Sat.Feb 08, 2025 - Fri.Feb 14, 2025

article thumbnail

DOGE as a National Cyberattack

Schneier on Security

In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack or an act of foreign espionage, but through official orders by a billionaire with a poorly defined government role. And the implications for national security are profound. First, it was reported that people associated with the newly created Department of Government Efficiency (DOGE) had accessed the US Treasury computer syst

article thumbnail

Microsoft Patch Tuesday, February 2025 Edition

Krebs on Security

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited. All supported Windows operating systems will receive an update this month for a buffer overflow vulnerability that carries the catchy name CVE-2025-21418. This patch should be a priority for enterprises, as Microsoft says it is being exploited, has low attack complexity, and no requirements for user int

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Modeling the Genomic Data Sequencing Workflow (Threat Model Thursday)

Adam Shostack

An exciting new sample TM from MITRE For Threat Model Thursday, I want to provide some comments on NIST CSWP 35 ipd, Cybersecurity Threat Modeling the Genomic Data Sequencing Workflow (Initial Public Draft). As always, my goal is to offer helpful feedback. This is a big, complex document. Its 50 pages of real content with 13 listed authors, and is a subset of a larger project.

Risk 147
article thumbnail

Fake Etsy invoice scam tricks sellers into sharing credit card information 

Malwarebytes

This article was researched and written by Stefan Dasic, manager, research and response for ThreatDown, powered by Malwarebytes. As an online seller, youre already juggling product listings, customer service and marketingso the last thing you need is to be targeted by scammers. Unfortunately, a new scam is making the rounds, and its crucial to recognize the warning signs before you fall victim.

Scams 128
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Delivering Malware Through Abandoned Amazon S3 Buckets

Schneier on Security

Here’s a supply-chain attack just waiting to happen. A group of researchers searched for, and then registered, abandoned Amazon S3 buckets for about $400. These buckets contained software libraries that are still used. Presumably the projects don’t realize that they have been abandoned, and still ping them for patches, updates, and etc. The TL;DR is that this time, we ended up discovering ~150 Amazon S3 buckets that had previously been used across commercial and open source software

Malware 291
article thumbnail

Nearly a Year Later, Mozilla is Still Promoting OneRep

Krebs on Security

In mid-March 2024, KrebsOnSecurity revealed that the founder of the personal data removal service Onerep also founded dozens of people-search companies. Shortly after that investigation was published, Mozilla said it would stop bundling Onerep with the Firefox browser and wind down its partnership with the company. But nearly a year later, Mozilla is still promoting it to Firefox users.

LifeWorks

More Trending

article thumbnail

Apple ordered to grant access to users’ encrypted data

Malwarebytes

Last week, an article in the Washington Post revealed the UK had secretly ordered Apple to provide blanket access to protected cloud backups around the world. Since then, privacy focused groups have uttered their objections. The UK government has demanded to be able to access encrypted data stored by Apple users worldwide in its cloud service. However, Apple itself doesn’t have access to it at the moment, only the holder of the Apple account can access data stored in this way.

article thumbnail

Pairwise Authentication of Humans

Schneier on Security

Here’s an easy system for two humans to remotely authenticate to each other, so they can be sure that neither are digital impersonations. To mitigate that risk, I have developed this simple solution where you can setup a unique time-based one-time passcode (TOTP) between any pair of persons. This is how it works: Two people, Person A and Person B, sit in front of the same computer and open this page; They input their respective names (e.g.

article thumbnail

Gmail Under Siege: FBI Warns of Unusual AI-Driven Phishing Attacks

eSecurity Planet

In a stark warning to organizations and everyday users alike, cybersecurity experts and government agencies have sounded the alarm over a new breed of Gmail-targeted phishing attacks. With cybercriminals using advanced artificial intelligence algorithms to create more convincing fraudulent messages, the FBIs message is simple and uncompromising: Do not click on anything.

Phishing 116
article thumbnail

MY TAKE: Securing the Internet of Everything: why self-healing devices are the next frontier

The Last Watchdog

Were just getting started down the road to the Internet of Everything (IoE.) Related: IoT growing at a 24% clip To get there to fully tap the potential of a hyper-interconnected ecosystem where devices, data, AI and humans converge to benefit humankind cybersecurity must first catch up. I had an edifying conversation about this with Steve Hanna , distinguished engineer at Infineon Technologies , a global semiconductor leader in power systems and IoT, based in Neubiberg, Germany.

Internet 130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Gambling firms are secretly sharing your data with Facebook 

Malwarebytes

While you might think youre hitting the jackpot, whether youve consented to it or not, online gambling sites are playing with your data. Users data, including details of webpages they visited and buttons they clicked, are being shared with Meta, Facebooks parent company. The Observer reports that over 150 UK gambling websites have been extracting visitor data through a hidden embedded tracking tool, and then sending that data to Meta in order to profile people as gamblers and flood them with Fac

article thumbnail

Blackhat and Human Factors

Adam Shostack

BlackHat invites human factors work Blackhat 2024 will be August 6-7 in Las Vegas, The call for papers is open, and will close on April 2. (Please check all dates in the official CFP.) As a member of the BlackHat Review Board, Im responsible for the Human Factors track. Over the last decade, weve developed a good track with a wide variety of content.

article thumbnail

XE Group shifts from credit card skimming to exploiting zero-days

Security Affairs

The cybercrime group XE Group exploited a VeraCore zero-day to deploy reverse shells, web shells in recent attacks. A recent investigation by researchers from Intezer and Solis Security shed light on the recent operations of the XE Group. Active since at least 2013 , XE Group is a cybercriminal group focused on credit card skimming and password theft via supply chain attacks. “XE Group transitioned from credit card skimming to targeted information theft, marking a significant shift in thei

article thumbnail

Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle

Security Boulevard

A Chinese threat actor who targeted an Asian software company used the same toolset for the ransomware attack that was found in multiple cyberespionage incidents, leaving Symantec analysts to believe the hacker was a Chinese spy who used the malicious tools to earn some money on the side. The post Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Phishing evolves beyond email to become latest Android app threat

Malwarebytes

There are plenty of phish in the sea, and the latest ones have little interest in your email inbox. In 2024, Malwarebytes detected more than 22,800 phishing apps on Android, according to the recent 2025 State of Malware report. Of those malicious apps, 5,200 could subvert one of the strongest security practices available today, called multifactor authentication, by prying into basic text messages sent to a device.

Phishing 129
article thumbnail

Understanding the Deepfake Threat

SecureWorld News

Deepfakes involve AI-generated synthetic media that convincingly mimics real individuals' voices and faces. While initially popularized in entertainment and satire, cybercriminals now weaponize this technology for fraud, identity theft, and corporate deception. According to a 2023 study by Sumsub , deepfake fraud attempts increased by 704% between 2022 and 2023.

article thumbnail

China-linked APTs’ tool employed in RA World Ransomware attack

Security Affairs

A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. Broadcom researchers reported that threat actors behind an RA World ransomware attack against an Asian software and services firm employed a tool that was explosively associated in the past with China-linked APT groups. “Tools that are usually associated with China-based espionage actors were recently deployed in an attack involving the RA World ransomware against an Asian

article thumbnail

Adam Khan on the Unique Security Challenges in Education IT

Security Boulevard

Adam Khan, vice president of global security operations for Barracuda Networks, explains what makes securing schools, such as universities, so much more difficult than the average enterprise IT environment. Unlike traditional enterprises, schools operate on limited budgets, often relying on outdated infrastructure while managing vast amounts of sensitive student, financial, and research datamaking them prime.

Education 112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How AI was used in an advanced phishing campaign targeting Gmail users

Malwarebytes

In May, 2024, the FBI warned about the increasing threat of cybercriminals using Artificial Intelligence (AI) in their scams. At the time, FBI Special Agent in Charge Robert Tripp said: Attackers are leveraging AI to craft highly convincing voice or video messages and emails to enable fraud schemes against individuals and businesses alike. These sophisticated tactics can result in devastating financial losses, reputational damage, and compromise of sensitive data.

Phishing 109
article thumbnail

Trusted Encryption Environments

Schneier on Security

Really good—and detailed— survey of Trusted Encryption Environments (TEEs.

article thumbnail

Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign

Security Affairs

A subgroup of the Russia-linked Seashell Blizzard APT group (aka Sandworm) ran a global multi-year initial access operation called BadPilot. Microsoft shared findings on research on a subgroup of the Russia-linked APT group Seashell Blizzard behind the global BadPilot campaign, which compromises infrastructure to support Russian cyber operations. Seashell Blizzard (aka Sandworm , BlackEnergy and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU

article thumbnail

Cybercriminals Exploit Valentine’s Day with Romance Scams, Phishing Attacks

Security Boulevard

As Valentines Day approaches, cybercriminals are ramping up their efforts to exploit consumers through romance scams, phishing campaigns and fraudulent e-commerce offers. The post Cybercriminals Exploit Valentines Day with Romance Scams, Phishing Attacks appeared first on Security Boulevard.

Scams 114
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Apple fixes zero-day vulnerability used in “extremely sophisticated attack”

Malwarebytes

Apple has released an emergency security update for a vulnerability which it says may have been exploited in an “extremely sophisticated attack against specific targeted individuals. The update is available for: iOS 18.3.1 and iPadOS 18.3.1 – iPhone XS and later, iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later, and iPad mini 5th generation and later iPadOS 17.7.5

Spyware 102
article thumbnail

Romantic Lawsuit for Two? Don't Let Cybercriminals Scam You this Valentine's Day

SecureWorld News

Last year saw a 110% rise in cybercrime in the lead up to Valentine's Day. And 2025 will be no different, as increasingly sophisticated online hackers seek to take advantage of Valentine's themed email traffic, social media advertisements, or marketing campaigns, and exploit heightened emotions and a desire to connect. Just as Christmas makes us a bit more likely to click on a dodgy parcel delivery text, Valentine's Day means we are more likely to click on something romance related.

Scams 72
article thumbnail

Valve removed the game PirateFi from the Steam video game platform because contained a malware

Security Affairs

Valve removed a game from Steam because it contained malware, the company also warned affected users to reformat their operating systems. Valve removed the game PirateFi from the Steam video game platform because it contained a Windows malicious code to steal browser cookies and hijack accounts. The company also warned affected users to fully reformatting the operating systems to remove the threat.

Malware 108
article thumbnail

Sophos Sheds 6% of Employees After Closing Secureworks Deal

Security Boulevard

Cybersecurity firm Sophos closed its $859 million acquisition of Secureworks earlier this month and soon after cut 6% of the combined company's workforce, with many of job losses related to either overlapping positions created by the deal or roles that were no longer needed after Secureworks delisted as a public company. The post Sophos Sheds 6% of Employees After Closing Secureworks Deal appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

12 Million Zacks accounts leaked by cybercriminal

Malwarebytes

A cybercriminal claimed to have stolen 15 million data records from the customers and clients of the company Zacksa number that a separate investigation, after analysis, shaved down to just 12 million. Zacks is an investment research company best known for its “Zacks Ranks,” which are daily lists that provide stock market watchers and likely investors with possible company portfolio purchases, ranked on a scale from one to five.

article thumbnail

The Rise of Non-Ransomware Attacks on AWS S3 Data

Thales Cloud Protection & Licensing

The Rise of Non-Ransomware Attacks on AWS S3 Data madhav Thu, 02/13/2025 - 04:39 A sophisticated ransomware gang, Codefinger, has a cunning new technique for encrypting data stored in AWS S3 buckets without traditional ransomware tools. Instead, they exploit the AWS server-side encryption with customer-provided keys (SSE-C), extorting payment in exchange for the encryption key.

article thumbnail

North Korea-linked APT Emerald Sleet is using a new tactic

Security Affairs

Microsoft Threat Intelligence has observed North Korea-linked APT Emerald Sleet using a new tactic, tricking targets into running PowerShell. Microsoft Threat Intelligence researchers spotted North Korea-linked threat actor Emerald Sleet (also known as Kimsuky and VELVET CHOLLIMA ) using a new tactic. They are tricking targets into running PowerShell as an administrator and executing code provided by the attacker.

article thumbnail

Palo Alto Networks Unifies Cloud Security Portfolio

Security Boulevard

Palo Alto Networks today updated its Cortex Cloud platform to integrate the companys cloud-native application protection platform (CNAPP) known as Prisma Cloud into a platform that provides a wider range of cloud security capabilities. The post Palo Alto Networks Unifies Cloud Security Portfolio appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.