Trending Articles

article thumbnail

Rayhunter: Device to Detect Cellular Surveillance

Schneier on Security

The EFF has created an open-source hardware tool to detect IMSI catchers: fake cell phone towers that are used for mass surveillance of an area. It runs on a $20 mobile hotspot.

article thumbnail

Feds Link $150M Cyberheist to 2022 LastPass Hacks

Krebs on Security

In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Women in Cybersecurity & IWD: Why I’m Done!

Jane Frankland

For nearly a decade, we’ve heard the same discussion in cybersecurity circles about the gender diversity problem. As the first women owned penetration testing provider in the UK some 28-years ago, Ive researched, campaigned, written, spoken and stepped up as a visible role model, always presenting the business case. I’ve also watched how panels, passion projects, and awareness campaigns touting the need for inclusivity and diversity have come and gone including my own.

article thumbnail

Digital nomads and risk associated with the threat of infiltred employees

Security Affairs

Companies face the risk of insider threats, worsened by remote work. North Korean hackers infiltrate firms via fake IT hires, stealing data. Stronger vetting is key. In an increasingly connected and digitalized world, companies are facing new security challenges. The insider threat, or the risk that an employee could harm the company, is a growing concern.

Risk 122
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Popular Python Logging Library Vulnerable to Remote Code Execution (CVE-2025-27607)

Penetration Testing

A critical vulnerability has been discovered in ‘python-json-logger’, a popular Python library used for generating JSON logs. This The post Popular Python Logging Library Vulnerable to Remote Code Execution (CVE-2025-27607) appeared first on Cybersecurity News.

article thumbnail

Trojaned AI Tool Leads to Disney Hack

Schneier on Security

This is a sad story of someone who downloaded a Trojaned AI tool that resulted in hackers taking over his computer and, ultimately, costing him his job.

Hacking 231

More Trending

article thumbnail

The Firefox I loved is gone - how to protect your privacy on it now

Zero Day

With Mozilla's recent data and privacy waffling, Firefox users need to be cautious with their data.

144
144
article thumbnail

Apple Taking Legal Action Against UK Over Backdoor Demands

Tech Republic Security

Apple told TechRepublic it is gravely disappointed to remove Advanced Data Protection in the U.K., as it fights government demands for an iCloud backdoor.

article thumbnail

Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423)

Penetration Testing

A newly discovered vulnerability in the popular text editor Vim could allow malicious actors to execute arbitrary code The post Vim Users Warned: Crafted TAR Files Could Trigger Code Execution (CVE-2025-27423) appeared first on Cybersecurity News.

article thumbnail

CISA Identifies Five New Vulnerabilities Currently Being Exploited

Schneier on Security

Of the five , one is a Windows vulnerability, another is a Cisco vulnerability. We don’t have any details about who is exploiting them, or how. News article. Slashdot thread.

230
230
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

VMware fixed three actively exploited zero-days in ESX products

Security Affairs

Broadcom has addressed three VMware zero-day vulnerabilities in ESX products that are actively exploited in the wild. Broadcom released security updates to address three VMware zero-day vulnerabilities in ESX products that are actively exploited in the wild. The flaws, respectively tracked as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, impact multiple VMware ESX products, including VMware ESXi, vSphere, Workstation, Fusion, Cloud Foundation, and Telco Cloud Platform.

Hacking 114
article thumbnail

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

The Hacker News

Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure. The list of vulnerabilities is as follows - CVE-2025-22224 (CVSS score: 9.

140
140
article thumbnail

Weekly Update 442

Troy Hunt

We survived the cyclone! That was a seriously weird week with lots of build-up to an event that last occurred before I was born. It'd been 50 years since a cyclone came this far south, and the media was full of alarming predictions of destruction. In the end, we maxed out at 52kts just after I recorded this video: It’s here. But 47kts max gusts isn’t too bad, nothing actually blowing over here (yet). pic.twitter.com/qFyrZdiyRW — Troy Hunt (@troyhunt) March 7, 2025 We re

Phishing 145
article thumbnail

CVE-2025-24813 Flaw in Apache Tomcat Exposes Servers to RCE, Data Leaks: Update Immediately

Penetration Testing

A serious vulnerability, CVE-2025-24813, has been discovered in Apache Tomcat, potentially allowing attackers to execute remote code, disclose The post CVE-2025-24813 Flaw in Apache Tomcat Exposes Servers to RCE, Data Leaks: Update Immediately appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Combined Cipher Machine

Schneier on Security

Interesting article —with photos!—of the US/UK “Combined Cipher Machine” from WWII.

226
226
article thumbnail

U.S. CISA adds Linux kernel and VMware ESXi and Workstation flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Linux kernel and VMware ESXi and Workstationflaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-50302 Linux Kernel Use of Uninitialized Resource Vulnerability CVE-2025-22225 VMware ESXi Arbitrary Write Vulnerability CVE-2025-22224 VMware ESXi and Workstation TOCTOU R

Mobile 113
article thumbnail

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

The Hacker News

The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks.

article thumbnail

News alert: Hunters announces ‘Pathfinder AI’ to enhance detection and response in SOC workflows

The Last Watchdog

Boston and Tel Aviv, Mar. 4, 2025, CyberNewswire — Hunters , the leader in next-generation SIEM, today announced Pathfinder AI, a major step toward a more AI-driven SOC. Building on Copilot AI, which is already transforming SOC workflows with LLM-powered investigation guidance, Hunters is introducing its Agentic AI vision, designed to autonomously enhance detection, investigation, and response.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A Fair Weather SOC: 5 Signs It’s Time to Panic (and Fix It!)

Anton on Security

A fair-weather SOC by MetaAI Do you have a fair-weather friend? Ortwo? Fair weather friend (viaGoogle) OK, do you also have a fair-weather SOC? This train of thought was inspired by reading pilot forums about how some training approaches lead to fair weather pilots who perform well in all cases except real emergencies. Anyhow, let me stop with this because this is not my area; it only triggered the ideation process forme.

article thumbnail

Thousands of WordPress Websites Infected with Malware

Schneier on Security

The malware includes four separate backdoors : Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. A unique case we haven’t seen before. Which introduces another type of attack made possibly by abusing websites that don’t monitor 3rd party dependencies in the browser of their users.

Malware 209
article thumbnail

Akira ransomware gang used an unsecured webcam to bypass EDR

Security Affairs

The Akira ransomware gang exploited an unsecured webcam to bypass EDR and launch encryption attacks on a victim’s network. Cybersecurity researchers at S-RM team discovered a novel attack technique used by the Akira ransomware gang. The ransomware group used an unsecured webcam to encrypt systems within atarget’s network, bypassing Endpoint Detection and Response (EDR).

article thumbnail

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

The Hacker News

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed," c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served via cdn.

138
138
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Employers want workers with AI skills, but what exactly does that mean?

Zero Day

Almost one in four tech jobs in the US need people with AI skills, according to recent job data.

120
120
article thumbnail

PayPal scam abuses Docusign API to spread phishy emails

Malwarebytes

PayPal scammers are using an old Docusign trick to enhance the trustworthiness of their phishing emails. We’ve received several reports of this recently, so we dug into how the scam works. The Docusign Application Programming Interface (API) allows customers to send emails that come from genuine Docusign accounts, and they can use templates to impersonate reputable companies.

Scams 115
article thumbnail

From Event to Insight: Unpacking a B2B Business Email Compromise (BEC) Scenario

Trend Micro

Trend Micro Managed XDR assisted in an investigation of a B2B BEC attack that unveiled an entangled mesh weaved by the threat actor with the help of a compromised server, ensnaring three business partners in a scheme that spanned for days. This article features investigation insights, a proposed incident timeline, and recommended security practices.

B2B 124
article thumbnail

Mass exploitation campaign hit 4,000+ ISP networks to deploy info stealers and crypto miners

Security Affairs

A massive attack targets ISPs in China and the U.S. West Coast to deploy info stealers and crypto miners on compromised systems. The Splunk Threat Research Team discovered a mass exploitation campaign from Eastern Europe targeting ISPs in China and the U.S. West Coast to deploy info stealers and crypto miners. Threat actors use weak credential brute force to gain access to target systems, then deploy cryptocurrency miners and crimeware with capabilities like data exfiltration, persistence, self-

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

The Hacker News

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution.

Software 135
article thumbnail

What is vishing? Voice phishing is surging - expert tips on how to spot it and stop it

Zero Day

Phishing isn't limited to your inbox anymore.

Phishing 128
article thumbnail

GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure

The Last Watchdog

In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion a significant 22% increase from the losses in 2022. Related: Closing the resiliency gap Unsurprisingly, experts predict this trend will continue to grow as we move further into the future. While any business is a potential target for hackers, critical infrastructure organizations including defense, healthcare, energy, utilities, and financial services companies are perhaps most

article thumbnail

Reddit will start warning users that upvote violent content

Malwarebytes

In a post on r/RedditSafety by a Reddit administrator, the platform announced that it will start sending warnings to users that upvote violent content. Reddit is a social media platform and online forum where users can share and discuss content across a wide range of topics. The platform’s structure divides it into communities known as “subreddits,” each focused on a specific subject or interest (from cars to movies to sports to knitting).

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.