Thu.Jan 16, 2025

article thumbnail

Chinese Innovations Spawn Wave of Toll Phishing Via SMS

Krebs on Security

Residents across the United States are being inundated with text messages purporting to come from toll road operators like E-ZPass , warning that recipients face fines if a delinquent toll fee remains unpaid. Researchers say the surge in SMS spam coincides with new features added to a popular commercial phishing kit sold in China that makes it simple to set up convincing lures spoofing toll road operators in multiple U.S. states.

Phishing 290
article thumbnail

FBI Deletes PlugX Malware from Thousands of Computers

Schneier on Security

According to a DOJ press release , the FBI was able to delete the Chinese-used PlugX malware from “approximately 4,258 U.S.-based computers and networks.” Details : To retrieve information from and send commands to the hacked machines, the malware connects to a command-and-control server that is operated by the hacking group. According to the FBI , at least 45,000 IP addresses in the US had back-and-forths with the command-and-control server since September 2023.

Malware 236
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

Researchers discovered a 13,000-device MikroTik botnet exploiting DNS flaws to spoof 20,000 domains and deliver malware. Infoblox researchers discovered a botnet of 13,000 MikroTik devices that exploits DNS misconfigurations to bypass email protections, spoof approximately 20,000 domains, and deliver malware. In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” or “Trackin

DNS 138
article thumbnail

Lessons for Cybersecurity from the American Public Health System

Adam Shostack

An important step towards cyber public health Every four years, the Computing Research Association publishes a set of Quadrenial papers that explore areas and issues around computing research with potential to address national priorities. The white papers attempt to portray a comprehensive picture of the computing research field detailing potential research directions, challenges, and recommendations.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CVE-2024-53691: PoC Exploit Released for Severe QNAP RCE Flaw

Penetration Testing

Security researcher c411e published a proof-of-concept (PoC) exploit code for a severe vulnerability in QNAP NAS devices, identified The post CVE-2024-53691: PoC Exploit Released for Severe QNAP RCE Flaw appeared first on Cybersecurity News.

article thumbnail

New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

The Hacker News

Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems. The vulnerability, assigned the CVE identifier CVE-2024-7344 (CVSS score: 6.

Firmware 145

More Trending

article thumbnail

Russia-linked APT Star Blizzard targets WhatsApp accounts

Security Affairs

The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “ Callisto “, Seaborgium , ColdRiver , and TA446, targeted government officials, military personnel,journalists and think tanks since at least 2015.

article thumbnail

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

The Hacker News

Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China.

139
139
article thumbnail

PlugX malware deleted from thousands of systems by FBI

Malwarebytes

The FBI says it has removed PlugX malware from thousands of infected computers worldwide. The move came after suspicion that cybercriminals groups under control of the Peoples Republic of China (PRC) used a version of PlugX malware to control, and steal information from victims’ computers. PlugX has been around since at least 2008 but is under constant development.

Malware 123
article thumbnail

Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

The Hacker News

Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns. "In both campaigns, attackers hid malicious code in images they uploaded to archive[.]org, a file-hosting website, and used the same.

Malware 133
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

The oil and gas industry serves as the backbone of the global economy, powers industries, transportation, and homes. With the increasing reliance on digital technologies for operational efficiency, this sector has become a prime target for sophisticated cyber and physical threats. To ensure energy security and economic stability, protecting the infrastructure is essential.

article thumbnail

Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

The Hacker News

Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration.

article thumbnail

How to sign up for the next TikTok - and why you should do it right away

Zero Day

The TikTok alternative many users are recommending is called Neptune. Join the waitlist now to snag the username you want. Here's what to do.

124
124
article thumbnail

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

WIRED Threat Level

A breach of AT&T that exposed nearly all of the company's customers may have included records related to confidential FBI sources, potentially explaining the Bureau's new embrace of end-to-end encryption.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting

The Hacker News

The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection.

Phishing 122
article thumbnail

How to screen record in Windows 10 or 11 with built-in tools

Zero Day

Windows 10 and 11 each offer a built-in screen-recording tool for gaming, though it can record just about any screen activity. And Windows 11 has an even better option. Here's what to know.

122
122
article thumbnail

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

We Live Security

ESET researchers have discovered a vulnerability that affects the majority of UEFI-based systems and allows bypassing UEFI Secure Boot.

118
118
article thumbnail

I gave away my Kindle and iPad within hours of testing this Android tablet

Zero Day

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G has become my favorite e-reader tablet for several reasons.

119
119
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Avery had credit card skimmer stuck on its site for months

Malwarebytes

The consequences of a wave of credit card skimmerswhich is normal around the holidays are starting to show. Label maker Avery has filed a data breach notification , saying 61,193 people may have had their credit card details stolen. On December 9, Avery said it became aware of an attack on its systems. An investigation showed that cybercriminals had inserted malicious software that was used to scrape credit card information used on its website.

article thumbnail

What is an Uncensored Model and Why Do I Need It

Security Boulevard

While the power and potential of GenAI is evident for IT and security, the use cases in the security field are surprisingly immature largely due to censorship and guardrails that hamper many models utility for cybersecurity use cases. The post What is an Uncensored Model and Why Do I Need It appeared first on Security Boulevard.

article thumbnail

Super Productivity is the ultimate task manager for your time management goals

Zero Day

When a regular task manager just isn't enough, you need something a bit more 'super' that can not only help you keep track of tasks but also time spent on tasks and much more.

116
116
article thumbnail

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

The Hacker News

You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester).

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

These Beyerdynamic headphones deliver impressively accurate sound and all-day comfort

Zero Day

Looking for a brilliant pair of studio-quality, open-back headphones? The Beyerdynamic DT 1990 Pro are some of the best that I've tested.

116
116
article thumbnail

TikTok’s Last Dance: Inside the U.S. Ban

Penetration Testing

Although there were earlier rumors that ByteDance was evaluating the sale of TikTok’s operations to Elon Musk to The post TikTok’s Last Dance: Inside the U.S. Ban appeared first on Cybersecurity News.

article thumbnail

Android Automotive users are about to see a lot more apps in their vehicles

Zero Day

Google is making efforts to push more apps to the Android infotainment system without extra work from developers.

111
111
article thumbnail

Network Detection and Response (NDR) Done Right from the Ground Up

Security Boulevard

With an NDR in place, your IT administrators can quickly detect anomalies on the network, from cyberattacks to malfunctioning application servers or network equipment. The post Network Detection and Response (NDR) Done Right from the Ground Up appeared first on Security Boulevard.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

This 11-in-1 docking station delivered all the ports I needed - and then some

Zero Day

Need more ports? This easy-to-use docking station from one of my favorite tech brands can help.

111
111
article thumbnail

Russia-linked APT Star Blizzard targets WhatsApp accounts

Security Affairs

The Russian group Star Blizzard targets WhatsApp accounts in a new spear-phishing campaign, shifting tactics to avoid detection. In November 2024, Microsoft researchers observed the Russia-linked APT group Star Blizzard targeting WhatsApp accounts via spear-phishing, shifting tactics to avoid detection. The Star Blizzard group, aka “ Callisto “, Seaborgium , ColdRiver , and TA446, targeted government officials, military personnel,journalists and think tanks since at least 2015.

article thumbnail

It's official: All your Office apps are getting AI and a price increase

Zero Day

Every Microsoft 365 Personal and Family subscription is about to get Copilot AI features, along with a price increase of at least 30%. The global rollout comes after months of testing and is certain to be controversial.

106
106
article thumbnail

Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights

Heimadal Security

The NIS2 Directive is a pivotal regulation aimed at enhancing cybersecurity within critical sectors across the European Union. With its stringent requirements for managing cyber risks, securing supply chains, and reporting incidents, its essential for organizations to ensure compliance. This article outlines the crucial steps for aligning with NIS2 standards, drawn from our comprehensive NIS2 […] The post Your Ultimate Guide to NIS2 Compliance: Key Steps and Insights appeared first on Heim

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.