Sat.Nov 30, 2024 - Fri.Dec 06, 2024

article thumbnail

Top 5 Cyber Security Trends for 2025

Tech Republic Security

TechRepublic asked cyber experts to predict the top trends that will impact the security field in 2025.

article thumbnail

Over 600,000 Personal Records Exposed by Data Broker

Tech Republic Security

The exposed database creates opportunities for staging convincing phishing and social engineering attacks, among other issues.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Details about the iOS Inactivity Reboot Feature

Schneier on Security

I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details , discovered through reverse engineering. The feature triggers after seventy-two hours of inactivity, even it is remains connected to Wi-Fi.

article thumbnail

Why Phishers Love New TLDs Like.shop,top and.xyz

Krebs on Security

Phishing attacks increased nearly 40 percent in the year ending August 2024, with much of that growth concentrated at a small number of new generic top-level domains (gTLDs) — such as.shop ,top ,xyz — that attract scammers with rock-bottom prices and no meaningful registration requirements, new research finds. Meanwhile, the nonprofit entity that oversees the domain name industry is moving forward with plans to introduce a slew of new gTLDs.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses

The Hacker News

Cybersecurity researchers have called attention to a novel phishing campaign that leverages corrupted Microsoft Office documents and ZIP archives as a way to bypass email defenses. "The ongoing attack evades #antivirus software, prevents uploads to sandboxes, and bypasses Outlook's spam filters, allowing the malicious emails to reach your inbox," ANY.RUN said in a series of posts on X.

Antivirus 131
article thumbnail

Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks

Security Affairs

SOC analysts, vital to cybersecurity, face burnout due to exhausting workloads, risking their well-being and the effectiveness of organizational defenses. Security Operations Center (SOC) analyst burnout is a very real problem. These are some of the most important cybersecurity professionals out there, and many of them are being worked to exhaustion.

More Trending

article thumbnail

U.S. Offered $10M for Hacker Just Arrested by Russia

Krebs on Security

In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “ Wazawaka ,” a cybercriminal who was deeply involved in the formation and operation of multiple ransomware groups. The U.S. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. Last week, the Russian government reportedly arrested Matveev and charged him with creating malware used to extort companies.

article thumbnail

Employee Data Access Behaviors Putting Australian Employers At Risk

Tech Republic Security

A new report by security vendor CyberArk shows that most Australian employees fail to adhere to safe cybersecurity practices.

Risk 153
article thumbnail

News alert: Sweet Security releases its evolutionary Cloud Native Detection and Response platform

The Last Watchdog

Tel Aviv, Israel, Dec. 3, 2024, CyberNewswire — With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure Sweet Security today announced the release of its unified Cloud Native Detection and Response platform, designed to transform the way organizations protect their cloud environments in real time.

CISO 130
article thumbnail

Black Basta ransomware gang hit BT Group

Security Affairs

BT Group (formerly British Telecom)’s Conferencing division shut down some of its servers following a Black Basta ransomware attack. British multinational telecommunications holding company BT Group (formerly British Telecom) announced it has shut down some of its servers following a Black Basta ransomware attack. “We identified an attempt to compromise our BT Conferencing platform.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CISA Learning Offers Cyber Training for Government Staff, Veterans and More

Lohrman on Security

The Cybersecurity and Infrastructure Security Agency is launching CISA Learning, a new learning management platform to help with cybersecurity training and much more.

article thumbnail

Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?

Tech Republic Security

Datadog's report highlights long-lived credentials as a cloud security Achilles' heel. Discover risks and ways to secure your environment.

Risk 149
article thumbnail

News alert: One Identity wins 2024 Cyber Defense Award: Hot Company – PAM category

The Last Watchdog

Alisa Viejo, Calif., Dec. 5, 2024, CyberNewswire — One Identity proudly announces it has been named a winner in the Hot Company: Privileged Access Management (PAM) category in the 12th annual Cyber Defense Awards by Cyber Defense Magazine (CDM), the industrys leading information security magazine. Logan We are deeply honored to be recognized amongst the winners of the 12th annual Cyber Defense Awards at CyberDefenseCon 2024, said Mark Logan, CEO of One Identity.

InfoSec 130
article thumbnail

Tor Project needs 200 WebTunnel bridges more to bypass Russia’ censorship

Security Affairs

The Tor Project seeks help deploying 200 WebTunnel bridges by year-end to counter government censorship. Recent reports from Russia show increased censorship targeting the Tor network, including blocking bridges, pluggable transports, and circumvention apps. Russian watchdog Roskomnadzor is making some bridges inaccessible, highlighting the urgent need for more WebTunnel bridges.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CVE-2024-42448 (CVSS 9.9): Critical RCE Vulnerability in Veeam VSPC

Penetration Testing

Veeam Software, a prominent provider of backup and disaster recovery solutions, has released urgent security updates to address two critical vulnerabilities in its Service Provider Console (VSPC). One of these... The post CVE-2024-42448 (CVSS 9.9): Critical RCE Vulnerability in Veeam VSPC appeared first on Cybersecurity News.

Backups 135
article thumbnail

UK Cyber Risks Are ‘Widely Underestimated,’ Warns Country’s Security Chief

Tech Republic Security

Richard Horne, the head of the U.K.’s National Cyber Security Centre, says that hostile activity has “increased in frequency, sophistication and intensity.

article thumbnail

News alert: Green Raven study shows cybersecurity to be a black hole in more ways than just budget

The Last Watchdog

Cheltenham, England, Dec. 4, 2024 –A majority of senior cybersecurity professionals at the UK’s largest organisations struggle with feelings of helplessness and professional despair, new research by Green Raven Limited indicates. These negative emotions result from practitioners’ anticipation of eventual, inevitable failure to protect their organisation.

article thumbnail

Hackers stole millions of dollars from Uganda Central Bank

Security Affairs

Financially-motivated threat actors hacked Uganda ‘s central bank system, government officials confirmed this week. Ugandan officials confirmed on Thursday that the national central bank suffered a security breach by financially-motivated threat actors. The police’s Criminal Investigations Department and the Auditor General are investigating the incident.

Banking 141
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Americans urged to use encrypted messaging after large, ongoing cyberattack

Malwarebytes

A years-long infiltration into the systems of eight telecom giants, including AT&T and Verizon, allowed a state sponsored actor to steal vast amounts of data on where, when and who individuals have been communicating with. Speaking to Reuters , a senior US official said the attack telecommunications infrastructure was broad and that the hacking was still ongoing.

article thumbnail

A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

WIRED Threat Level

The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone—and it's already turning up victims.

Spyware 142
article thumbnail

INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

The Hacker News

A global law enforcement operation has led to the arrest of more than 5,500 suspects involved in financial crimes and the seizure of more than $400 million in virtual assets and government-backed currencies.

article thumbnail

15 SpyLoan Android apps found on Google Play had over 8 million installs

Security Affairs

McAfee researchers discovered 15 SpyLoan Android apps on Google Play with a combined total of over 8 million installs. 15 SpyLoan apps with a combined total of 8M+ installs were found on Google Play, targeting users in South America, Southeast Asia, and Africa. SpyLoan apps exploit social engineering to gain sensitive user data and excessive permissions, leading to extortion, harassment, and financial loss.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CISA, FBI Issue Guidance for Securing Communications Infrastructure

Tech Republic Security

The caution comes after Chinese-state-affiliated breaches of American telecommunication networks. Organizations with Cisco infrastructure should take particular note.

article thumbnail

Microsoft ramps up pressure on users running Windows 11 on unsupported PCs

Zero Day

The company is threatening to add a watermark to the desktop of any unsupported PC running Windows 11.

136
136
article thumbnail

Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library

The Hacker News

Cybersecurity researchers are alerting to a software supply chain attack targeting the popular @solana/web3.js npm library that involved pushing two malicious versions capable of harvesting users' private keys with an aim to drain their cryptocurrency wallets. The attack has been detected in versions 1.95.6 and 1.95.7.

article thumbnail

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

Security Affairs

International law enforcement operation Operation HAECHI-V led to more than 5,500 suspects arrested and seized over $400 million. A global operation code-named Operation HAECHI V, involving 40 countries, resulted in 5,500+ arrests and seized $400M in assets. Operation HAECHI V (July-Nov 2024) targeted cyber frauds like phishing, romance scams, sextortion, investment fraud, online gambling, BEC, and e-commerce fraud.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

A New Approach to Network Troubleshooting in the Multicloud World

Cisco Security

The Cisco and AWS integration is a radically new approach to ensuring the availability of modern apps today's multicloud, hybrid environments.

131
131
article thumbnail

How laws strain to keep pace with AI advances and data theft

Zero Day

Key questions remain unresolved concerning the use of Gen AI tools, while one country may need stronger deterrence against data theft.

130
130
article thumbnail

National Public Data Shuts Down Months After Massive Breach

Security Boulevard

National Public Data, the data broker whose systems were breached and 2.9 billion files holding sensitive data from 170 million this year, has shut down following the attack and after a judge dismissed parent company Jerico Pictures' bankruptcy filing. The post National Public Data Shuts Down Months After Massive Breach appeared first on Security Boulevard.

article thumbnail

Energy industry contractor ENGlobal Corporation discloses a ransomware attack

Security Affairs

ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware attack disrupted the operations of a major energy industry contractor, ENGlobal Corporation. Founded in 1985, ENGlobal Corporation designs automated control systems for commercial and government sectors, reporting $6 million in Q3 revenue and $18.4 million year-to-date.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!