Tue.Nov 05, 2024

article thumbnail

AIs Discovering Vulnerabilities

Schneier on Security

I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning, AIs finding zero-days in the wild, and everything in between. The AIs aren’t very good at it yet, but they’re getting better. Here’s some anecdotal data from this summer: Since July 2024, ZeroPath is taking a novel approach combining deep program analysis with adversarial AI agents for valid

Software 277
article thumbnail

VMware Explore Barcelona 2024: Tanzu Platform 10 Enters General Availability

Tech Republic Security

About a year after Broadcom’s acquisition of VMware, the company released VMware Tanzu Data Services to make connections to some third-party data engines easier.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Warning: Hackers could take over your email account by stealing cookies, even if you have MFA

Malwarebytes

The Federal Bureau of Investigation (FBI) has issued a warning that cybercriminals are taking over email accounts via stolen session cookies, allowing them to bypass the multi-factor authentication (MFA) a user has set up. Here’s how it works. Most of us don’t think twice about checking the “Remember me” box when we log in. When you log in and the server has verified your authentication—straight away or after using MFA–the server creates a session and generates a unique session ID.

article thumbnail

How to Become a Chief Information Officer: CIO Cheat Sheet

Tech Republic Security

If you want to pursue a path toward becoming a CIO, here's your guide to salaries, job markets, skills and common interview questions.

Marketing 166
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities.

article thumbnail

How Cybersecurity Training Must Adapt to a New Era of Threats

Security Boulevard

We have entered a new era of cyberthreats, and employees must be equipped to defend the company from more cunning and effective attacks than ever. The post How Cybersecurity Training Must Adapt to a New Era of Threats appeared first on Security Boulevard.

More Trending

article thumbnail

FBI Warning: “Remember Me” Cookies Put Your Email at Risk

Penetration Testing

The Federal Bureau of Investigation (FBI) Atlanta Division has issued an urgent warning to the public about a surge in cybercriminals exploiting “Remember-Me” cookies to gain unauthorized access to email... The post FBI Warning: “Remember Me” Cookies Put Your Email at Risk appeared first on Cybersecurity News.

Risk 135
article thumbnail

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

The Hacker News

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions.

Banking 114
article thumbnail

PoC Exploit Releases for Critical Symlink Flaw in Apple’s iOS – CVE-2024-44258

Penetration Testing

In a recent analysis, cybersecurity researchers Hichem Maloufi and Christian Mina detailed CVE-2024-44258, a symlink vulnerability affecting Apple’s ManagedConfiguration framework and the profiled daemon. This vulnerability allows attackers to manipulate... The post PoC Exploit Releases for Critical Symlink Flaw in Apple’s iOS – CVE-2024-44258 appeared first on Cybersecurity News.

article thumbnail

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

The Hacker News

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Canadian Man Accused of Snowflake Data Breach Arrested

Security Boulevard

A Canadian resident, Alexander “Connor” Moucka, was arrested by Canadian law enforcement at the request of the United States for allegedly stealing sensitive data of myriad corporations like AT&T and Santander Bank that were stored in Snowflake's cloud systems and exposed during a breach. The post Canadian Man Accused of Snowflake Data Breach Arrested appeared first on Security Boulevard.

article thumbnail

Flaw in Right-Wing ‘Election Integrity’ App Exposes Voter-Suppression Plan and User Data

WIRED Threat Level

A bug that WIRED discovered in True the Vote’s VoteAlert app revealed user information—and an election worker who wrote about carrying out an illegal voter-suppression scheme.

124
124
article thumbnail

U.S. CISA adds PTZOptics camera bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds PTZOptics PT30X-SDI/NDI camera bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-8957 PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability CVE-2024-8956 PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability Threat actors are attempting

Firmware 122
article thumbnail

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

The Hacker News

Google's cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

ToxicPanda Android banking trojan targets Europe and LATAM, with a focus on Italy

Security Affairs

The ToxicPanda Android malware has infected over 1,500 devices, enabling attackers to perform fraudulent banking transactions. Cleafy researchers spotted a new Android banking malware, dubbed ToxicPanda, which already infected over 1,500 Android devices. The ToxicPanda malware shares some bot command similarities with the TgToxic trojan family was observed spreading in Southeast Asia.

Banking 121
article thumbnail

Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response

Security Boulevard

As security teams level up to support the cloud-native transition, three major issues keep impeding detection and response in the cloud. The post Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response appeared first on Security Boulevard.

article thumbnail

Android flaw CVE-2024-43093 may be under limited, targeted exploitation

Security Affairs

Google warned that a vulnerability, tracked as CVE-2024-43093, in the Android OS is actively exploited in the wild. Threat actors are actively exploiting a vulnerability, tracked as CVE-2024-43093, in the Android OS, Google warns. The vulnerability is a privilege escalation issue in the Android Framework component. Successful exploitation of the vulnerability could lead to unauthorized access to “Android/data,” “Android/obb,” and “Android/sandbox” directories

Hacking 112
article thumbnail

Beyond VPNs and Botnets: Understanding the Danger of ORB Networks

Penetration Testing

The S2 Research Team at Team Cymru has recently shed light on an escalating threat in the cybersecurity landscape: Operational Relay Box (ORB) networks. Defined as a hybrid between a... The post Beyond VPNs and Botnets: Understanding the Danger of ORB Networks appeared first on Cybersecurity News.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

The Apple Pencil Pro has dropped down to $92 on Amazon ahead of Black Friday

Zero Day

After purchasing the latest iPad Pro, the Apple Pencil Pro may seem like an expensive add-on. Ahead of Black Friday, the stylus has been discounted by $37, bringing it down to $92.

105
105
article thumbnail

Stealthy Process Injection: New Kernel Callback Table Technique Exposed

Penetration Testing

A recent blog by security researcher Hossam Ehab has detailed an advanced technique for process injection through manipulation of the Kernel Callback Table within the Process Environment Block (PEB) on... The post Stealthy Process Injection: New Kernel Callback Table Technique Exposed appeared first on Cybersecurity News.

article thumbnail

Leveraging Wazuh for Zero Trust security

The Hacker News

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeter-based security, users within an environment are not automatically trusted upon gaining access.

90
article thumbnail

Microsoft's Copilot AI is coming to your Office apps - whether you like it or not

Zero Day

Microsoft 365 subscribers in Australia, New Zealand, and some Asian markets are about to get an AI upgrade and a price increase. How long until customers in the US and Europe see the same?

Marketing 106
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Russia Is Going All Out on Election Day Interference

WIRED Threat Level

Along with other foreign influence operations—including from Iran—Kremlin-backed campaigns to stoke division and fear have gone into overdrive.

Hacking 108
article thumbnail

Your dream programming job demands this language, every site agrees

Zero Day

Want a programming job? Learning any language is good but only one is essential in 2024.

134
134
article thumbnail

The AI Fix #23: Murder most weird, and why 9.11 is bigger than 9.9

Graham Cluley

In episode 23 of The AI Fix, an AI finds a new way to make life difficult for women in STEM, Graham reveals his brilliant idea for treating any medical emergency, a beloved chat show host returns from the grave, and our hosts learn that computer viruses were almost called computer weeds. Graham tells Mark a story involving a murder, a moth, and an AI journalist, and Mark pits his co-host against the world's most advanced computer program in a maths Olympiad.

90
article thumbnail

Warning: LastPass Alerts Users to Phishing Scam Using Fake Support Reviews on Chrome Web Store

Penetration Testing

LastPass, a leading password management platform, has issued a critical warning to users about a social engineering campaign targeting its customer base through deceptive reviews on its Chrome Web Store... The post Warning: LastPass Alerts Users to Phishing Scam Using Fake Support Reviews on Chrome Web Store appeared first on Cybersecurity News.

Scams 87
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

The smartwatch with the best battery life I've tested is also one of the cheapest

Zero Day

The Xiaomi Smart Band 9 brings a new level of accessibility to fitness tracking with a well-designed app and a large selection of features for less than $60.

94
article thumbnail

Columbus Faces Fallout from Ransomware, Lawsuit Against Whistleblower

SecureWorld News

In July 2024, the city of Columbus, Ohio, faced a ransomware attack that threatened to disrupt city services and exposed sensitive data of approximately 500,000 residents. What followed has since spiraled into a complex mix of cybersecurity concerns, public scrutiny, and legal controversy, drawing nationwide attention to how cities handle data breaches and respond to public disclosure by cybersecurity researchers.

article thumbnail

Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP

Security Boulevard

Fortinet has added a data loss prevention (DLP) platform to its portfolio that is based on the technology it gained with the acquisition of Next DLP earlier this year. The post Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP appeared first on Security Boulevard.

article thumbnail

New Keylogger Targeting U.S. Organizations Linked to North Korean APT Group Andariel

Penetration Testing

A recent analysis from Hybrid Analysis, led by security researcher Vlad Pasca, reveals a newly identified keylogger malware attributed to the North Korean APT group Andariel. Known for their targeted... The post New Keylogger Targeting U.S. Organizations Linked to North Korean APT Group Andariel appeared first on Cybersecurity News.

Malware 85
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.