Tue.Feb 11, 2025

article thumbnail

Microsoft Patch Tuesday, February 2025 Edition

Krebs on Security

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited. All supported Windows operating systems will receive an update this month for a buffer overflow vulnerability that carries the catchy name CVE-2025-21418. This patch should be a priority for enterprises, as Microsoft says it is being exploited, has low attack complexity, and no requirements for user int

article thumbnail

Apple ordered to grant access to users’ encrypted data

Malwarebytes

Last week, an article in the Washington Post revealed the UK had secretly ordered Apple to provide blanket access to protected cloud backups around the world. Since then, privacy focused groups have uttered their objections. The UK government has demanded to be able to access encrypted data stored by Apple users worldwide in its cloud service. However, Apple itself doesn’t have access to it at the moment, only the holder of the Apple account can access data stored in this way.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Gcore Radar reveals 56% rise in DDoS attacks – gaming industry targeted the most

The Last Watchdog

Luxembourg, Luxembourg, Feb. 11, 2025, CyberNewswire — Gcore , the global edge AI, cloud, network, and security solutions provider, today announced the findings of its Q3-Q4 2024 Radar report into DDoS attack trends. DDoS attacks have reached unprecedented scale and disruption in 2024, and businesses need to act fast to protect themselves from this evolving threat.

DDOS 130
article thumbnail

Phishing evolves beyond email to become latest Android app threat

Malwarebytes

There are plenty of phish in the sea, and the latest ones have little interest in your email inbox. In 2024, Malwarebytes detected more than 22,800 phishing apps on Android, according to the recent 2025 State of Malware report. Of those malicious apps, 5,200 could subvert one of the strongest security practices available today, called multifactor authentication, by prying into basic text messages sent to a device.

Phishing 130
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Adam Khan on the Unique Security Challenges in Education IT

Security Boulevard

Adam Khan, vice president of global security operations for Barracuda Networks, explains what makes securing schools, such as universities, so much more difficult than the average enterprise IT environment. Unlike traditional enterprises, schools operate on limited budgets, often relying on outdated infrastructure while managing vast amounts of sensitive student, financial, and research datamaking them prime.

Education 112
article thumbnail

Apple fixes zero-day vulnerability used in “extremely sophisticated attack”

Malwarebytes

Apple has released an emergency security update for a vulnerability which it says may have been exploited in an “extremely sophisticated attack against specific targeted individuals. The update is available for: iOS 18.3.1 and iPadOS 18.3.1 – iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later iPadOS 17.7.5

Spyware 103

More Trending

article thumbnail

Trusted Encryption Environments

Schneier on Security

Really good—and detailed— survey of Trusted Encryption Environments (TEEs.

article thumbnail

Artificial intelligence (AI) as an Enabler for Enhanced Data Security

Security Affairs

Artificial intelligence enhances data security by identifying risks and protecting sensitive cloud data, helping organizations stay ahead of evolving threats. Artificial intelligence (AI) is transforming industries and redefining how organizations protect their data in todays fast-paced digital world. With over 90% of enterprises storing at least some of their data in the cloud, AIs ability to enhance security across complex, distributed environments is more vital than ever.

article thumbnail

The rising role of cloud-based SIEM in MDR: What MSPs need to know

Webroot

OpenText recently surveyed 255 MSPs to uncover key trends shaping the future of Managed Detection and Response (MDR). The findings reveal not only what cybersecurity professionals are prioritizing but also how MSPs can better meet the evolving demands of their small and midsize business (SMB) customers. One key takeaway from the survey: 81% of respondents rated cloud-based SIEM (security information and event management) as important to include in their MDR solution.

article thumbnail

Operation Phobos Aetor: Police dismantled 8Base ransomware gang

Security Affairs

Authorities dismantled the 8Base ransomware gang, shutting down its dark web data leak and negotiation sites. An international law enforcement operation, codenamed Operation Phobos Aetor, dismantled the 8Base ransomware gang. The police took down the dark web data leak and negotiation sites. The police has yet to disclose the names of the suspects. Authorities replaced the seized websites with a law enforcement banner displaying the message: “This hidden site and the criminal content have

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CVE-2025-24016 (CVSS 9.9): Critical RCE Vulnerability Discovered in Wazuh Server

Penetration Testing

Wazuh, a leading provider of open-source security solutions, has issued a critical security advisory regarding a remote code The post CVE-2025-24016 (CVSS 9.9): Critical RCE Vulnerability Discovered in Wazuh Server appeared first on Cybersecurity News.

article thumbnail

I tried to replace my laptop with the Galaxy S25 Ultra - and it changed how I work

Zero Day

A little-known Samsung feature lets you turn your phone into a desktop by connecting it to a monitor or TV. Just be sure your go-to apps are compatible.

127
127
article thumbnail

CVE-2024-12797 – High-Severity OpenSSL Flaw: Update Now to Prevent MITM Attacks

Penetration Testing

A high-severity vulnerability has been discovered in OpenSSL, a widely-used cryptography library that secures countless websites and online The post CVE-2024-12797 – High-Severity OpenSSL Flaw: Update Now to Prevent MITM Attacks appeared first on Cybersecurity News.

article thumbnail

This $200 Motorola phone I tested is almost too good for the price

Zero Day

The Moto G (2025) packs multi-day battery life and a surprisingly good camera for a budget phone.

116
116
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Current State of the CISO with Nick Kakolowski

Security Boulevard

Nick Kakolowski, senior research director for IANS, dives into a survey done in conjunction with Artico Search on the current state of the CISO. At its core, the study highlights how CISOs are facing an unprecedented expansion of responsibilities, with some thriving under the added scope and others struggling with burnout. Kakolowski explains that CISOs.

CISO 108
article thumbnail

How fake security reports are swamping open-source projects, thanks to AI

Zero Day

Patch spam contains code that is downright wrong and nonfunctional. Even worse: It can introduce new vulnerabilities or backdoors. What's a developer to do?

113
113
article thumbnail

Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

The Hacker News

Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content.

Scams 107
article thumbnail

Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO

Security Boulevard

Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO As cyber threats continue to evolve, Identity and Access Management (IAM) is no longer just about authenticationits about intelligent, adaptive security. AI-driven IAM solutions are reshaping how organizations manage identities, permissions, and security [] The post Enhancing IAM Security with AI Agents: A Strategic Approach by SecureFLO appeared first

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

The Hacker News

Gcores latest DDoS Radar report analyzes attack data from Q3Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry.

DDOS 103
article thumbnail

How AI-driven identify fraud is causing havoc

We Live Security

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent here's how to fight back

article thumbnail

Crawl, then walk, before you run with AI agents, experts recommend

Zero Day

Agentic AI offers compelling productivity benefits, but designers and developers must think small.

101
101
article thumbnail

4 Ways to Keep MFA From Becoming too Much of a Good Thing

The Hacker News

Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, adoption is on the rise across industries. But while its undeniably effective at keeping bad actors out, the implementation of MFA solutions can be a tangled mess of competing designs and ideas.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

My go-to Microsoft Office alternative just got a huge privacy and customization update

Zero Day

If you're looking for more privacy in your documents, the open-source LibreOffice has just what you need.

98
article thumbnail

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

The Hacker News

Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025.

article thumbnail

iOS 18.3.1 patches an 'extremely sophisticated attack' - and more

Zero Day

Here's what you're getting with iOS 18.3.1 - and why you might want to update ASAP.

98
article thumbnail

This Ad-Tech Company Is Powering Surveillance of US Military Personnel

WIRED Threat Level

In a letter to a US senator, a Florida-based data broker says it obtained sensitive data on US military members in Germany from a Lithuanian firm, revealing the global nature of online ad surveillance.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Linux running in a PDF? This hack is as bizarre as it is brilliant

Zero Day

Linux has been proven to run on so many devices, but a high school student who was known for running Doom on a PDF has done something you probably never would have thought possible.

Hacking 93
article thumbnail

CVE-2025-22467 (CVSS 9.9): Ivanti Connect Secure Vulnerability Allows Remote Code Execution

Penetration Testing

Ivanti has disclosed multiple vulnerabilities affecting its Connect Secure, Policy Secure, and Secure Access Client products, with some The post CVE-2025-22467 (CVSS 9.9): Ivanti Connect Secure Vulnerability Allows Remote Code Execution appeared first on Cybersecurity News.

article thumbnail

The billion-dollar AI company no one is talking about - and why you should care

Zero Day

While AI giants burn cash, one company quietly makes billions without the hype.

92
article thumbnail

Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now

The Hacker News

Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution. The list of vulnerabilities is below - CVE-2024-38657 (CVSS score: 9.1) - External control of a file name in Ivanti Connect Secure before version 22.7R2.

89
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!