Fri.Feb 07, 2025

article thumbnail

Screenshot-Reading Malware

Schneier on Security

Kaspersky is reporting on a new type of smartphone malware. The malware in question uses optical character recognition (OCR) to review a device’s photo library, seeking screenshots of recovery phrases for crypto wallets. Based on their assessment, infected Google Play apps have been downloaded more than 242,000 times. Kaspersky says: “This is the first known case of an app infected with OCR spyware being found in Apple’s official app marketplace.” That’s a tactic I

Malware 251
article thumbnail

20 Million OpenAI accounts offered for sale

Malwarebytes

A cybercriminal acting under the monicker emirking offered 20 million OpenAI user login credentials this week, sharing what appeared to be samples of the stolen data itself. Post by emirking A translation of the Russian statement by the poster says: When I realized that OpenAI might have to verify accounts in bulk, I understood that my password wouldnt stay hidden.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FINALLY! FCC Gets Tough on Robocall Fraud

Security Boulevard

KYC isnt a Thing, claims telco: Commissioner Brendan Carr (pictured) wants $4.5 million fine on Telnyx, for enabling illegal robocall scheme. The post FINALLY! FCC Gets Tough on Robocall Fraud appeared first on Security Boulevard.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Ransom Payments Fell 35% in 2024 After LockBit, BlackCat Takedowns

Security Boulevard

Law enforcement actions, better defenses, and a refusal by victims to pay helped to reduce the amount of ransoms paid in 2024 by $35%, a sharp decline from the record $1.25 billion shelled out in 2023, according to researchers with Chainalysis. The post Ransom Payments Fell 35% in 2024 After LockBit, BlackCat Takedowns appeared first on Security Boulevard.

Mobile 113
article thumbnail

U.S. CISA adds Trimble Cityworks flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Trimble Cityworks vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Trimble Cityworks vulnerability, tracked as CVE-2025-0994 , to its Known Exploited Vulnerabilities (KEV) catalog. Trimble Cityworks is a GIS-centric asset management and permitting software designed for local governments, utilities, and public works organizations.

More Trending

article thumbnail

Hospital Sisters Health System impacted 882,782 individuals

Security Affairs

The cyberattack on Hospital Sisters Health System in 2023 compromised the personal information of 883,000 individuals. The cyberattack that hit the infrastructure of the Hospital Sisters Health System (HSHS) in August 2023 impacted the personal information of 882,782 individuals. The systems at the hospital were brought down by the attack starting on August 27, 2023, the healthcare organization confirmed that the security breach disrupted internal systems, some applications, communications, onli

article thumbnail

UK Government Reportedly Demands Access to Encrypted iCloud Files Worldwide

Tech Republic Security

As reported by The Washington Post, Apple received notice of a possible request in March 2024, but the official ask occurred in January 2025.

article thumbnail

Attackers used a public ASP.NET machine to conduct ViewState code injection attacks

Security Affairs

Microsoft researchers warn that threat actors are delivering the Godzilla framework using a static ASP.NET machine. In December 2024, Microsoft Threat Intelligence researchers spotted a threat actor using a public ASP.NET machine key to deploy Godzilla malware, exploiting insecure key usage in code. Microsoft has since found over 3,000 public keys that could be used to carry out ViewState code injection attacks.

Risk 61
article thumbnail

Ransomware as a Service: How Microsegmentation Can Protect Against This Growing Threat

Security Boulevard

The Evolution of Ransomware: From Isolated Attacks to a Billion-Dollar Enterprise In the past, ransomware attacks were opportunistic and relatively unsophisticated. A lone hacker would develop a malicious program, spread it via infected email attachments, and demand a few hundred dollars to unlock a victims files. These attacks were more of an inconvenience than a [] The post Ransomware as a Service: How Microsegmentation Can Protect Against This Growing Threat appeared first on ColorTokens.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cyber Attack Severity Rating System Established in U.K.

Tech Republic Security

The U.K.s new cyberattack rating system ranks incidents from 1 to 5, but experts warn businesses must go beyond awareness and strengthen their defences.

article thumbnail

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

The Hacker News

A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks.

article thumbnail

IT Teams Worry About Increasing Cost of Cyber Tools From AI Features, While Criminals Barely Use Them

Tech Republic Security

Most IT leaders believe generative AI will increase the cost of their security tools, according to Sophos research. But, by the looks of cyber crime forums, hackers are barely using AI.

article thumbnail

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

The Hacker News

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file," ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Yahoo Finance: U.S. Lawmakers Push to Ban China’s DeepSeek AI Over Security Risks – Feroot Security Analysis

Security Boulevard

Washington, D.C. U.S. lawmakers announced a bill to ban DeepSeek, the Chinese AI chatbot app, from government devices following a security analysis by Feroot Security that revealed alarming privacy and national security risks. The research suggests that DeepSeek collects user data, including digital fingerprints, login credentials, and behavioral information, potentially sending it to servers [] The post Yahoo Finance: U.S.

Risk 59
article thumbnail

Gemini can now watch YouTube for you - skip the video, get the highlights

Zero Day

Don't want to wade through an entire video to find what you need? Let Gemini save you time and summarize it for you.

127
127
article thumbnail

iOS 18.3.1 Release Expected Within the Next Few Weeks

Tech Republic Security

Speculation about the iOS 18.3.1 release has surfaced. This includes a related Starlink connectivity rumor.

article thumbnail

Finally, a powerful Windows laptop that rivals the MacBook Pro (and has a better display, too)

Zero Day

Samsung's Galaxy Book5 Pro is an ultra-thin laptop with a stunning 3K touchscreen and powerful Intel chipset. Here's how it tested.

117
117
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ACLU Warns DOGE’s ‘Unchecked’ Access Could Violate Federal Law

WIRED Threat Level

The ACLU says it stands ready to sue for access to government records that detail DOGEs access to sensitive personnel data.

article thumbnail

Can rebooting your iPhone really make it run faster? I tried it every day to find out

Zero Day

Here's what actually happened when I rebooted my iPhone every day for three months.

111
111
article thumbnail

Microsoft Identifies 3,000+ Publicly Disclosed ASP.NET Machine Keys Vulnerable to Code Injection

The Hacker News

Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pathway. The tech giant's threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.

Software 102
article thumbnail

This is the camera I recommend to most new photographers - especially at its price

Zero Day

The Canon EOS R100 makes taking high-quality pictures a breeze, thanks to its intuitive design. On Amazon, the camera and a lens are available at a discount.

109
109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could permit an attacker to conduct remote code execution.

article thumbnail

I tried to replace my laptop with the Galaxy S25 Ultra - and I'd do it all over again

Zero Day

One of the most overlooked Samsung features lets you pair your phone with a monitor or TV and operate it like a computer. Just make sure your most-used services are supported.

102
102
article thumbnail

AI-Powered Social Engineering: Reinvented Threats

The Hacker News

The foundations for social engineering attacks manipulating humans might not have changed much over the years. Its the vectors how these techniques are deployed that are evolving. And like most industries these days, AI is accelerating its evolution. This article explores how these changes are impacting business, and how cybersecurity leaders can respond.

article thumbnail

Windows 11's bug-fixing update is making things worse

Zero Day

Each new update ends up introducing even more bugs.

101
101
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

AsyncRAT Rises Again: Malware Abuses Legitimate Services for Stealthy Delivery

Penetration Testing

Forcepoint X-Labs exposes a new campaign utilizing Python, TryCloudflare, and Dropbox to spread the notorious AsyncRAT. The Forcepoint The post AsyncRAT Rises Again: Malware Abuses Legitimate Services for Stealthy Delivery appeared first on Cybersecurity News.

Malware 92
article thumbnail

Security firm discovers DeepSeek has 'direct links' to Chinese government servers

Zero Day

Beyond investor and CEO panic, DeepSeek presents a host of security concerns. Here's what the experts think you should know.

article thumbnail

India’s RBI Introduces Exclusive "bank.in" Domain to Combat Digital Banking Fraud

The Hacker News

India's central bank, the Reserve Bank of India (RBI), said it's introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud.

Banking 84
article thumbnail

How to use Tor to privately browse the web - it's easier than you think

Zero Day

If you want the highest level of privacy and security online, you should be using Tor.

96
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!