Tue.Nov 05, 2024

article thumbnail

AIs Discovering Vulnerabilities

Schneier on Security

I’ve been writing about the possibility of AIs automatically discovering code vulnerabilities since at least 2018. This is an ongoing area of research: AIs doing source code scanning, AIs finding zero-days in the wild, and everything in between. The AIs aren’t very good at it yet, but they’re getting better. Here’s some anecdotal data from this summer: Since July 2024, ZeroPath is taking a novel approach combining deep program analysis with adversarial AI agents for valid

Software 278
article thumbnail

Canadian Man Arrested in Snowflake Data Extortions

Krebs on Security

A 26-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data service Snowflake. Image: [link] On October 30, Canadian authorities arrested Alexander Moucka, a.k.a. Connor Riley Moucka of Kitchener, Ontario, on a provisional arrest warrant from the United States.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Become a Chief Information Officer: CIO Cheat Sheet

Tech Republic Security

If you want to pursue a path toward becoming a CIO, here's your guide to salaries, job markets, skills and common interview questions.

Marketing 165
article thumbnail

PoC Exploit Releases for Critical Symlink Flaw in Apple’s iOS – CVE-2024-44258

Penetration Testing

In a recent analysis, cybersecurity researchers Hichem Maloufi and Christian Mina detailed CVE-2024-44258, a symlink vulnerability affecting Apple’s ManagedConfiguration framework and the profiled daemon. This vulnerability allows attackers to manipulate... The post PoC Exploit Releases for Critical Symlink Flaw in Apple’s iOS – CVE-2024-44258 appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Warning: Hackers could take over your email account by stealing cookies, even if you have MFA

Malwarebytes

The Federal Bureau of Investigation (FBI) has issued a warning that cybercriminals are taking over email accounts via stolen session cookies, allowing them to bypass the multi-factor authentication (MFA) a user has set up. Here’s how it works. Most of us don’t think twice about checking the “Remember me” box when we log in. When you log in and the server has verified your authentication—straight away or after using MFA–the server creates a session and generates a unique session ID.

article thumbnail

VMware Explore Barcelona 2024: Tanzu Platform 10 Enters General Availability

Tech Republic Security

About a year after Broadcom’s acquisition of VMware, the company released VMware Tanzu Data Services to make connections to some third-party data engines easier.

More Trending

article thumbnail

FBI Warning: “Remember Me” Cookies Put Your Email at Risk

Penetration Testing

The Federal Bureau of Investigation (FBI) Atlanta Division has issued an urgent warning to the public about a surge in cybercriminals exploiting “Remember-Me” cookies to gain unauthorized access to email... The post FBI Warning: “Remember Me” Cookies Put Your Email at Risk appeared first on Cybersecurity News.

Risk 124
article thumbnail

Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices

The Hacker News

Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos that could lead to remote code execution. Tracked as CVE-2024-10443 and dubbed RISK:STATION by Midnight Blue, the zero-day flaw was demonstrated at the Pwn2Own Ireland 2024 hacking contest by security researcher Rick de Jager.

Hacking 119
article thumbnail

How Cybersecurity Training Must Adapt to a New Era of Threats

Security Boulevard

We have entered a new era of cyberthreats, and employees must be equipped to defend the company from more cunning and effective attacks than ever. The post How Cybersecurity Training Must Adapt to a New Era of Threats appeared first on Security Boulevard.

article thumbnail

FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the public in connection with an investigation involving the breach of edge devices and computer networks belonging to companies and government entities.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Canadian Man Accused of Snowflake Data Breach Arrested

Security Boulevard

A Canadian resident, Alexander “Connor” Moucka, was arrested by Canadian law enforcement at the request of the United States for allegedly stealing sensitive data of myriad corporations like AT&T and Santander Bank that were stored in Snowflake's cloud systems and exposed during a breach. The post Canadian Man Accused of Snowflake Data Breach Arrested appeared first on Security Boulevard.

article thumbnail

New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

The Hacker News

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions.

Banking 111
article thumbnail

Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response

Security Boulevard

As security teams level up to support the cloud-native transition, three major issues keep impeding detection and response in the cloud. The post Three ‘Must Solve” Challenges Hindering Cloud-Native Detection and Response appeared first on Security Boulevard.

article thumbnail

Beyond VPNs and Botnets: Understanding the Danger of ORB Networks

Penetration Testing

The S2 Research Team at Team Cymru has recently shed light on an escalating threat in the cybersecurity landscape: Operational Relay Box (ORB) networks. Defined as a hybrid between a... The post Beyond VPNs and Botnets: Understanding the Danger of ORB Networks appeared first on Cybersecurity News.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

The Hacker News

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent.

article thumbnail

The Apple Pencil Pro has dropped down to $92 on Amazon ahead of Black Friday

Zero Day

After purchasing the latest iPad Pro, the Apple Pencil Pro may seem like an expensive add-on. Ahead of Black Friday, the stylus has been discounted by $37, bringing it down to $92.

96
article thumbnail

Stealthy Process Injection: New Kernel Callback Table Technique Exposed

Penetration Testing

A recent blog by security researcher Hossam Ehab has detailed an advanced technique for process injection through manipulation of the Kernel Callback Table within the Process Environment Block (PEB) on... The post Stealthy Process Injection: New Kernel Callback Table Technique Exposed appeared first on Cybersecurity News.

article thumbnail

ToxicPanda Android banking trojan targets Europe and LATAM, with a focus on Italy

Security Affairs

The ToxicPanda Android malware has infected over 1,500 devices, enabling attackers to perform fraudulent banking transactions. Cleafy researchers spotted a new Android banking malware, dubbed ToxicPanda, which already infected over 1,500 Android devices. The ToxicPanda malware shares some bot command similarities with the TgToxic trojan family was observed spreading in Southeast Asia.

Banking 92
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Your dream programming job demands this language, every site agrees

Zero Day

Want a programming job? Learning any language is good but only one is essential in 2024.

131
131
article thumbnail

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

The Hacker News

Google's cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security.

article thumbnail

Microsoft's Copilot AI is coming to your Office apps - whether you like it or not

Zero Day

Microsoft 365 subscribers in Australia, New Zealand, and some Asian markets are about to get an AI upgrade and a price increase. How long until customers in the US and Europe see the same?

article thumbnail

U.S. CISA adds PTZOptics camera bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds PTZOptics PT30X-SDI/NDI camera bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-8957 PTZOptics PT30X-SDI/NDI Cameras OS Command Injection Vulnerability CVE-2024-8956 PTZOptics PT30X-SDI/NDI Cameras Authentication Bypass Vulnerability Threat actors are attempting

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Russia Is Going All Out on Election Day Interference

WIRED Threat Level

Along with other foreign influence operations—including from Iran—Kremlin-backed campaigns to stoke division and fear have gone into overdrive.

Hacking 97
article thumbnail

Leveraging Wazuh for Zero Trust security

The Hacker News

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeter-based security, users within an environment are not automatically trusted upon gaining access.

84
article thumbnail

Canadian authorities arrested alleged Snowflake hacker

Security Affairs

Canadian authorities arrested a suspect linked to multiple hacks following a breach of cloud data platform Snowflake earlier this year. Canadian law enforcement agencies arrested a suspect, Alexander “Connor” Moucka (aka Judische and Waifu), who is accused of being responsible for a series of attacks relying on information stolen from the cloud data warehousing platform Snowflake earlier this year.

article thumbnail

Warning: LastPass Alerts Users to Phishing Scam Using Fake Support Reviews on Chrome Web Store

Penetration Testing

LastPass, a leading password management platform, has issued a critical warning to users about a social engineering campaign targeting its customer base through deceptive reviews on its Chrome Web Store... The post Warning: LastPass Alerts Users to Phishing Scam Using Fake Support Reviews on Chrome Web Store appeared first on Cybersecurity News.

Scams 87
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The AI Fix #23: Murder most weird, and why 9.11 is bigger than 9.9

Graham Cluley

In episode 23 of The AI Fix, an AI finds a new way to make life difficult for women in STEM, Graham reveals his brilliant idea for treating any medical emergency, a beloved chat show host returns from the grave, and our hosts learn that computer viruses were almost called computer weeds. Graham tells Mark a story involving a murder, a moth, and an AI journalist, and Mark pits his co-host against the world's most advanced computer program in a maths Olympiad.

82
article thumbnail

Columbus Faces Fallout from Ransomware, Lawsuit Against Whistleblower

SecureWorld News

In July 2024, the city of Columbus, Ohio, faced a ransomware attack that threatened to disrupt city services and exposed sensitive data of approximately 500,000 residents. What followed has since spiraled into a complex mix of cybersecurity concerns, public scrutiny, and legal controversy, drawing nationwide attention to how cities handle data breaches and respond to public disclosure by cybersecurity researchers.

article thumbnail

New Keylogger Targeting U.S. Organizations Linked to North Korean APT Group Andariel

Penetration Testing

A recent analysis from Hybrid Analysis, led by security researcher Vlad Pasca, reveals a newly identified keylogger malware attributed to the North Korean APT group Andariel. Known for their targeted... The post New Keylogger Targeting U.S. Organizations Linked to North Korean APT Group Andariel appeared first on Cybersecurity News.

Malware 85
article thumbnail

Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP

Security Boulevard

Fortinet has added a data loss prevention (DLP) platform to its portfolio that is based on the technology it gained with the acquisition of Next DLP earlier this year. The post Fortinet Adds Data Loss Prevention Capability Following Acquistion of Next DLP appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!