Mon.Jun 02, 2025

article thumbnail

Andor: Insider Threats

Adam Shostack

Andor teaches us about insider threats This post has spoilers for Season 2 of Andor, some lessons we can take for cybersecurity, and some thoughts on the writing process and drama. In Episode 10, we learn that Lonni has had Dedras access cert for a year, and in Episode 11, we learn about how hes been using it. We dont learn how he got it, but when questioned, Dedra denies having given it to him (and theres little reason to think she would have).

Risk 230
article thumbnail

Weekly Update 454

Troy Hunt

We're two weeks in from the launch of the new HIBP, and I'm still recovering. Like literally still recovering from the cold I had last week and the consequent backlog. A major launch like this isn't just something you fire and forget; instead, it takes weeks of tweaks and refinements to iron out all the little creases, both known and unpredictable.

232
232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia Requires Ransomware Victims to Declare Payments

Schneier on Security

A new Australian law requires larger companies to declare any ransomware payments they have made.

article thumbnail

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

The Hacker News

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Victims risk AsyncRAT infection after being redirected to fake Booking.com sites

Malwarebytes

Cybercriminals have started a campaign of redirecting links placed on gaming sites and social mediaand as sponsored adsthat lead to fake websites posing as Booking.com. According to Malwarebytes research , 40% of people book travel through a general online search, creating a lot of opportunities for scammers. The first signs of the campaign showed up mid-May and the final redirect destination changes every two to three days.

Risk 137
article thumbnail

Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

The Hacker News

Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below - CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.

131
131

LifeWorks

More Trending

article thumbnail

SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?

The Last Watchdog

As enterprise adoption of generative AI accelerates, security teams face a new identity dilemma not just more users and devices, but a growing swarm of non-human agents and autonomous systems requesting access to sensitive assets. Related: Top 10 Microsoft Copilot risks At the same time, traditional identity and access management (IAM) tools are buckling under the pressure of cloud sprawl, decentralized architectures, and constant change.

IoT 130
article thumbnail

Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN

The Hacker News

Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three flaws is as follows - CVE-2024-13915 (CVSS score: 6.9) - A pre-installed "com.pri.

article thumbnail

Police took down several popular counter-antivirus (CAV) services, including AvCheck

Security Affairs

On May 27, 2025, authorities seized crypting service sites (including AvCheck, Cryptor, and Crypt.guru) used by vxers to test malware evasion capabilities. An international law enforcement operation led by the U.S. Department of Justice has dismantled an online cybercrime syndicate that provided encryption services to help malware evade detection. On May 27, 2025, authorities seized four domains, including AvCheck[.]net, Cryptor[.]biz, and Crypt[.]guru.

Antivirus 113
article thumbnail

⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

The Hacker News

If this had been a security drill, someone wouldve said it went too far. But it wasnt a drillit was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen nowquiet, convincing, and fast. Defenders arent just chasing hackers anymoretheyre struggling to trust what their systems are telling them.

Malware 125
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

A cyberattack hit hospitals operated by Covenant Health

Security Affairs

A cyberattack hit three hospitals operated by Covenant Health, forcing them to shut down all systems to contain the incident. Three hospitals run by Covenant Health were hit by a cyberattack, prompting them to shut down all their systems to contain the security incident. “St. Marys is currently experiencing a temporary system issue that is affecting some phones and documentation systems.” reads the message published by the St.

article thumbnail

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

The Hacker News

Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies.

article thumbnail

Glitch Platform Abused: Phishing Campaigns Circumvent MFA and Target Credit Unions

Penetration Testing

Netskope reveals a surge in phishing on Glitch, abusing the platform to bypass MFA and steal credentials, mainly targeting Navy Federal Credit Union members.

Phishing 110
article thumbnail

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

The Hacker News

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated leveraging encryption, living-off-the-land techniques, and lateral movement to evade traditional defenses security teams are finding more threats wreaking havoc before they can be detected.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Global Crackdown: DoJ Seizes Crypting Services in Major Cybercrime Bust

Penetration Testing

The DOJ, with international partners, seized four domains providing crypting services to cybercriminals, hindering malware attacks in a global operation.

article thumbnail

How much energy does AI really use? The answer is surprising - and a little complicated

Zero Day

Does a ChatGPT prompt use a bottle of water? We break down all your AI energy and sustainability questions, complete with tips on how to use AI as responsibly as possible.

102
102
article thumbnail

Google Fights Back: Appeals Order to Sell Chrome Browser

Penetration Testing

Google appeals the DOJ order to divest its Chrome browser, calling it radical and harmful to consumers. OpenAI shows interest, while Mozilla warns of Firefox's end.

article thumbnail

A cyberattack hit hospitals operated by Covenant Health

Security Affairs

A cyberattack hit three hospitals operated by Covenant Health, forcing them to shut down all systems to contain the incident. Three hospitals run by Covenant Health were hit by a cyberattack, prompting them to shut down all their systems to contain the security incident. “St. Marys is currently experiencing a temporary system issue that is affecting some phones and documentation systems.” reads the message published by the St.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Samsung Eyes Perplexity AI for Galaxy S26, Less Google Reliance

Penetration Testing

Samsung is reportedly in talks with Perplexity.ai for a major investment and AI integration into the Galaxy S26, aiming to reduce reliance on Google.

article thumbnail

Roku TV acting up? This 30-second fix will make your system run like new again

Zero Day

Roku streamers cache data to load apps faster, but too much cached junk can slow them down. Fortunately, it only takes seconds to revitalize things.

98
article thumbnail

Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps

Security Boulevard

Sysdig today disclosed an example of how a tool for training artificial intelligence (AI) models was compromised by a cyberattack that led to the injection of malicious code and the downloading of cryptominers. The Sysdig Threat Research Team (TRT) discovered an attack aimed at a misconfigured instance of Open WebUI, a tool widely used by. The post Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps appeared first on Security Boulevard.

article thumbnail

Why I'm done with Firefox for good - and which browser I'm using instead

Zero Day

I've used practically every browser out there and keep coming back to Firefox-based browsers. But not anymore. Here's why I've had it with Mozilla.

95
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Gh0st in the Machine: ASEC Uncovers Cryptomining Campaign Exploiting Korean Internet Cafés

Penetration Testing

A sophisticated malware campaign targets Korean Internet cafs with Gh0st RAT and CoinMiner, hijacking systems for crypto mining. ASEC urges immediate action.

article thumbnail

I finally found a visually-pleasing Linux distro that doesn't skimp on performance

Zero Day

If you're looking for a new distribution that's as functional as it is beautiful, BlueStar Linux should be on your radar.

96
article thumbnail

Qualcomm Reveals Active Exploitation of Multiple Zero-Days in Adreno GPU

Penetration Testing

Qualcomm discloses critical zero-day vulnerabilities in Snapdragon chipsets, actively exploited in targeted attacks. Immediate patching is crucial for millions of devices.

article thumbnail

Which Roku streaming stick should you buy in 2025? I recommend only these models

Zero Day

The brand's latest Roku Streaming Sticks offer a familiar experience with a refreshed design. Here's how they performed in my home.

98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2025-4010: ONEKEY Uncovers Critical Remote Code Execution Flaw in Netcomm/Lantronix 4G Gateways

Penetration Testing

The post CVE-2025-4010: ONEKEY Uncovers Critical Remote Code Execution Flaw in Netcomm/Lantronix 4G Gateways appeared first on Daily CyberSecurity.

article thumbnail

Why I recommend this Lenovo tablet over competing models that cost twice the price

Zero Day

Lenovo's Legion Tab is a sleek eight-inch tablet with a top-tier processor, vivid 165Hz display, and host of intelligent design choices.

95
article thumbnail

Kaspersky Report Reveals Growing Threat from Old Exploits and OS Vulnerabilities in Q1 2025

Penetration Testing

Kaspersky's Q1 2025 report highlights a surge in attacks on aging systems, unpatched flaws, and mismanaged updates, urging vigilance and prompt action.

article thumbnail

Why I prefer this $549 Lenovo tablet over competing models that cost twice the price

Zero Day

Lenovo's Legion Tab is a sleek eight-inch tablet with a top-tier processor, vivid 165Hz display, and host of intelligent design choices.

95
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!