Mon.Dec 30, 2024

article thumbnail

Cisco states that the second data leak is linked to the one from October

Security Affairs

Cisco confirmed the authenticity of the 4GB of leaked data, the data was compromised in a recent security breach, marking the second leak in the incident. Cisco confirmed the authenticity of the 4GB of leaked data, which was compromised in a recent security breach, marking it as the second leak in the incident. “We are aware of some recent social media posts made by the actor.

article thumbnail

Is nowhere safe from AI slop? (Lock and Code S05E27)

Malwarebytes

This week on the Lock and Code podcast… You can see it on X. You can see on Instagram. It’s flooding community pages on Facebook and filling up channels on YouTube. It’s called “AI slop” and it’s the fastest, laziest way to drive engagement. Like “click bait” before it (“You won’t believe what happens next,” reads the trickster headline), AI slop can be understood as the latest online tactic in getting eyeballs, clicks, shares, co

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: SquareX exposes OAuth attack on Chrome extensions — days before a major breach

The Last Watchdog

Palo Alto, Calif., Dec. 30, 2024, CyberNewswire — SquareX , an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported large-scale attacks targeting Chrome Extension developers aimed at taking over the Chrome Extension from the Chrome Store. On December 25th, 2024, a malicious version of Cyberhavens browser extension was published on the Chrome Store that allowed the attacker to hijack authenticated sessions and ex

Phishing 130
article thumbnail

An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip’s creator says is a fake

Security Affairs

An X user using the handle @NSA_Employee39 disclosed a zero-day vulnerability in the open-source file archive software 7-Zip. A verified X account, @NSA_Employee39, claimed to disclose a zero-day vulnerability in the open-source file archive software 7-Zip. The X user announced it would be dropping 0days all this week, starting with an arbitrary code execution vulnerability in the open-source software 7-Zip.

Software 133
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Critical Actions Post Data Breach

SecureWorld News

Recent cybersecurity statistics indicate that data breaches are escalating into a significant international concern. This underscores the need not only for strong preventive measures to protect critical information but also for a well-defined strategy to contain the damage if attackers successfully breach your defenses. A robust incident response plan is crucial for mitigating the fallout from a data breach.

article thumbnail

Best of 2024: 30,000 Dealerships Down — ‘Ransomware’ Outage Outrage no. 2 at CDK Global

Security Boulevard

Spend more on security! Car and truck dealers fall back on pen and paper as huge SaaS provider gets hacked (again). The post Best of 2024: 30,000 Dealerships Down Ransomware Outage Outrage no. 2 at CDK Global appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Security Boulevard

In December 2023, as cyberattacks surged, the U.S. Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. This pushed C-level executives and boards to adopt measures for compliance and transparency. In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance.

article thumbnail

Windows 11 Media Update Bug Stops Security Updates

Tech Republic Security

Microsoft advises users not to install recent security updates using physical media. The company is working on a fix.

Media 190
article thumbnail

Threat actors attempt to exploit a flaw in Four-Faith routers

Security Affairs

VulnCheck researchers warn that threat actors are attempting to exploit a high-severity vulnerability impacting some Four-Faith routers. Cybersecurity firm VulnCheck warns that a high-severity flaw, tracked as CVE-2024-12856 (CVSS score: 7.2), in Four-Faith routers is actively exploited in the wild. The vulnerability is an operating system (OS) command injection vulnerability that impacts Four-Faith router models F3x24 and F3x36. “At least firmware version 2.0 allows authenticated and remo

article thumbnail

VyprVPN Review (2025): Can It Still Perform This Year and Beyond?

Tech Republic Security

VyprVPN is known for strong performance with top-notch security and speed. Discover if it remains a reliable choice for privacy and streaming this year and beyond.

VPN 172
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

The Hacker News

The United States Treasury Department said it suffered a "major cybersecurity incident" that allowed suspected Chinese threat actors to remotely access some computers and unclassified documents.

Software 142
article thumbnail

AI agents might be the new workforce, but they still need a manager

Zero Day

AI agents keep getting smarter and more independent. But there is still work to be done before an agentic AI-driven workforce can truly assume a broad range of tasks.

140
140
article thumbnail

US Treasury Department Admits It Got Hacked by China

WIRED Threat Level

Treasury says hackers accessed certain unclassified documents in a major breach, but experts believe the attacks impacts could prove to be more significant as new details emerge.

Hacking 139
article thumbnail

Cybersecurity Resolutions for 2025: Prepare Your Business for What’s Ahead

Security Boulevard

Cybersecurity Resolutions for 2025: Prepare Your Business for Whats Ahead Cybersecurity Resolutions for 2025: Prepare Your Business for Whats Ahead As we approach the new year, its time to reflect on the cybersecurity challenges of 2024 and prepare for what lies ahead. The digital landscape continues to evolve, with cyber threats becoming more sophisticated and [] The post Cybersecurity Resolutions for 2025: Prepare Your Business for Whats Ahead appeared first on Cyber security services provider

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation

The Hacker News

Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory Apache Airflow integration that, if successfully exploited, could have allowed an attacker to gain the ability to conduct various covert actions, including data exfiltration and malware deployment.

Malware 135
article thumbnail

6 reasons why Google should switch Chromebooks from Android to Linux

Zero Day

By now, you've probably heard that Google plans to migrate Chromebooks to Android, but I believe there's a much better option that's already proven itself.

130
130
article thumbnail

New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits

The Hacker News

The United States Department of Health and Human Services' (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements for healthcare organizations with an aim to safeguard patients' data against potential cyber attacks.

Insurance 134
article thumbnail

How MXDR Services Solve Cyber Talent Shortages

Heimadal Security

The cybersecurity industry faces an unprecedented talent shortage. In this article, we’ll explore the implications of this shortage and how MXDR services can bridge the gap. The shortage in cybersecurity expertise presents a significant challenge, affecting various sectors, from businesses to national security. Some notable instances include: Supply Chains: The June 2023 MOVEit Transfer breach […] The post How MXDR Services Solve Cyber Talent Shortages appeared first on Heimdal Secur

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The latest MX Linux turns Xfce into a desktop anyone can use

Zero Day

If you're looking for a Linux distribution with a user-friendly desktop that's also very highly customizable, MX Linux presents the Xfce desktop in a way that anyone can use and grow with over time.

122
122
article thumbnail

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

The Hacker News

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials.

118
118
article thumbnail

How to add alt text to images on Bluesky (and why you should)

Zero Day

Alt text is far more important than you might think, and Bluesky makes it fairly easy for you to add it to images you post.

122
122
article thumbnail

LineageOS 22.1 Blasts Off: A New Era of Customization with Android 15!

Penetration Testing

The LineageOS team has smashed expectations with a lightning-fast release of LineageOS 22.1, based on Android 15 QPR1. Thanks to a surge in passionate contributors and new project leaders, the... The post LineageOS 22.1 Blasts Off: A New Era of Customization with Android 15! appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The 4 most Windows-like Linux distros to try because change is hard

Zero Day

If you're still using Windows 10, you know the end is nigh. If you want to keep your machine running smoothly and feeling familiar, check out these Linux distros.

119
119
article thumbnail

Stealthy UEFI Bootkit Targets Windows Kernel, Raising Security Concerns

Penetration Testing

Security researchers NSG650 and Pdawg have unveiled a proof-of-concept UEFI bootkit that exploits a critical firmware function to compromise the Windows kernel during the boot process. This bootkit demonstrates the... The post Stealthy UEFI Bootkit Targets Windows Kernel, Raising Security Concerns appeared first on Cybersecurity News.

article thumbnail

New Windows 11 24H2 bug could block future security updates - see who's affected

Zero Day

Installing the Windows 11 2024 version via a CD or flash drive may cause it to reject any future updates.

108
108
article thumbnail

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

The Hacker News

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it's a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting yourself and your organization.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

5 alternative browsers that might just replace Safari on your Mac

Zero Day

Although Safari is a competent browser, there are better alternatives available. Let's look at five hidden gems I've tried and recommend -- but you might not have heard about them until now.

105
105
article thumbnail

Treasury Department Hit by Major Cybersecurity Incident, China Suspected

Penetration Testing

The U.S. Department of the Treasury has disclosed a major cybersecurity incident, potentially compromising sensitive government information. In a letter to the Senate Committee on Banking, Housing, and Urban Affairs,... The post Treasury Department Hit by Major Cybersecurity Incident, China Suspected appeared first on Cybersecurity News.

article thumbnail

This low-cost Lenovo gaming PC is the one I recommend to most people. Let me tell you why

Zero Day

The Lenovo LOQ Tower 17IRR9 is a solid little machine capable of easily handling most workloads. And the best part is that it's inexpensive.

98
article thumbnail

LLMs Crack the Code: 95% Success Rate in Hacking Challenge

Penetration Testing

A recent study demonstrates the transformative potential of large language models (LLMs) in offensive cybersecurity tasks. Researchers Rustem Turtayev, Artem Petrov, Dmitrii Volkov, and Denis Volk have achieved a record-breaking... The post LLMs Crack the Code: 95% Success Rate in Hacking Challenge appeared first on Cybersecurity News.

Hacking 76
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!