Thu.Jan 30, 2025

article thumbnail

Fake Reddit and WeTransfer Sites are Pushing Malware

Schneier on Security

There are thousands of fake Reddit and WeTransfer webpages that are pushing malware. They exploit people who are using search engines to search sites like Reddit. Unsuspecting victims clicking on the link are taken to a fake WeTransfer site that mimicks the interface of the popular file-sharing service. The ‘Download’ button leads to the Lumma Stealer payload hosted on “weighcobbweo[.]top.” Boingboing post.

Malware 239
article thumbnail

The DeepSeek controversy: Authorities ask where does the data come from and how safe is it?

Malwarebytes

The sudden rise of DeepSeek has raised concerns and questions, especially about the origin and destination of the training data, as well as the security of the data. For those returning from a short holiday away from the news, DeepSeek is a new player on the Artificial Intelligence (AI) field. The Chinese startup has certainly taken the app stores by storm: In just a week after the launch it topped the charts as the most downloaded free app in the US.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

The psychology of getting started threat modeling During a recent threat modeling course, one of our students, Aleksei*, made a striking comparison that resonated with a lot of us: starting security analysis is like tackling a hoarders house. That visceral image of looking at mountains of accumulated issues, feeling overwhelmed by where to begin, captures a challenge many engineering leaders face when they first attempt to systematically assess their systems security.

article thumbnail

News alert: SquareX discloses ‘Browser Syncjacking’ – a new attack to hijack browser

The Last Watchdog

Palo Alto, Calif., Jan. 30, 2025, CyberNewswire — Browser extensions have been under the spotlight in enterprise security news recently due to the wave of OAuth attacks on Chrome extension developers and data exfiltration attacks. However, until now, due to the limitations browser vendors place on the extension subsystem and extensions, it was thought to be impossible for extensions to gain full control of the browser, much less the device.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

DeepSeek database exposed highly sensitive information

Security Affairs

Chinese AI platform DeepSeek has publicly exposed two databases containing highly sensitive user and backend details. Wiz Research discovered a publicly accessible ClickHouse database belonging to DeepSeek, exposing chat history, secret keys, and backend details. After responsible disclosure, DeepSeek promptly secured the issue. “Within minutes, we found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data.

article thumbnail

No need to RSVP: a closer look at the Tria stealer campaign

SecureList

Introduction Since mid-2024, we’ve observed a malicious Android campaign leveraging wedding invitations as a lure to social-engineer victims into installing a malicious Android app (APK), which we have named “Tria Stealer” after unique strings found in campaign samples. The primary targets of the campaign are users in Malaysia and Brunei, with Malaysia being the most affected country.

LifeWorks

More Trending

article thumbnail

Is Your Cybersecurity Job Burning You Out? How to Spot the Warning Signs

SecureWorld News

Working in cybersecurity is demanding. Analysts must investigate and remedy thousands of alerts every day while remaining adaptable to an ever-changing technological landscape. Cybersecurity is fast-paced and can be demanding. You can't always turn off your laptop at the end of the day and forget about it. Most professionals in this field work unsociable hours just to stay on top of their workload.

article thumbnail

Transforming Healthcare Security: Why Zero-Trust is Essential

Security Boulevard

In recent years, the healthcare sector has emerged as a primary target for cyberattacks, which is mainly due to the highly sensitive nature of medical information. The post Transforming Healthcare Security: Why Zero-Trust is Essential appeared first on Security Boulevard.

article thumbnail

How Spread Betting Platforms Safeguard Traders Against Cyber Risks

IT Security Guru

Spread betting has become a very popular form of trading that allows people to speculate on the movement of a financial asset without owning the asset in question. It is one of the many trading models that is exclusively digital in nature, which makes it very flexible and provides an ease of access that cannot be matched by many other investment types.

article thumbnail

TikTok’s Project Clover Evolves With PETs, Data Access Controls

Security Boulevard

The popular and controversial Chinese social media app TikTok is pushing forward with Project Clover, a 12 billion, 10-year initiative aimed at bolstering the protection of European user data. The post TikToks Project Clover Evolves With PETs, Data Access Controls appeared first on Security Boulevard.

Media 87
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Italy’s Data Protection Authority Garante requested information from Deepseek

Security Affairs

Italys data privacy regulator Garante has requested information from Chinese AI company DeepSeek regarding its data practices. Italys Data Protection Authority Garante has asked the AI firm DeepSeek to clarify its data collection, sources, purposes, legal basis, and storage, citing potential risks to user data. “The Italian Data Protection Authority has sent a request for information to Hangzhou DeepSeek Artificial Intelligence and Beijing DeepSeek Artificial Intelligence, the companies th

article thumbnail

DeepSeek Locked Down Public Database Access That Exposed Chat History

Tech Republic Security

Research Firm Wiz Research began investigating DeepSeek soon after its generative AI took the tech world by storm.

article thumbnail

PHP package Voyager flaws expose to one-click RCE exploits

Security Affairs

The open-source PHP packageVoyageris affected by three vulnerabilities that could be exploited to achieve one-click remote code execution on affected instances. Voyager is a popular open-source PHP package for managing Laravel applications, offering an admin interface, BREAD operations, media, and user management. During an ordinary scan activity, SonarSource researchers reported an arbitrary file write vulnerability in Voyager.

Media 62
article thumbnail

Network Security Market to Hit $38 Billion by 2029: Cloud, AI Drive Growth

Security Boulevard

The global network security market is on track to reach $38 billion by 2029, growing at a 10% annual rate, according to a report from DellOro Group. The post Network Security Market to Hit $38 Billion by 2029: Cloud, AI Drive Growth appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Operation Talent: An international law enforcement operation seized Cracked, Nulled and other cybercrime websites

Security Affairs

An international law enforcement operation targeted several major cybercrime websites, including Cracked, Nulled, Sellix, and StarkRDP. An international law enforcement operation led by Europol, code-named Operation Talent, dismantled several major cybercrime sites, including Cracked, Nulled, Sellix, and StarkRDP. The message displayed on the targeted cybercrime websites states that authorities have seized the platforms, along with information about their customers and victims.

article thumbnail

Security Roundup January 2025

BH Consulting

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Cyber risk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. The report ranks risks by severity over two-year and 10-year timeframes.

article thumbnail

Sharing Information with AI and Understanding the Risks

ZoneAlarm

Artificial intelligence (AI) has become a huge part of our lives. From chatbots that answer questions to systems that help make decisions, AI is everywhere. But as AI grows, so do the risks of sharing information with it. A new AI system called DeepSeek, developed in China, has raised fresh concerns about how information is … The post Sharing Information with AI and Understanding the Risks appeared first on ZoneAlarm Security Blog.

article thumbnail

How to Use Keeper Password Manager: A Comprehensive Guide

Tech Republic Security

This step-by-step guide shows you how to set up Keeper Password Manager and use it to secure and organize your passwords.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked

The Hacker News

Buzzy Chinese artificial intelligence (AI) startup DeepSeek, which has had a meteoric rise in popularity in recent days, left one of its databases exposed on the internet, which could have allowed malicious actors to gain access to sensitive data.

article thumbnail

Hiya AI Phone App Protects Against Deepfakes, Other Scams

Security Boulevard

Mobile security solutions company Hiya is rolling out its Hiya AI Phone app that uses trained AI models to smoke out deepfakes and other mobile scams and alerts the user to the potential threat. In addition, it will automatically transcribes and summarizes calls. The post Hiya AI Phone App Protects Against Deepfakes, Other Scams appeared first on Security Boulevard.

Scams 69
article thumbnail

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

The Hacker News

An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following domains - www.cracked.io www.nulled.to www.mysellix.io www.sellix.io www.starkrdp.

article thumbnail

This $300 Samsung phone looks as good as the Galaxy S25 - at a fraction of the price

Zero Day

For a limited time, the Samsung Galaxy A35 is available for a fraction of the cost of the S25 series. It's also discounted when you bundle a pair of Buds FE.

122
122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

The Hacker News

Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations.

article thumbnail

Important Updates Announced for Merchants Validating to Self-Assessment Questionnaire A

PCI perspectives

In response to stakeholder feedback regarding the complexity of implementing the new e-commerce security Requirements 6.4.3 and 11.6.1 in PCI Data Security Standard (PCI DSS) v4.0.1, the PCI Security Standards Council (PCI SSC) has announced important modifications for merchants validating to Self-Assessment Questionnaire A (SAQ A).

121
121
article thumbnail

SOC Analysts - Reimagining Their Role Using AI

The Hacker News

The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts (and sometimes IT teams who are doubling as SecOps) must try and triage thousands of security alertsoften false positivesjust to identify a handful of real threats. This relentless, 24/7 work leads to alert fatigue, desensitization, and increased risk of missing critical security incidents.

Risk 132
article thumbnail

Windows 11 users can soon access their iPhones from the Start menu

Zero Day

Already previewed for Android users, the new integration will let iPhone owners view phone calls, messages, battery status, and more without leaving the Start menu.

121
121
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter

The Hacker News

Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS score of 9.

article thumbnail

Top Threat Tactics and How to Address Them

Cisco Security

See the key takeaways for the most recent Cisco Talos Incident Response report and learn how you can use Cisco Security products to help defend against these.

113
113
article thumbnail

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

The Hacker News

Broadcom has released security updates to patch five security flaws impacting VMware Aria Operations and Aria Operations for Logs, warning customers that attackers could exploit them to gain elevated access or obtain sensitive information. The list of identified flaws, which impact versions 8.x of the software, is below - CVE-2025-22218 (CVSS score: 8.

Software 115
article thumbnail

Global Law Enforcement Shuts Down Two of the Largest Cybercrime Forums

SecureWorld News

In a coordinated international effort, law enforcement agencies from the United States, Europe, and Australia have dismantled Cracked and Nulled, two of the world's largest cybercrime marketplaces. These underground forumshome to more than 10 million usersfacilitated the trade of stolen data, hacking tools, and cybercrime-as-a-service, making these illicit activities more accessible than ever.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!