Thu.Jan 16, 2025

article thumbnail

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Krebs on Security

Residents across the United States are being inundated with text messages purporting to come from toll road operators like E-ZPass , warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states.

Phishing 298
article thumbnail

FBI Deletes PlugX Malware from Thousands of Computers

Schneier on Security

According to a DOJ press release , the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details : To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI , at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

Malware 252
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

DNS 139
article thumbnail

Lessons for Cybersecurity from the American Public Health System

Adam Shostack

An important step towards cyber public health Every four years, the Computing Research Association publishes a set of Quadrenial papers that explore areas and issues around computing research with potential to address national priorities. The white papers attempt to portray a comprehensive picture of the computing research field detailing potential research directions, challenges, and recommendations.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Russia-linked APT Star Blizzard targets WhatsApp accounts

Security Affairs

The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “ Callisto “, Seaborgium , ColdRiver , and TA446, targeted government officials, military personnel,journalists and think tanks since at least 2015.

article thumbnail

PlugX malware deleted from thousands of systems by FBI

Malwarebytes

The FBI says it has removed PlugX malware from thousands of infected computers worldwide. The move came after suspicion that cybercriminals groups under control of the Peoples Republic of China (PRC) used a version of PlugX malware to control, and steal information from victims’ computers. PlugX has been around since at least 2008 but is under constant development.

Malware 120

LifeWorks

More Trending

article thumbnail

What is an Uncensored Model and Why Do I Need It

Security Boulevard

While the power and potential of GenAI is evident for IT and security, the use cases in the security field are surprisingly immature largely due to censorship and guardrails that hamper many models utility for cybersecurity use cases. The post What is an Uncensored Model and Why Do I Need It appeared first on Security Boulevard.

article thumbnail

Avery had credit card skimmer stuck on its site for months

Malwarebytes

The consequences of a wave of credit card skimmerswhich is normal around the holidays are starting to show. Label maker Avery has filed a data breach notification , saying 61,193 people may have had their credit card details stolen. On December 9, Avery said it became aware of an attack on its systems. An investigation showed that cybercriminals had inserted malicious software that was used to scrape credit card information used on its website.

article thumbnail

Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights

Heimadal Security

The NIS2 Directive is a pivotal regulation aimed at enhancing cybersecurity within critical sectors across the European Union. With its stringent requirements for managing cyber risks, securing supply chains, and reporting incidents, its essential for organizations to ensure compliance. This article outlines the crucial steps for aligning with NIS2 standards, drawn from our comprehensive NIS2 […] The post Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights appeared first on Heim

article thumbnail

Network Detection and Response (NDR) Done Right from the Ground Up

Security Boulevard

With an NDR in place, your IT administrators can quickly detect anomalies on the network, from cyberattacks to malfunctioning application servers or network equipment. The post Network Detection and Response (NDR) Done Right from the Ground Up appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Prominent US law firm Wolf Haldenstein disclosed a data breach

Security Affairs

The law firm Wolf Haldenstein disclosed a data breach that exposed the personal information of nearly 3.5 million individuals. The law firm Wolf Haldenstein disclosed a 2023 data breach that exposed the personal information of nearly 3.5 million individuals. Wolf Haldenstein Adler Freeman & Herz LLP is a prominent U.S.-based law firm that specializes in complex class action litigation.

article thumbnail

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape

Thales Cloud Protection & Licensing

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape andrew.gertz@t Thu, 01/16/2025 - 16:30 Compliance Thales | Cloud Protection & Licensing Solutions More About This Author > If you work in compliance for a financial services organization, chances are you have been focused on the March 31st deadline for the implementation of the Payment Card Industry Data Security Standard version (PCI DSS 4.0).

article thumbnail

Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

Security Affairs

The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability in Cleo file transfer products. “ We have data of many companies who use cleo.

article thumbnail

CVE-2024-53691: PoC Exploit Released for Severe QNAP RCE Flaw

Penetration Testing

Security researcher c411e published a proof-of-concept (PoC) exploit code for a severe vulnerability in QNAP NAS devices, identified The post CVE-2024-53691: PoC Exploit Released for Severe QNAP RCE Flaw appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

The Hacker News

Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.

Firmware 145
article thumbnail

IoT Botnet Linked to Large-scale DDoS Attacks Since the End of 2024

Trend Micro

Since the end of 2024, we have been continuously monitoring large-scale DDoS attacks orchestrated by an IoT botnet exploiting vulnerable IoT devices such as wireless routers and IP cameras.

IoT 143
article thumbnail

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

The Hacker News

Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China.

141
141
article thumbnail

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

WIRED Threat Level

A breach of AT&T that exposed nearly all of the company's customers may have included records related to confidential FBI sources, potentially explaining the Bureau's new embrace of end-to-end encryption.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

The Hacker News

Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same.

Malware 139
article thumbnail

How to sign up for the next TikTok - and why you should do it right away

Zero Day

The TikTok alternative many users are recommending is called Neptune. Join the waitlist now to snag the username you want. Here's what to do.

124
124
article thumbnail

Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

The Hacker News

Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration.

article thumbnail

How to screen record in Windows 10 or 11 with built-in tools

Zero Day

Windows 10 and 11 each offer a built-in screen-recording tool for gaming, though it can record just about any screen activity. And Windows 11 has an even better option. Here's what to know.

122
122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting

The Hacker News

The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection.

Phishing 129
article thumbnail

I gave away my Kindle and iPad within hours of testing this Android tablet

Zero Day

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G has become my favorite e-reader tablet for several reasons.

119
119
article thumbnail

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

The Hacker News

You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester).

article thumbnail

Super Productivity is the ultimate task manager for your time management goals

Zero Day

When a regular task manager just isn't enough, you need something a bit more 'super' that can not only help you keep track of tasks but also time spent on tasks and much more.

116
116
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

We Live Security

ESET researchers have discovered a vulnerability that affects the majority of UEFI-based systems and allows bypassing UEFI Secure Boot.

111
111
article thumbnail

These Beyerdynamic headphones deliver impressively accurate sound and all-day comfort

Zero Day

Looking for a brilliant pair of studio-quality, open-back headphones? The Beyerdynamic DT 1990 Pro are some of the best that I've tested.

116
116
article thumbnail

TikTok’s Last Dance: Inside the U.S. Ban

Penetration Testing

Although there were earlier rumors that ByteDance was evaluating the sale of TikTok’s operations to Elon Musk to The post TikTok’s Last Dance: Inside the U.S. Ban appeared first on Cybersecurity News.

article thumbnail

Android Automotive users are about to see a lot more apps in their vehicles

Zero Day

Google is making efforts to push more apps to the Android infotainment system without extra work from developers.

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!