Wed.Dec 18, 2024

article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. Part four of our four-part series From cybersecurity skills shortages to the pressures of hybrid work, the challenges facing organizations are at an all-time high. Experts here explore the importance of fostering a resilient workforce, backed by AI-enhanced training and layered security strategies.

Risk 173
article thumbnail

The Mask APT is back after 10 years of silence

Security Affairs

Kaspersky researchers linked a new wave of cyber attacks to the cyber espionage group tracked as The Mask. Kaspersky researchers linked several targeted attacks to a cyber espionage group known as The Mask. The APT group targeted an organization in Latin America in 2019 and 2022. Threat actors accessed an MDaemon email server and used its WorldClient webmail component to maintain persistence within the compromised organization. “The persistence method used by the threat actor was based on

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

The Last Watchdog

Today, part three of Last Watchdog s year-end roundtable zeroes in on the regulatory and compliance landscape. Part three of a four-part series In 2024, global pressure on companies to implement advanced data protection measures intensified, with new standards in encryption and software transparency raising the bar. From the push for quantum-resilient cryptography to Software Bill of Material (SBOM ) requirements aimed at bolstering supply chain security, this installment examines the regulatory

article thumbnail

Irish Data Protection Commission (DPC) fined Meta €251 million for a 2018 data breach

Security Affairs

Meta has been fined 251M ($263M) for a 2018 data breach affecting millions in the EU, marking another penalty for violating privacy laws. The Irish Data Protection Commission (DPC) fined Meta 251 million ($263M) for a 2018 data breach impacting 29 million Facebook accounts. “The Irish Data Protection Commission (DPC) has today announced its final decisions following two inquiries into Meta Platforms Ireland Limited (MPIL).

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Ground Rule of Cyber Hygiene: Keep Your Password Policy Up to Date

Security Boulevard

Since the earliest incidents of computer break-ins, experts have maintained that making the internet a safe place is going to be an uphill battle. Their reasons, while largely technical, also encompass human complacency. Research shows that most organizations and users fail to follow the simple practices that make computing safe. In 2024, organizations reported a.

Passwords 116
article thumbnail

New Advances in the Understanding of Prime Numbers

Schneier on Security

Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based public-key algorithms, but every little bit matters.

268
268

LifeWorks

More Trending

article thumbnail

Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677

Security Affairs

Researchers warn that threat actors are attempting to exploit a recently disclosed Apache Struts vulnerability CVE-2024-53677. Researchers warn that threat actors are attempting to exploit the vulnerability CVE-2024-53677 (CVSS score of 9.5) in Apache Struts. A remote attacker could exploit this vulnerability to upload malicious files, potentially leading to arbitrary code execution. “An attacker can manipulate file upload params to enable paths traversal and under some circumstances this

Hacking 80
article thumbnail

4 Ways To Unleash Speed and Efficiency in the SOC

Security Boulevard

With the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. The post 4 Ways To Unleash Speed and Efficiency in the SOC appeared first on Security Boulevard.

article thumbnail

CVE-2024-12356 (CVSS 9.8): Critical Vulnerability in BeyondTrust PRA and RS Enables Remote Code Execution

Penetration Testing

A critical command injection vulnerability (CVE-2024-12356) has been discovered in BeyondTrusts Privileged Remote Access (PRA) and Remote Support (RS) solutions. With a CVSS score of 9.8, this flaw represents a... The post CVE-2024-12356 (CVSS 9.8): Critical Vulnerability in BeyondTrust PRA and RS Enables Remote Code Execution appeared first on Cybersecurity News.

article thumbnail

5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year

Security Boulevard

A CLM policy also puts you in the best position to mitigate and prevent cyberthreats, including man-in-the-middle attacks and phishing scams. The post 5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year appeared first on Security Boulevard.

Scams 101
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Data Exfiltration and RCE Risks Found in Azure Data Factory’s Airflow Integration

Penetration Testing

Unit 42 researchers have uncovered multiple vulnerabilities in Azure Data Factorys managed Apache Airflow integration, potentially enabling attackers to achieve shadow administrator control, data exfiltration, and remote code execution. Apache... The post Data Exfiltration and RCE Risks Found in Azure Data Factory’s Airflow Integration appeared first on Cybersecurity News.

Risk 62
article thumbnail

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

Security Boulevard

Today, part three of Last Watchdog s year-end roundtable zeroes in on the regulatory and compliance landscape. Part three of a four-part series In 2024, global pressure on companies to implement advanced data protection measures intensified, with new standards in (more) The post LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold first appeared on The Last Watchdog.

article thumbnail

RisePro and PrivateLoader Threat Actors Strike Again with RiseLoader

Penetration Testing

Zscaler ThreatLabz has identified a new malware family, RiseLoader, which specializes in downloading and executing second-stage payloads. Sharing similarities with RisePro, this loader appears to be the work of the... The post RisePro and PrivateLoader Threat Actors Strike Again with RiseLoader appeared first on Cybersecurity News.

Malware 62
article thumbnail

The open-source tools that could disrupt the entire IT incident management market

Zero Day

Open-source tools like Grafana Labs and AI-driven AIOps are shaking up incident management, challenging PagerDuty and streamlining IT problem-solving and code fixes. Here's why it matters.

Marketing 124
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Understanding Virtual Skimmers: A Threat to E-Commerce Security 

Security Boulevard

Virtual skimmers exploit vulnerabilities in websites that process payments online, often without leaving a trace until its too late. The post Understanding Virtual Skimmers: A Threat to E-Commerce Security appeared first on Security Boulevard.

eCommerce 118
article thumbnail

This agentic AI platform claims to speed development from 'months to days'

Zero Day

Blitzy claims its agents can optimize any model for reasoning, all while eliminating errors.

article thumbnail

Python-Based NodeStealer Version Targets Facebook Ads Manager

Trend Micro

In this blog entry, Trend Micros Managed XDR team discuss their investigation into how the latest variant of NodeStealer is delivered through spear-phishing attacks, potentially leading to malware execution, data theft, and the exfiltration of sensitive information via Telegram.

Phishing 115
article thumbnail

The top mobile AI features that Apple and Samsung owners actually use

Zero Day

And why some users are avoiding the latest AI features on their phones.

Mobile 116
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

The Hacker News

The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.

article thumbnail

This hidden Apple feature turns your iPhone or iPad into an AI image generator

Zero Day

With Image Playground, you can generate images based on themes and other concepts, your own descriptions, and photos from your device's library.

116
116
article thumbnail

INTERPOL Pushes for "Romance Baiting" to Replace "Pig Butchering" in Scam Discourse

The Hacker News

INTERPOL is calling for a linguistic shift that aims to put to an end to the term "pig butchering," instead advocating for the use of "romance baiting" to refer to online scams where victims are duped into investing in bogus cryptocurrency schemes under the pretext of a romantic relationship.

Scams 111
article thumbnail

The 4 easiest ways to test Linux on your old PC before Windows 10 support runs out

Zero Day

If you're considering a migration from the soon sunsetting Windows 10 to Linux and you're looking for a way to test the open-source operating system, here are four options.

111
111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite

Security Boulevard

By staying attuned to trends, C-suite leaders can drive security strategies that not only protect but also empower the business to thrive. The post 2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite appeared first on Security Boulevard.

article thumbnail

HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft

The Hacker News

Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim to harvest account credentials and take control of the victims' Microsoft Azure cloud infrastructure. The campaign has been codenamed HubPhish by Palo Alto Networks Unit 42 owing to the abuse of HubSpot tools in the attack chain.

Phishing 107
article thumbnail

The Biggest Risks of AI Apps, Agents and Copilots – and How to Combat Them

Security Boulevard

Remember, there is no free lunch with AI. The upsides are tremendous, but security cannot be an afterthought. The post The Biggest Risks of AI Apps, Agents and Copilots and How to Combat Them appeared first on Security Boulevard.

Risk 106
article thumbnail

Using Windows 11? Change these 4 settings to keep your PC running smoothly

Zero Day

If you're having trouble with Windows 11, consult this short list of the four best things you can do to enhance your PC's performance.

105
105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products

The Hacker News

BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and Remote Support (RS) products that could potentially lead to the execution of arbitrary commands. Privileged Remote Access controls, manages, and audits privileged accounts and credentials, offering zero trust access to on-premises and cloud resources by internal, external, and third-party users.

article thumbnail

Acumen Threat Analysis: Preparing for 2025 

Security Boulevard

Phishing continues to be the threat vector of choice for adversaries, ransomware continues to deliver the desired financial and destructive results for attackers, while organizations, both public and private, are growing increasingly concerned about the risks posed by insiders. The post Acumen Threat Analysis: Preparing for 2025 appeared first on Security Boulevard.

Phishing 104
article thumbnail

High-Severity Vulnerabilities Fixed in Latest Chrome Release

Penetration Testing

Google has released a crucial update for its Chrome browser, addressing five security vulnerabilities, several of which are rated as “High” severity. Users are strongly urged to update to the... The post High-Severity Vulnerabilities Fixed in Latest Chrome Release appeared first on Cybersecurity News.

article thumbnail

FedRAMP ATO Boosts Zero Trust for Federal Agencies

Trend Micro

Trend Vision One for Government has obtained a FedRAMP Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trends platform to rapidly stop adversaries and control their cybersecurity risk posture.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!