Fri.Nov 15, 2024

article thumbnail

Good Essay on the History of Bad Password Policies

Schneier on Security

Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but that had not been studied scientifically. Their work was a big step forward, if not for two mistakes that would impede future progress in improving passwords for decades.

Passwords 255
article thumbnail

ANZ CIO Challenges: AI, Cybersecurity & Data Analytics for 2025

Tech Republic Security

ANZ government CIOs face budget constraints while prioritizing AI, cybersecurity, and data analytics for productivity gains and digital transformation in 2025.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Retrofitting Spatial Safety to hundreds of millions of lines of C++

Google Security

Posted by Alex Rebert and Max Shavrick, Security Foundations, and Kinuko Yasada, Core Developer Attackers regularly exploit spatial memory safety vulnerabilities , which occur when code accesses a memory allocation outside of its intended bounds, to compromise systems and sensitive data. These vulnerabilities represent a major security risk to users.

Risk 136
article thumbnail

Zero-Day Exploits Surge in 2023, Cisco, Fortinet Vulnerabilities Targeted

Security Boulevard

A report from the Five Eyes cybersecurity alliance, released by the CISA, highlights the majority of the most exploited vulnerabilities last year were initially zero-day flaws, a significant increase compared to 2022 when less than half of the top vulnerabilities were zero-day exploits. The post Zero-Day Exploits Surge in 2023, Cisco, Fortinet Vulnerabilities Targeted appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-49369 (CVSS 9.8): Critical Flaw in Icinga 2 Allows for Impersonation and RCE

Penetration Testing

Icinga releases urgent security updates to address a critical TLS certificate validation bypass vulnerability affecting all versions since 2.4.0. A critical vulnerability (CVE-2024-49369) has been discovered in Icinga 2, a... The post CVE-2024-49369 (CVSS 9.8): Critical Flaw in Icinga 2 Allows for Impersonation and RCE appeared first on Cybersecurity News.

article thumbnail

Researchers Warn of Privilege Escalation Risks in Google's Vertex AI ML Platform

The Hacker News

Cybersecurity researchers have disclosed two security flaws in Google's Vertex machine learning (ML) platform that, if successfully exploited, could allow malicious actors to escalate privileges and exfiltrate models from the cloud.

Risk 106

More Trending

article thumbnail

Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia

The Hacker News

A Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer.

VPN 106
article thumbnail

U.S. Confirms Chinese Hackers Compromised Telecommunications Networks

SecureWorld News

In a joint statement from the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA), United States officials have disclosed the details of a broad cyber espionage campaign by Chinese state-sponsored actors targeting U.S. telecommunications infrastructure. The China-backed hackers, identified as the Salt Typhoon group, have reportedly accessed customer call data, law enforcement records, and private communications of U.S. officials and politically a

article thumbnail

Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations

The Hacker News

Cybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands.

Malware 103
article thumbnail

U.S. CISA adds Palo Alto Networks Expedition bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Palo Alto Networks Expedition bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following Palo Alto Networks Expedition vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-9463 Palo Alto Networks Expedition OS Command Injection Vulnerability CVE-2024-9465 Palo Alto Networks Expedition SQL Injection Vulnerability Last week, P

Firewall 109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials

The Hacker News

A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet's FortiClient for Windows to extract VPN credentials as part of a modular framework called DEEPDATA.

VPN 105
article thumbnail

Why this $60 Android Auto wireless adapter is my favorite tech accessory this year

Zero Day

It won't charm you with a ground-breaking industrial design or an edgy name, but the AAWireless Two is as reliable and functional as these adapters get.

article thumbnail

How AI Is Transforming IAM and Identity Security

The Hacker News

In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management (IAM), reshaping how cybersecurity is approached in this crucial field. Leveraging AI in IAM is about tapping into its analytical capabilities to monitor access patterns and identify anomalies that could signal a potential security breach.

article thumbnail

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

Security Affairs

The Glove Stealer malware exploits a new technique to bypass Chrome’s App-Bound encryption and steal browser cookies. Glove Stealer is a.NET-based information stealer that targets browser extensions and locally installed software to steal sensitive data. The malware could harvest a huge trove of data from infected systems, including cookies, autofill, cryptocurrency wallets, 2FA authenticators, password managers, and email client information.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices

The Hacker News

In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting security, customer confidence, and business continuity. Are you prepared to act swiftly when the unexpected happens?

88
article thumbnail

Buy Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle

Zero Day

This lifetime license bundle deal gives you access to the entire Microsoft Office Pro 2021 suite and Windows 11 Pro for just $53 for a limited time.

98
article thumbnail

CVE-2024-11120 (CVSS 9.8): OS Command Injection Flaw in GeoVision Devices Actively Exploited, No Patch

Penetration Testing

The Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) has issued a warning about an actively exploited critical vulnerability in certain end-of-life (EOL) GeoVision devices. Tracked as CVE-2024-11120 with... The post CVE-2024-11120 (CVSS 9.8): OS Command Injection Flaw in GeoVision Devices Actively Exploited, No Patch appeared first on Cybersecurity News.

article thumbnail

This budget Vizio soundbar sounds just as good as higher-end picks from Philips and Hisense

Zero Day

Upgrade your sound for less with the Vizio 5.1 Soundbar SE, which has some of the best surround sound I've heard from a soundbar.

105
105
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

[Free & Downloadable] Cloud Security Policy Template

Heimadal Security

A well-structured Cloud Security Policy is no longer a luxury—it’s a necessity. To help you stay ahead, we’re offering a free, downloadable Cloud Security Policy Template designed to simplify your cloud security journey. In this article, we’ll explore why a cloud security policy is essential and how this template can help protect your organization from […] The post [Free & Downloadable] Cloud Security Policy Template appeared first on Heimdal Security Blog.

79
article thumbnail

Temu vs. Amazon: Which shopping site is best for your buying needs?

Zero Day

Our buying guide helps you decide what products -- and when -- you should purchase from Amazon or Temu

116
116
article thumbnail

Bitfinex hacker Ilya Lichtenstein was sentenced to 5 years in prison

Security Affairs

Bitfinex hacker, Ilya Lichtenstein , who stole 1 billion worth of Bitcoins from Bitfinex in 2016, has been sentenced to five years in prison. “Ilya Lichtenstein was sentenced today to five years in prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange.” reads the press release published by DoJ.

article thumbnail

I changed these 6 Samsung TV settings to drastically improve its display performance

Zero Day

Most people never change their TV's default settings. But if you have a Samsung, try these modifications, and you'll be glad you did.

100
100
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

The SEC Cybersecurity Rule: Awareness Rises, Compliance Lags

Security Boulevard

Explore how the SEC Cybersecurity Rule has raised boardroom awareness, but why achieving true resilience and transparency remains a critical challenge. The post The SEC Cybersecurity Rule: Awareness Rises, Compliance Lags appeared first on Security Boulevard.

article thumbnail

This budget soundbar sounds just as good as higher-end picks from Bose and Hisense

Zero Day

Upgrade your sound for less with the Vizio 5.1 Soundbar SE, which has some of the best surround sound I've heard from a soundbar.

98
article thumbnail

Ten Lessons Learned from The Mother of All Breaches Data Leak

Security Boulevard

What a year after the Mother of All Breaches data leak has taught us on cybersecurity, data protection, and more. It’s almost been a year since the “Mother of All Breaches” (MOAB), widely known as one of the largest and most impactful data breaches in cybersecurity history, exposed massive volumes of sensitive data. We’ve put. The post Ten Lessons Learned from The Mother of All Breaches Data Leak appeared first on TrueFort.

article thumbnail

ChatGPT's Windows app is now available to free-tier users - here's what it can do

Zero Day

Previously accessible only to ChatGPT subscribers, now free-tier users can chat with the AI directly from Windows 10 or 11 and so, much more.

96
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 11/15/24

Security Boulevard

Insight #1: Two tricks to stop mystery breaches The majority of security leaders reportedly don’t know what caused data security incidents at their organizations over the past 12 months. To reduce the likelihood of unknown security breaches, prioritize regular staff training and tabletop exercises. This empowers employees to identify and escalate potential risks, bolstering your overall security posture and resilience against cyberattacks.

CISO 64
article thumbnail

Save $100 on the 8TB Samsung T5 SSD at Best Buy ahead of Black Friday

Zero Day

The Samsung T5 Evo 8TB portable SSD is $105 off at Best Buy, saving you money on all the storage space you'll need for games, documents, photos, and videos. But you'll have to hurry, the T5 is a popular SSD and with a price this good stock may not last.

109
109
article thumbnail

Bitfinex Hacker Sentenced to 5 Years for Massive Bitcoin Heist and Laundering Scheme

Penetration Testing

Ilya Lichtenstein, the mastermind behind the infamous 2016 Bitfinex hack, has been sentenced to five years in prison for his role in the theft of nearly 120,000 Bitcoin, valued at... The post Bitfinex Hacker Sentenced to 5 Years for Massive Bitcoin Heist and Laundering Scheme appeared first on Cybersecurity News.

Hacking 65
article thumbnail

I finally found a wireless Android Auto adapter that's reliable, functional, and affordable

Zero Day

It won't charm you with a ground-breaking industrial design or an edgy name, but the AAWireless Two is as good as these adapters get.

article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.