Fri.May 02, 2025

article thumbnail

NCSC Guidance on “Advanced Cryptography”

Schneier on Security

The UK’s National Cyber Security Centre just released its white paper on “Advanced Cryptography,” which it defines as “cryptographic techniques for processing encrypted data, providing enhanced functionality over and above that provided by traditional cryptography.” It includes things like homomorphic encryption, attribute-based encryption, zero-knowledge proofs, and secure multiparty computation.

article thumbnail

TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

The Hacker News

Ireland's Data Protection Commission (DPC) on Tuesday fined popular video-sharing platform TikTok 530 million ($601 million) for infringing data protection regulations in the region by transferring European users' data to China. "TikTok infringed the GDPR regarding its transfers of EEA [European Economic Area] User Data to China and its transparency requirements," the DPC said in a statement.

140
140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy for Agentic AI

Schneier on Security

Sooner or later, it’s going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think it’s worth thinking about the security of that now, while its still a nascent idea. In 2019, I joined Inrupt, a company that is commercializing Tim Berners-Lee’s open protocol for distributed data ownership.

article thumbnail

The Empire’s Threat Modeling

Adam Shostack

Get one fourth off for May the fourth! In Andor, Imperial Security Bureau supervisor Dedra Meero spends a lot of time thinking about how shed steal highly sensitive Imperial hardware and explaining how shed never climb the same fence twice. But her analyses dont convince her fellow ISB officers. Trying to get into your opponents head is tricky. but frankly, the problem is: For the show to work, she has to lose.

147
147
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Luxury department store Harrods suffered a cyberattack

Security Affairs

Harrods confirmed a cyberattack, following similar incidents suffered by M&S and Co-op, making it the third major UK retailer targeted in one week. Luxury department store Harrods confirmed a cyberattack, threat actors attempted to gain unauthorised access to some of its systems. “We recently experienced attempts to gain unauthorised access to some of our systems.” reads a statement published by the company. “Our seasoned IT security team immediately took proactive steps to

Retail 116
article thumbnail

Weekly Update 450

Troy Hunt

Looking back at this week's video, it's the AI discussion that I think about most. More specifically, the view amongst some that any usage of it is bad and every output is "slop" I'm hearing that much more broadly lately, that AI is both "robbing" creators and producing sub-par results. The latter is certainly true in many cases (although it's improving extraordinarily quickly), but the former is just ridiculous when used as a reason not to use AI.

Phishing 155

LifeWorks

More Trending

article thumbnail

Healthcare Cybersecurity Market Soars: Key Trends and Insights

SecureWorld News

Healthcare cybersecurity is undergoing explosive growth, reflecting both escalating threats and urgent investments to protect patient data and systems. According to a new report, the global healthcare cybersecurity market was valued at US $21.25 billion in 2024 and is projected to reach $82.90 billion by 2033, at a robust 18.55% CAGR. This surge is driven by a convergence of factorsfrom a spike in ransom ware attacks to the digital transformation of healthcarethat CISOs and healthcare executives

article thumbnail

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

The Hacker News

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell scripts," Recorded Future's Insikt Group said in a report shared with The Hacker News.

Phishing 102
article thumbnail

Mike Waltz Has Somehow Gotten Even Worse at Using Signal

WIRED Threat Level

A photo taken this week showed Mike Waltz using an app that looks likebut is notSignal to communicate with top officials. "I don't even know where to start with this," says one expert.

117
117
article thumbnail

On world password day, Microsoft says fewer passwords, more passkeys

Malwarebytes

And we agree. If there is a cybersecurity themed day that we would like to get rid as soon as possible its world password day. Sorry, old friend, but youre outdated, and it looks like your days are numbered. Let’s switch to passkeys. To quote Microsoft : As the world shifts from passwords to passkeys, were excited to join the FIDO Alliance in leaving World Password Day behind to celebrate the very first World Passkey Day.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

This 2K video doorbell gave me similar features as a Ring but with no subscription fees

Zero Day

The Lorex 2K video doorbell ditches subscription fees thanks to local storage and gives you the flexibility of both wired and wireless setup options.

article thumbnail

The Cloud Illusion: Why Your Database Security Might Be at Risk

Security Boulevard

With the right cloud database architecture, you gain versatility as well as optimal security. The post The Cloud Illusion: Why Your Database Security Might Be at Risk appeared first on Security Boulevard.

Risk 99
article thumbnail

Want better AI images? I tried Midjourney 7 and it blew me away - here's why

Zero Day

The new Midjourney 7 is hands-down one of the best image-generation models currently available. Here's how to get the best results.

86
article thumbnail

Microsoft Authenticator to Drop Password Manager Features by August 2025

Penetration Testing

In 2020, Microsoft updated its Authenticator app to introduce password-saving and autofill capabilities, effectively transforming Microsoft Authenticator into The post Microsoft Authenticator to Drop Password Manager Features by August 2025 appeared first on Daily CyberSecurity.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

I replaced my iPad with this cheap Android 15 tablet, and it surprisingly held up

Zero Day

The Blackview Mega 2 features a large screen, long battery life, and dependable performance, making it an excellent fit for those on a budget.

106
106
article thumbnail

Privacy for Agentic AI

Security Boulevard

Sooner or later, its going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think its worth thinking about the security of that now, while its still a nascent idea. In 2019, I joined Inrupt, a company that is commercializing Tim Berners-Lees open protocol for distributed data ownership. We are working on a digital wallet that can make use of AI in this way.

article thumbnail

This portable laptop accessory solved my biggest problem with working from home

Zero Day

Moft's Sit-Stand Laptop Desk is a portable solution that gives remote workers - whether on the go or tight on space - a flexible way to enjoy a standing desk setup.

83
article thumbnail

Ireland’s DPC fined TikTok €530M for sending EU user data to China

Security Affairs

Ireland’s Data Protection Commission (DPC) fined TikTok 530M for violating data rules by sending European user data to China. Ireland’s Data Protection Commission (DPC) fined the popular video-sharing platform TikTok 530 million for violating data laws by transferring data belonging to European users to China. TikTok violated GDPR by transferring EEA user data to China and lacking transparency.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Ready for AI-enhanced credit cards? Here's Visa's vision of automated shopping

Zero Day

Imagine AI agents finding and ordering products for you. With this latest Visa announcement, that future just got a little closer.

86
article thumbnail

Apple Revises U.S. App Store Rules After Court Ruling in Epic Games Case

Penetration Testing

Following a court ruling that found Apple had willfully violated antitrust regulationsand the subsequent approval of Epic Games The post Apple Revises U.S. App Store Rules After Court Ruling in Epic Games Case appeared first on Daily CyberSecurity.

article thumbnail

This portable laptop accessory helped me finally achieve my daily standing goals during the workday

Zero Day

Moft's Sit-stand Laptop Desk is a portable laptop stand that allows traveling workers or at-home employees with limited space to have a modified standing desk experience.

80
article thumbnail

Microsoft Pushes Passwordless: New Accounts Default to Passkeys & MFA

Penetration Testing

Microsoft is currently encouraging users to transition from traditional passwords to more secure authentication methods, such as passkeys The post Microsoft Pushes Passwordless: New Accounts Default to Passkeys & MFA appeared first on Daily CyberSecurity.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to analyze your entire Amazon library with ChatGPT - and what you can learn

Zero Day

Here's how I used AI to analyze my massive Kindle book collection - and the surprising mysteries it revealed.

91
article thumbnail

Microsoft sets all new accounts passwordless by default

Security Affairs

Microsoft announced that all new accounts will be “passwordless by default” to increase their level of security. Microsoft now makes all new accounts “passwordless by default,” enhancing protection against social engineering attacks, phishing, brute-force, and credential stuffing attacks. “As part of this simplified UX, were changing the default behavior for new accounts.

article thumbnail

NotebookLM apps are coming soon to Android and iOS - how to be first in line

Zero Day

Google's NotebookLM mobile app listings are now live. Expect to hear more about them at I/O 2025 on May 20.

Mobile 81
article thumbnail

How to Automate CVE and Vulnerability Advisory Response with Tines

The Hacker News

Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community - all free to import and deploy through the platforms Community Edition.

81
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

5 free AI tools for school that students can use for finals

Zero Day

These AI tools can summarize PDFs, tutor you, help with essay writing and math problems, and much more.

81
article thumbnail

U.S. CISA adds SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SMA100 and Apache HTTP Server flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server flaws to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

Redis returns to open source with AGPLv3 license but not everyone is happy

Zero Day

Redis leadership asserts that the AGPLv3 license strikes the right balance between protecting the company's business interests and supporting the open-source community. We'll see if developers and customers agree.

79
article thumbnail

Treasury Moves to Ban Huione Group for Laundering $4 Billion

Security Boulevard

The Treasury Department is moving to cut off Huione Group, a Cambodian conglomerate, from the U.S. financial system, saying the firm and its multiple entities laundered billions of dollars for North Korea's Lazarus Group and criminal gangs running pig-butchering scams from Southeast Asia. The post Treasury Moves to Ban Huione Group for Laundering $4 Billion appeared first on Security Boulevard.

Scams 71
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!