Fri.May 16, 2025

article thumbnail

Communications Backdoor in Chinese Power Inverters

Schneier on Security

This is a weird story : U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure after unexplained communication equipment was found inside some of them, two people familiar with the matter said. […] Over the past nine months, undocumented communication devices, including cellular radios, have also been found in some batteries from multiple Chinese suppliers, one of them said.

Firewall 254
article thumbnail

Weekly Update 452

Troy Hunt

Funny how excited people can get about something as simple as a sticker. They're always in hot demand and occupy an increasingly large portion of my luggage as we travel around. Charlotte reckoned it would be the same for other merch too, so, while I've been beavering away playing code monkey on the rebranded HIBP website, she built a merch store.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

As Seen on Channel 5’s Vanessa (Feltz) Show: What to Do if You’re Targeted by a Scam

Jane Frankland

After joining Vanessa Feltz on Channel 5 to talk all things scams, I wanted to follow up with a clear guide for anyone whos ever been targeted or worries they might be next. Scams today arent just dodgy emails or shady phone calls. Fraudsters use AI, social engineering, and emotional manipulation to steal not just money, but also trust, time, and peace of mind.

Scams 130
article thumbnail

Linux Foundation Shares Framework for Building Effective Cybersecurity Teams

Security Boulevard

The Linux Foundation this week made available a customizable reference guide intended to help organizations identify critical cybersecurity skills requirements. The post Linux Foundation Shares Framework for Building Effective Cybersecurity Teams appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

The Hacker News

Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. "Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks," NSFOCUS said in a report published this week.

DDOS 123
article thumbnail

AI in the Cloud: The Rising Tide of Security and Privacy Risks

Security Affairs

Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise growing concerns over data security and privacy risks. As enterprises embrace artificial intelligence (AI) to streamline operations and accelerate decision-making, a growing number are turning to cloud-based platforms like Azure OpenAI, AWS Bedrock, and Google Bard. In 2024 alone, over half of organizations adopted AI to build custom applications.

Risk 108

LifeWorks

More Trending

article thumbnail

New botnet HTTPBot targets gaming and tech industries with surgical attacks

Security Affairs

New botnet HTTPBot is targeting China’s gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS cybersecurity discovered a new botnet calledHTTPBotthat has been used to target the gaming industry, technology firms, and educational institutions in China. HTTPBot is a Go-based botnet first detected in August 2024, however, its activity surged by April 2025.

DDOS 110
article thumbnail

This affordable Suunto smartwatch made me forget about my Garmin for a week

Zero Day

Runners and sports fans will appreciate the lightweight yet capable Suunto Run, which sells for $249.

96
article thumbnail

Meta plans to train AI on EU user data from May 27 without consent

Security Affairs

Meta plans to train AI on EU user data from May 27 without consent; privacy group noyb threatens lawsuit over lack of explicit opt-in. Meta plans to use EU user data for AI training starting May 27 without explicit consent. Austrian privacy group noyb threatens a class action lawsuit if the social network giant does not desist. In April, Meta announced it will start training its AI models using public data from adults in the EU, after pausing the plan last year over data protection concerns rais

Media 82
article thumbnail

My top 5 picks for the best Memorial Day phone deals so far: Apple, Samsung, and more

Zero Day

The best phone deals strike a balance of value and performance. These picks are sure to please any holiday week shopper.

102
102
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Google Boosts Accessibility with AI: Enhanced TalkBack, Captions, and More

Penetration Testing

Following Apples rollout of a suite of accessibility features in recognition of Global Accessibility Awareness Day on May The post Google Boosts Accessibility with AI: Enhanced TalkBack, Captions, and More appeared first on Daily CyberSecurity.

article thumbnail

This GitHub trick lets ChatGPT dissect your code in minutes - here's how

Zero Day

Want to use ChatGPT to review your codebase? Here's how I moved my project into GitHub and connected it to Deep Research for instant code analysis.

92
article thumbnail

Scattered Spider Strikes Again: U.K. Attacks Spark U.S. Retailer Alarm

SecureWorld News

The threat actor group known as Scattered Spider (also tracked as UNC3944) has intensified its cyber offensivesthis time hitting targets in the United Kingdom with increased sophistication and aggression. In a new blog post by Google's Threat Intelligence team, security analysts outline a concerning evolution in the group's tactics and raise red flags for U.S. retailers potentially next in the crosshairs.

Retail 74
article thumbnail

I highly recommend shopping these early health tracker Memorial Day deals

Zero Day

Memorial Day is next weekend, but savings on fitness and health trackers are live now. These are the deals I recommend the most.

97
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Coinbase Rejects $20M Ransom After Insider Data Leak, Faces Up to $400M in Fallout

eSecurity Planet

Crypto giant Coinbase is grappling with one of its most serious security challenges to date: An insider-led data breach that has shaken customer trust and could cost the company as much as $400 million. In a statement released Thursday, Coinbase revealed that cybercriminals bribed overseas customer support agents to leak sensitive customer data. The stolen information was then used in social engineering scams that tricked users into giving away their crypto.

article thumbnail

Upgrading your Windows laptop? This affordable Dell model is my top pick for work

Zero Day

The Dell 14 Plus is my new recommended laptop for the office, with its updated processor yielding improved battery life and performance.

78
article thumbnail

Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi

Security Affairs

On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint, ESXi, VirtualBox, RHEL, and Firefox. On day two of Pwn2Own Berlin 2025, bug hunters earned a total of $435,000, which brings the contest total to $695,000, after $260,000 was awarded during the first day of the competition. The participants demonstrated 20 unique zero-days in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozi

Hacking 72
article thumbnail

I replaced my Pixel Watch with this affordable Suunto, and it's spoiled me

Zero Day

Runners of all shapes and sizes will appreciate the lightweight yet capable Suunto Run, which sells for just $249.

75
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Google fixed a Chrome vulnerability that could lead to full account takeover

Security Affairs

Google released emergency security updates to fix a Chrome vulnerability that could lead to full account takeover. Google released emergency security updates to address a Chrome browser vulnerability, tracked as CVE-2025-4664, that could lead to full account takeover. The security researcher Vsevolod Kokorin ( @slonser_ ) discovered the vulnerability, which stems from an insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113.

article thumbnail

I tested the tri-foldable mini projector that's got the internet buzzing - here's my verdict after a week

Zero Day

The Aurzen Zip Tri-Fold projector has the potential to define 'ultra portability' among projectors, so long as it works on these aspects.

article thumbnail

Prescription for disaster: Sensitive patient data leaked in Ascension breach

Graham Cluley

Ascension, one of the largest private healthcare companies in the United States, has confirmed that the personal data of some 437,329 patients has been exposed following an attack by cybercriminals. Read more in my article on the Fortra blog.

article thumbnail

I pried open a cheap 600W charger and found this weird lump of 'goo' inside

Zero Day

Things just kept going downhill from there.

77
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty

Security Boulevard

The major data breach of cryptocurrency exchange Coinbase could cost the company as much as $400 million, it told the SEC. However, rather than pay the $20 million extortion demand, Coinbase issued a $20 million bounty on the hackers. The post Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty appeared first on Security Boulevard.

article thumbnail

The best transcription services we tested

Zero Day

I tested the best transcription software options that can translate audio and video conversations for you. These are my favorites.

article thumbnail

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

The Hacker News

Researchers at ETH Zrich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years.

115
115
article thumbnail

Your Chrome and Android devices just got useful assistive features for free - here's what's new

Zero Day

The company is rolling out these new features on Global Accessibility Awareness Day.

96
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Top 10 Best Practices for Effective Data Protection

The Hacker News

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework?

article thumbnail

Tech leaders are seemingly rushing to deploy agentic AI - here's why

Zero Day

With growing investor pressure, tech companies are pushing AI agents as a more practical and dynamic alternative to traditional chatbots. It seems to be working.

108
108
article thumbnail

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

The Hacker News

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents," Qualys security researcher Akshay Thorve said in a technical report.

Malware 108
article thumbnail

Your Meta Ray-Bans just got two seriously helpful upgrades for free - how they work

Zero Day

As part of the new features, Meta said it partnered with Be My Eyes. Here's why that's a big deal.

97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!