Thu.Apr 24, 2025

article thumbnail

New Linux Rootkit

Schneier on Security

Interesting : The company has released a working rootkit called “Curing” that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market. At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors.

Marketing 293
article thumbnail

Zoom attack tricks victims into allowing remote access to install malware and steal money

Malwarebytes

Be careful when talking to people you’ve not met with before over the Zoom video conferencing system; you might get more than you bargained for. Two CEOs were recently targeted by a Zoom-based attack. One spotted it in time – and sadly, one did not. The attack is by a crime group that the Security Alliance call ELUSIVE COMET in a warning about the threat last month.

Malware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: X9 PKI emerges to help financial sector interoperate, get ready for ‘Q-Day’

The Last Watchdog

As RSAC 2025 convenes next week in San Francisco, digital trust is poised to take center stage. Related: PKI and the IoT cloud One quiet but consequential development now taking root in the financial sector could prove pivotal: the emergence of a dedicated Public Key Infrastructure (PKI) framework, tailored to banks and payment networks, guided by the Accredited Standards Committee X9 (ASC X9), and being rolled out by DigiCert.

Banking 147
article thumbnail

4.7 million customers’ data accidentally leaked to Google by Blue Shield of California

Malwarebytes

Blue Shield of California leaked the personal data of 4.7 million people to Google after a Google Analytics misconfiguration. The tech giant may have used this data for targeted advertising, according to Blue Shield, which is one of the largest health insurers in the US. In a data breach notice on its website, Blue Shield says it had begun notifying certain members of a potential data breach that may have included elements of their protected health information.

Insurance 117
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

RSAC Fireside Chat: The NDR evolution story—from open source start to kill chain clarity

The Last Watchdog

As enterprises brace for a new wave of stealthy intrusions so-called Typhoon attacks security leaders are doubling down on network intelligence that goes beyond surface-level alerts. Related: What is NDR? In this RSAC 2025 Fireside Chat, I sat down with Corelight CEO Brian Dye to unpack how Network Detection and Response (NDR) is helping defenders cut through the noise and get to ground truth.

Banking 130
article thumbnail

CVE Futures

Adam Shostack

Whats next for the CVE program? Since last weeks CVE budget kerfuffle , Ive been drawn into many conversations about what comes next? And while I want to say that I dont know and I havent been involved in too long, it turns out I have a perspective that I keep sharing. To summarize: Decide what problem youre solving. Since I wrote my post, CISA has made a strong statement : To set the record straight, there was no funding issue, but rather a contract administration issue that was resolved prior

Retail 100

LifeWorks

More Trending

article thumbnail

CVE-2024-2787: Apple Archive Flaw Enables Arbitrary File Write and Gatekeeper Bypass, PoC Releases

Penetration Testing

A newly disclosed vulnerability in Apples proprietary libAppleArchive library, tracked as CVE-2024-27876, enables attackers to achieve arbitrary file The post CVE-2024-2787: Apple Archive Flaw Enables Arbitrary File Write and Gatekeeper Bypass, PoC Releases appeared first on Daily CyberSecurity.

article thumbnail

WhatsApp introduces Advanced Chat Privacy to protect sensitive communications

Security Affairs

WhatsApp adds Advanced Chat Privacy feature that allows users to block others from sharing chat content outside the app. WhatsApp announced the availability of a new feature called “Advanced Chat Privacy” for both individual and group chats that enhances content protection. The feature blocks chat exports, auto-media downloads, and the use of messages in AI features, ensuring conversations stay private and within the app. “Today were introducing our latest layer for privacy cal

Media 92
article thumbnail

Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact 

Security Boulevard

Adversary-in-the-middle fraud (AiTM) represents a significant, ongoing challenge for businesses, with tactics like email hijacking, AI attacks and account takeovers becoming increasingly complex. The post Adversary-in-the-Middle Attacks Persist Strategies to Lessen the Impact appeared first on Security Boulevard.

article thumbnail

Introducing Duo Wear: Seamless MFA From Your Wrist!

Duo's Security Blog

Were thrilled to announce Duo Wear , a companion app for Duo Mobile that brings fast and easy multi-factor authentication (MFA) to your Wear OS smartwatch! What is Duo Wear? Duo Wear is an app designed specifically for Wear OS smartwatches. It works together with the Duo Mobile app on your Android phone. With Duo Wear, you can: Generate One-Time Passcodes (OTPs) Type passcodes in your login prompt without ever opening your phone.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Yale New Haven Health (YNHHS) data breach impacted 5.5 million patients

Security Affairs

Yale New Haven Health (YNHHS) announced that threat actors stole the personal data of 5.5 million patients in a cyberattack. Yale New Haven Health (YNHHS) disclosed a data breach that exposed personal information of 5.5 million patients following a cyberattack that occurred earlier this month. Yale New Haven Health System (YNHHS) is a nonprofit healthcare network headquartered in New Haven, Connecticut.

article thumbnail

HYCU Tackles SaaS Data Protection With New R-Shield Solution

Security Boulevard

HYCU introduces R-Shield to provide comprehensive cyber resilience across SaaS, cloud, and on-premises environments as organizations face growing supply chain attacks. The post HYCU Tackles SaaS Data Protection With New R-Shield Solution appeared first on Security Boulevard.

article thumbnail

ToyMaker’s Playbook: Cisco Talos Exposes IAB Tactics Leading to Cactus Ransomware

Penetration Testing

Cisco Talos 2023 incident response report unveils the operations of ToyMaker, a financially motivated Initial Access Broker (IAB) The post ToyMaker’s Playbook: Cisco Talos Exposes IAB Tactics Leading to Cactus Ransomware appeared first on Daily CyberSecurity.

article thumbnail

The Human Advantage in the Age of Technological Uncertainties

Security Boulevard

Our excessive reliance on technology has disabled us from crossing the barriers to experience, sense, and relate with others the way we used to. The post The Human Advantage in the Age of Technological Uncertainties appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Black Hat Asia 2025: Innovation in the SOC

Cisco Security

Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.

Mobile 60
article thumbnail

ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux

Security Boulevard

Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a "massive security loophole" in the operating system's runtime security. The post ARMO: io_uring Interface Creates Security Blind Spot in Linux appeared first on Security Boulevard.

Mobile 66
article thumbnail

When Security Becomes the Risk

Centraleyes

Key Takeaways from Mandiants M-Trends 2025 Theres a certain irony thats hard to ignore in Mandiants latest M-Trends report : The devices built to protect networksVPNs, firewalls, routerswere at the heart of one-third of all cyberattacks last year. These edge devices, essential for defense, have become prime targets. Why? Their design often limits advanced security monitoring, making them attractive entry points for attackers.

Risk 52
article thumbnail

Despite Recent Security Hardening, Entra ID Synchronization Feature Remains Open for Abuse

Security Boulevard

Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchronization options can be exploited. Synchronizing identity accounts between Microsoft Active Directory (AD) and Entra ID is important for user experience, as it seamlessly synchronizes user identities, credentials and groups between on-premises and cloud-based systems.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

How much energy does a single chatbot prompt use? This AI tool can show you

Zero Day

That question you just asked ChatGPT might've used as much energy as an LED bulb running for 45 minutes.

131
131
article thumbnail

Harness Adds Traceable WAAP to Secure Web Apps and APIs

Security Boulevard

Harness today unfurled a cloud web application and application programming interface (API) protection (WAAP) platform that makes it simpler for security operation (SecOps) teams to defend application environments. The post Harness Adds Traceable WAAP to Secure Web Apps and APIs appeared first on Security Boulevard.

article thumbnail

Fortra’s Offensive & Defensive Approach to Channel Security

eSecurity Planet

Security vendor Fortra is joining a crowded market with a simple value proposition: there are too many options on the market, but very few that provide the end-to-end, holistic approach Fortra has built. Channel Insider spoke with Fortras VP of Global Channels and Alliances, Faraz Siraj, and Chief Strategy Officer, John Grancarich, to learn more about the companys approach to security, goals for 2025, and how channel partners can work with Fortra.

article thumbnail

Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors

Trend Micro

An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

The Hacker News

A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0.

126
126
article thumbnail

Shift Left Security: Integrating Pentesting Early in Development

NetSpi Executives

TL;DR In application security, shift left is a guiding principle for how organizations should implement security practices into the development process. Todays application security testing tools and technologies are built to facilitate this security-centric approach, but the term has taken on a new meaning compared to when it first entered the scene years ago.

article thumbnail

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

The Hacker News

At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea's software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today.

article thumbnail

8 simple ways Mac users can better protect their privacy

Zero Day

Just because you're running Apple's rock-solid operating system doesn't mean your privacy is automatically protected. These simple steps will keep you safer.

122
122
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

The Hacker News

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said.

article thumbnail

I replaced my smartwatch with a $50 fitness band, and the battery life was night and day

Zero Day

The Xiaomi Smart Band 9 is an accessible fitness tracker with an intuitive app and several useful features.

118
118
article thumbnail

Verizon 2025 DBIR: Third-party software risk takes the spotlight

Security Boulevard

Its that time of year again: Verizon Business has released the 2025 edition of the Data Breach Investigations Report (DBIR) , its 18th-annual report on cybercrime. The DBIR is famous for how well it captures the current state of things, analyzing tens of thousands of security incidents to understand the current threat landscape. The post Verizon 2025 DBIR: Third-party software risk takes the spotlight appeared first on Security Boulevard.

article thumbnail

5 Best Cyber Resilience Solutions of 2025

Centraleyes

There’s a growing recognition that resilience rather than just certifications or complianceis the true measure of cyber maturity. Cyberattacks, system failures, and data breaches arent IF scenariostheyre WHEN scenarios. Thats why the ability to quickly recover and adapt after an attack is what truly matters. Organizations must adopt solutions that integrate continuous risk management , real-time threat intelligence, and dynamic response capabilitiesensuring that their systems are resilient

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!