federal Trade Commission (FTC) report reveals a dramatic rise in online job scams targeting consumers with promises of easy earnings for completing simple tasks. These “task scams” have... The post Easy Money Online? FTC Warns of Exploding “Task Scam” Threat appeared first on Cybersecurity News.

Scams 72
article thumbnail

Search ChatGPT now available to free users on the 8th day of OpenAI

Zero Day

73
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.