Tue.Nov 26, 2024

article thumbnail

What Graykey Can and Can’t Unlock

Schneier on Security

This is from 404 Media : The Graykey, a phone unlocking and forensics tool that is used by law enforcement around the world, is only able to retrieve partial data from all modern iPhones that run iOS 18 or iOS 18.0.1, which are two recently released versions of Apple’s mobile operating system, according to documents describing the tool’s capabilities in granular detail obtained by 404 Media.

Media 229
article thumbnail

macOS Vulnerability (CVE-2023-32428) Grants Root Access, PoC Published

Penetration Testing

Security researcher Gergely Kalman has detailed a high-severity vulnerability in Apple’s MallocStackLogging framework that could allow attackers to gain local privilege escalation (LPE) on macOS systems. The flaw, designated CVE-2023-32428... The post macOS Vulnerability (CVE-2023-32428) Grants Root Access, PoC Published appeared first on Cybersecurity News.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australia Passes Groundbreaking Cyber Security Law to Boost Resilience

Tech Republic Security

Australia's landmark Cyber Security Act has been passed, setting new standards for incident reporting, ransomware payments, and critical infrastructure protection.

article thumbnail

The source code of Banshee Stealer leaked online

Security Affairs

Banshee Stealer, a MacOS Malware-as-a-Service, shut down after its source code leaked online. The code is now available on GitHub. In August 2024, Russian hackers promoted BANSHEE Stealer, a macOS malware targeting x86_64 and ARM64, capable of stealing browser data, crypto wallets, and more. BANSHEE Stealer supports basic evasion techniques, relies on the sysctl API to detect debugging and checks for virtualization by running a command to see if “Virtual” appears in the hardware model identifier

Malware 129
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

The Hacker News

The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security flaws, one in Mozilla Firefox and the other in Microsoft Windows, as part of attacks designed to deliver the eponymous backdoor on victim systems.

143
143
article thumbnail

Emergency Vehicle Lights Can Screw Up a Car's Automated Driving System

WIRED Threat Level

Newly published research finds that the flashing lights on police cruisers and ambulances can cause “digital epileptic seizures” in image-based automated driving systems, potentially risking wrecks.

Risk 121

More Trending

article thumbnail

U.S. CISA adds Array Networks AG and vxAG ArrayOS flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Array Networks AG and vxAG ArrayOS flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Array Networks AG and vxAG ArrayOS flaw CVE-2023-28461 (CVSS score: 9.8) to its Known Exploited Vulnerabilities (KEV) catalog.

VPN 105
article thumbnail

INTERPOL Busts African Cybercrime: 1,006 Arrests, 134,089 Malicious Networks Dismantled

The Hacker News

An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089 malicious infrastructures and networks as part of a coordinated effort to disrupt cybercrime in the continent.

article thumbnail

Software firm Blue Yonder providing services to US and UK stores, including Starbucks, hit by ransomware attack

Security Affairs

Blue Yonder, a supply chain software provider, suffered a ransomware attack, impacting operations for clients like Starbucks and grocery stores. A ransomware attack on Blue Yonder disrupted operations for several customers, including Starbucks and U.K. grocery chain Sainsbury. “A ransomware attack has disrupted a third-party software system that Starbucks uses to track and manage its baristas’ schedules, forcing the coffee chain to shift to manual mode to ensure its employees get paid pro

Software 110
article thumbnail

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

The Hacker News

Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0.

Firewall 116
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AWS re:Invent 2024: Optimize Your Kubernetes with Fairwinds and NetApp

Security Boulevard

AWS re:Invent 2024 is next week, right after a late Thanksgiving when we’re kicking off the last few weeks of a busy year. For many organizations, now is the time to review costs and plan budgets. For many, that means taking a hard look at cloud spend and thinking about how to optimize it. If you’re using Kubernetes and thinking about how to make sure your infrastructure is optimized and you're attending re:Invent, come by the NetApp booth to learn how Spot by NetApp helps you control costs and

107
107
article thumbnail

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

The Hacker News

A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations in Internet of Things (IoT) devices to co-opt them into a disruptive botnet.

IoT 113
article thumbnail

I tested 9 AI content detectors - and these 2 correctly identified AI text every time

Zero Day

Two of the seven AI detectors I tested correctly identified AI-generated content 100% of the time. This is up from zero during my early rounds, but down from my last round of tests.

102
102
article thumbnail

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

The Hacker News

The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part of its attacks targeting Southeast Asian telecommunications companies.

Hacking 106
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Video: Cybersecurity Tips for Small Businesses

eSecurity Planet

Are you doing enough to protect your small business from hackers? In this video, our expert explores common cyber threats and shares actionable cybersecurity tips to safeguard your small business, from securing your network to keeping your software up to date. Read more: Complete Guide to Cybersecurity for Small Businesses The post Video: Cybersecurity Tips for Small Businesses appeared first on eSecurity Planet.

article thumbnail

Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

The Hacker News

When CVEs go viral, separating critical vulnerabilities from the noise is essential to protecting your organization. That’s why Intruder, a leader in attack surface management, built Intel - a free vulnerability intelligence platform designed to help you act fast and prioritize real threats. What is Intel?

97
article thumbnail

The Different Facets of MSP Security

CompTIA on Cybersecurity

The biggest challenge many MSPs must overcome is simply surviving the current business climate.

91
article thumbnail

Human-AI Teaming in the Age of Collaborative Intelligence

SecureWorld News

This article explores the evolving landscape of human-AI teaming, focusing on its transformative impact, adaptive intelligence in mixed-reality environments, collective intelligence, transparency challenges, and the transition toward collaboration. Introduction to human-AI teaming (understanding the shift, key concepts, and examples of collaborative intelligence) Expanding the definition of collaboration (moving beyond traditional AI roles, emphasizing real-time adaptability and dynamic role cha

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Most companies will increase IT spending in 2025. But there's a twist in the tale

Zero Day

Nearly two-thirds of companies plan to boost their IT budgets next year. Yet cost-saving measures are also on the agenda.

89
article thumbnail

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

Cisco Security

Cisco has integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance.

89
article thumbnail

5 things successful managers do to earn respect and build trust

Zero Day

You can't manage your staff well if you're not respected, and the path to respect is paved with humble stones. Five business leaders explain how to lead with humility.

89
article thumbnail

Contributing to Kali

Kali Linux

With the launch of our brand-new forums, we thought we would update our documentation and explore how everyone can contribute to the growth of Kali Linux. Kali is a multi-platform project that thrives on the the contributions of its community. Whether you’re curious about how you can pitch in or simply want to learn more about how contributions shape our platform, keep reading.

Media 88
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday

Thales Cloud Protection & Licensing

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday josh.pearson@t… Tue, 11/26/2024 - 08:01 As Black Friday and Cyber Monday loom, the stakes for retailers extend far beyond enticing deals and record sales. With retail sales during 2024 set to grow to between $5.23 trillion and $5.28 trillion, the risk of a data breach extends beyond immediate financial losses.

Retail 71
article thumbnail

RomCom Exploits Zero-Days in Firefox (CVE-2024-9680) & Windows (CVE-2024-49039) with No User Interaction

Penetration Testing

In a recent cybersecurity report, ESET researchers have unveiled a coordinated attack by the Russia-aligned threat actor RomCom, exploiting zero-day vulnerabilities in both Mozilla Firefox and Microsoft Windows. These vulnerabilities—previously... The post RomCom Exploits Zero-Days in Firefox (CVE-2024-9680) & Windows (CVE-2024-49039) with No User Interaction appeared first on Cybersecurity News.

article thumbnail

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

Cisco Security

Cisco has integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Cisco has integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance.

78
article thumbnail

Keycloak Patches Multiple Vulnerabilities in Latest Update

Penetration Testing

Open-source identity and access management platform Keycloak has released important security updates to address multiple vulnerabilities, including risks of denial-of-service attacks, information disclosure, and authentication bypass. The vulnerabilities, ranging in... The post Keycloak Patches Multiple Vulnerabilities in Latest Update appeared first on Cybersecurity News.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

How to use Bluesky starter packs to find greener social media pastures

Zero Day

Starting over on a new social media site can be a hassle. For that, Bluesky has starter packs. Here's how to use them.

Media 74
article thumbnail

Explained: the Microsoft connected experiences controversy

Malwarebytes

Recently we’ve seen some heated discussion about Microsoft’s connected experiences feature. As in many discussions lately there seems to be no room for middle ground, but we’re going to try and provide it anyway. First of all, it’s important to understand what the “connected experiences” are. Microsoft describes it like this: “Connected experiences that analyze your content are experiences that use your Office content to provide you with design recommendations, editing suggestions, d

article thumbnail

The best indoor TV antenna of 2024: Expert tested

Zero Day

Forget paying for cable and watch free live TV with one of the best indoor TV antennas you can buy right now

74
article thumbnail

Intel Secures Nearly $8 Billion in CHIPS Act Funding to Boost US Semiconductor Production

Penetration Testing

Intel Corporation has been awarded 7.86 billion in funding under the U.S. CHIPS and Science Act, a major step towards bolstering domestic semiconductor manufacturing and reducing reliance on overseas production.... The post Intel Secures Nearly $8 Billion in CHIPS Act Funding to Boost US Semiconductor Production appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.