Wed.Feb 05, 2025

article thumbnail

On Generative AI Security

Schneier on Security

Microsoft’s AI Red Team just published “ Lessons from Red Teaming 100 Generative AI Products.” Their blog post lists “three takeaways,” but the eight lessons in the report itself are more useful: Understand what the system can do and where it is applied. You don’t have to compute gradients to break an AI system. AI red teaming is not safety benchmarking.

Risk 251
article thumbnail

Take my money: OCR crypto stealers in Google Play and App Store

SecureList

In March 2023, researchers at ESET discovered malware implants embedded into various messaging app mods. Some of these scanned users’ image galleries in search of crypto wallet access recovery phrases. The search employed an OCR model which selected images on the victim’s device to exfiltrate and send to the C2 server. The campaign, which targeted Android and Windows users, saw the malware spread through unofficial sources.

Malware 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DeepSeek AI Model Riddled With Security Vulnerabilities

Security Boulevard

Security researchers have uncovered serious vulnerabilities in DeepSeek-R1, the controversial Chinese large language model (LLM) that has drawn widespread attention for its advanced reasoning capabilities. The post DeepSeek AI Model Riddled With Security Vulnerabilities appeared first on Security Boulevard.

article thumbnail

International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

Security Affairs

The International Civil Aviation Organization (ICAO) is investigating a data breach affecting system and employee security. The International Civil Aviation Organization (ICAO) , a specialized agency of the United Nations, is investigating a significant data breach that has raised concerns about the security of its systems and employees data. In the updated statement published by ICAO, the agency said it is actively investigating reports of a potential information security incident allegedly lin

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

OpenText Secure Cloud: Streamline workflows with integrations

Webroot

Simplifying security management is an important step toward better protection without sacrificing operational efficiency. With the added capability of automating processes by integrating with popular tools, security management can also deliver streamlined workflows. OpenText Secure Cloud provides billing reconciliation by integrating with popular tools such as HaloPSA, ConnectWise PSA, AutoTask, and Kaseya BMS so you can automate many of the processes that would typically require manual input.

91
article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

The State of Cybersecurity in Canada 2025 report, published by the Canadian Cybersecurity Network (CCN) and the Security Architecture Podcast , delivers an in-depth analysis of the evolving threat landscape, emerging risks, and strategic recommendations for Canadian organizations. This year's report underscores the urgency of bolstering national cybersecurity resilience in response to escalating attacks, regulatory shifts, and a persistent talent gap.

InfoSec 77

LifeWorks

More Trending

article thumbnail

Small business owners, secure your web shop

Malwarebytes

An online shop is more than just another way to sell your products. It comes with a responsibility to keep the web shop secure. Cybercriminals are looking to steal your customers credit card details, their personal data, and even your revenue. And its not as if using a platform that is used by major retailers makes it safe. Platforms like Shopify, Wix, and Magento are always under scrutiny of cybercriminals that are looking for a vulnerability that allows them to insert skimmers or get access to

article thumbnail

Tenable Acquires Vulcan Cyber, Building on AI-Powered Risk Prioritization

Security Boulevard

Cybersecurity risk management company Tenable announced plans to acquire Vulcan Cyber for approximately $147 million in cash and $3 million in restricted stock units. The post Tenable Acquires Vulcan Cyber, Building on AI-Powered Risk Prioritization appeared first on Security Boulevard.

Risk 85
article thumbnail

U.S. CISA adds Linux kernel flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Linux kernel vulnerability, tracked as CVE-2024-53104 , to its Known Exploited Vulnerabilities (KEV) catalog. The February 2025 Android security updates addressed 48 vulnerabilities, the zero-day flaw CVE-2024-53104 which is actively exploited in attacks in the wild.

Media 72
article thumbnail

CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise

Tech Republic Security

CISA adds four new vulnerabilities to its catalog, urging agencies to remediate risks. Learn about the latest exploits and how they impact enterprise security.

Risk 187
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

SparkCat campaign target crypto wallets using OCR to steal recovery phrases

Security Affairs

In late 2024, Kaspersky experts discovered a malicious campaign, called SparkCat, spreading malware to target crypto wallets. In March 2023, ESET found malware in modified versions of messengers using OCR to scan the victim’s gallery for images with recovery phrases to restore access to crypto wallets. In late 2024, Kaspersky discovered a new malicious campaign, called SparkCat, where the attackers used similar tactics, but that targeted both Android and iOS users.

Malware 67
article thumbnail

21% of CISOs Have Been Pressured Not to Report a Compliance Issue, Research Finds

Tech Republic Security

CISOs face growing boardroom pressure, compliance challenges, and cyber threats. Discover key insights from Splunks latest report on cybersecurity leadership.

CISO 166
article thumbnail

Lazarus APT targets crypto wallets using cross-platform JavaScript stealer

Security Affairs

The North Korea-linked APT group Lazarus uses a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign. Bitdefender researchers reported that the North Korea-linked Lazarus group uses fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver a cross-platform JavaScript stealer to target crypto wallets in a new hacking campaign.

article thumbnail

How to Add Fingerprint Authentication to Your Windows 11 Computer

Tech Republic Security

Fingerprint sign-in on Windows 11 offers a secure, password-free login method. Set it up easily for faster, more convenient access to your device.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

U.S. CISA adds Microsoft.NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft.NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-45195 (CVSS score of 9.8) Apache OFBiz Forced Browsing Vulnerability CVE-2024-29059 (CVSS score of 7.5)Microsoft.NET Framework Information Dis

article thumbnail

Sandboxes Alone Won’t Stop the Malware Onslaught. Here’s What Will.

Security Boulevard

Rhode Island disclosed in December that a ransomware attack had resulted in a data breach of its RIBridges social services database, exposing personal data of about 650,000 residents that included Social Security numbers, dates of birth, and individual bank account numbers. The impact was enormous more than half of the states population was affected.

Malware 59
article thumbnail

DOGE Teen Owns ‘Tesla.Sexy LLC’ and Worked at Startup That Has Hired Convicted Hackers

WIRED Threat Level

Experts question whether Edward Coristine, a DOGE staffer who has gone by Big Balls online, would pass the background check typically required for access to sensitive US government systems.

article thumbnail

Take my money: OCR crypto stealers in Google Play and App Store

SecureList

Update 06.02.2025: Apple removed malicious apps from the App Store. In March 2023, researchers at ESET discovered malware implants embedded into various messaging app mods. Some of these scanned users’ image galleries in search of crypto wallet access recovery phrases. The search employed an OCR model which selected images on the victim’s device to exfiltrate and send to the C2 server.

Malware 135
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Collapse of USAID Is Already Fueling Human Trafficking and Slavery at Scammer Compounds

WIRED Threat Level

The dismantling of USAID by Elon Musk's DOGE and a State Department funding freeze have severely disrupted efforts to help people escape forced labor camps run by criminal scammers.

Hacking 138
article thumbnail

Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc

The Hacker News

Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible devices. The vulnerabilities are listed below - CVE-2025-20124 (CVSS score: 9.

article thumbnail

This $129 Android phone reminded me of my Google Pixel 9 Pro in the best way

Zero Day

The NUU N30 may not impress with its specs, but it holds up as a reliable daily driver.

116
116
article thumbnail

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack

The Hacker News

Veeam has released patches to address a critical security flaw impacting its Backup software that could allow an attacker to execute arbitrary code on susceptible systems. The vulnerability, tracked as CVE-2025-23114, carries a CVSS score of 9.0 out of 10.0.

Backups 112
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why Mark Zuckerberg wants to redefine open source so badly

Zero Day

For these open source experts, it's all about standards. For Meta, it's all about the money.

110
110
article thumbnail

North Korean-Linked Malware ‘FlexibleFerret’ Expands macOS Attack Surface

Penetration Testing

Cybersecurity researchers at SentinelOne have uncovered new macOS malware variants attributed to North Korean threat actors, expanding upon The post North Korean-Linked Malware ‘FlexibleFerret’ Expands macOS Attack Surface appeared first on Cybersecurity News.

Malware 107
article thumbnail

ChatGPT's Deep Research just identified 20 jobs it will replace. Is yours on the list?

Zero Day

After researching 24 sources in seven minutes, ChatGPT came up with the top jobs that might be on the chopping block.

110
110
article thumbnail

Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign

The Hacker News

The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver malware capable of infecting Windows, macOS, and Linux operating systems.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Too many tabs? Try these browsers with better tab management than Chrome

Zero Day

Stop wasting time searching for tabs every day. These four browsers with the best built-in tab management features can help.

107
107
article thumbnail

Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks

The Hacker News

A previously undocumented threat actor known as Silent Lynx has been linked to cyber attacks targeting various entities in Kyrgyzstan and Turkmenistan.

article thumbnail

5 great Chrome-like browsers that put your privacy first

Zero Day

Chrome isn't the most secure browser on the market and with the continued rise of malicious attacks, you should consider one of these Chrome-based alternatives

Marketing 106
article thumbnail

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

The Hacker News

Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365 environments. Enterprise security company Proofpoint said it observed campaigns using HTTP clients Axios and Node Fetch to send HTTP requests and receive HTTP responses from web servers with the goal of conducting ATO attacks.

Passwords 103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!