Tue.May 20, 2025

article thumbnail

KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS

Krebs on Security

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been a test run for a massive new Internet of Things (IoT) botnet capable of launching crippling digital assaults that few web destinations can withstand.

DDOS 293
article thumbnail

SK Telecom revealed that malware breach began in 2022

Security Affairs

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April began in 2022. SK Telecom is South Koreas largest wireless telecom company, a major player in the countrys mobile and tech landscape. It holds about 48% of the market share for mobile services, meaning around 34 million subscribers use its network. The company offers cellular service, along with 5G development, AI services, IoT solutions, cloud computing, and smart city infrastructure.

Malware 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Enterprise browsers arise to align security with the modern flow of work

The Last Watchdog

A quiet but consequential shift is underway in enterprise workspace security. The browser has effectively become the new operating system of business. Related: Gartner’s enterprise browser review It didnt happen all at once. But as SaaS took over, remote work went mainstream, and generative AI entered the picture, the browser quietly assumed a central role.

article thumbnail

Rust turns 10: How a broken elevator changed software forever

Zero Day

Rust 1.0 shipped in May 2015. Here's how it came about and why it marked a turning point in the world of software development.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

SEC Twitter hack: Man imprisoned for role in attack that caused Bitcoin’s price to soar.

Graham Cluley

Eric Council Jr. pleaded guilty to charges related to the January 2024 hack of the US Securities and Exchange Commission's (SEC) Twitter account, which saw a fake announcement about the Bitcoin cryptocurrency posted to its followers. Read more in my article on the Hot for Security blog.

Hacking 98
article thumbnail

Sony will give you a free 55-inch 4K TV right now, and there are several ways to qualify

Zero Day

BOGO isn't just for shoes. As part of a Memorial Day promotion, Sony is giving away a free X77L 4K Google TV to anyone who buys its latest flagship panel.

98

LifeWorks

More Trending

article thumbnail

6 things I did immediately after installing iOS 18.5 on my iPhone - and why you should too

Zero Day

Though iOS 18.5 isn't a major update, there are some tasks you should perform after installing the new version.

101
101
article thumbnail

MSPs in 2025: From “Break-Fix to Business Advisor” with Nigel Moore

Heimadal Security

Welcome back to the MSP Security Playbook, the podcast that helps MSPs cut through the noise, eliminate inefficiencies, and build stronger, more profitable security businesses. I’m your host, Jacob Hazelbaker, business development representative at Heimdal Security, an industry-leading unified and AI-powered cybersecurity solutions provider. Today, I’m diving into a critical topic: the future of MSPs […] The post MSPs in 2025: From “Break-Fix to Business Advisor” wi

article thumbnail

These upcoming headphones from EarFun are an impressive feat at a cheap price

Zero Day

Sometimes, a pair of headphones takes me by surprise, and EarFun has been doing that for some time. The Tune Pro over-the-ear headphones are no exception.

87
article thumbnail

New Go-Based Malware ‘RedisRaider’ Exploits Redis Servers to Mine Cryptocurrency

eSecurity Planet

Security experts have uncovered a new malware campaign, RedisRaider, that targets misconfigured Redis servers to secretly mine cryptocurrency. The malware, written in Go, spreads aggressively by exploiting weak Redis configurations, ultimately deploying the XMRig Monero miner on compromised Linux systems. Datadog Security Labs discovered the campaign and described it as a highly evasive operation using advanced obfuscation techniques to avoid detection.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

I replaced my $3,500 Sony camera with a 200MP Android phone - and can't go back

Zero Day

When the Xiaomi 15 Ultra launched with its new periscope lens and stacked camera setup earlier this year, I just knew I had to get my hands on one.

87
article thumbnail

Let’s Talk About SaaS Risk – Again… This Time, Louder.

Security Boulevard

By Kevin Hanes, CEO of Reveal Security A few weeks ago, I shared a thought that sparked a lot of discussion: SaaS is not a black box we can ignore. Its a rich, dynamic attack surface and one that attackers are increasingly targeting. That urgency was echoed powerfully in JPMorgan CISO Patrick Opets open letter to SaaS vendors. That letter stuck with me.

Risk 52
article thumbnail

8 ways Google's Gemini AI assistant is getting more powerful and helpful

Zero Day

Revealed at Google I/O, Gemini's new skills are designed to expand how you use the AI. Some features are available now for everyone. Others are pricey, limited, or not quite ready.

77
article thumbnail

Attack Surface Reduction for Enterprises: A Guide

Security Boulevard

Todays enterprises have embraced digital evolution. Business deals are conducted in online spaces, contracts are signed with a keyboard, data is held in physical servers and the cloud, and client. The post Attack Surface Reduction for Enterprises: A Guide appeared first on Security Boulevard.

52
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Apple WWDC 2025 keynote scheduled: What to expect from iOS 19, VisionOS 3, and more

Zero Day

Apple's annual WWDC event serves as a platform for unveiling new software and technologies. This year's conference is poised to be a big one.

article thumbnail

10 Questions to Ask Before Investing in an Exposure Management Platform

Security Boulevard

Security tools have mastered detection but visibility without action still leaves you exposed. Exposure management platforms promise to bridge the gap between alerts and real risk reduction. But not all platforms deliver. Use this guide to ask the 10 questions that separate real exposure remediation from just another dashboard. CTEM Stage 1 Visibility [] The post 10 Questions to Ask Before Investing in an Exposure Management Platform appeared first on VERITI.

Risk 52
article thumbnail

Gemini Live screen sharing and camera is now available to everyone - for free

Zero Day

One of Gemini's coolest features is now open to all Android and iOS users.

97
article thumbnail

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

Security Affairs

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due to improper IMS standard implementation. A flaw in 4G Calling (VoLTE) service of the UK telecom O2 exposed user location data through network responses due to flaws in the IMS standard implementation. 4G Calling, also known as VoLTE (Voice over LTE), is a technology that allows voice calls to be made over a 4G/LTE mobile network rather than older 2G or 3G networks.

Mobile 74
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Google just gave Gmail a major AI upgrade, and it solves a big problem for me

Zero Day

The new Workspace features coming to Gmail, Google Docs, Meet, and Vids can actually help take a task off your plate.

100
100
article thumbnail

What to Expect When You’re Convicted

WIRED Threat Level

When a formerly incarcerated troubleshooter for the mafia looked for a second career he chose the thing he knew best. He became a prison consultant for white-collar criminals.

66
article thumbnail

6 hidden Android features that make my life easier - and that you're overlooking

Zero Day

These lesser-known Android features are not the easiest to find, but you'll be glad to have them at your fingertips when you need them.

92
article thumbnail

The AI Fix #51: Divorce by coffee grounds, and why AI robots need your brain

Graham Cluley

In episode 51 of The AI Fix, a Greek man's marriage is destroyed after ChatGPT reads his coffee, a woman dumps her husband to marry an AI called Leo, and Graham wonders whether it's time to upload his brain into a lunchbox-packing robot. Meanwhile, a humanoid robot goes full Michael Crawford in a Chinese factory, the UK government launches an AI to read angry public consultations, and Mark dreams of a world where robots finally have common sense - and swear like sailors.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Google Flow is a new AI video generator meant for filmmakers - how to try it today

Zero Day

Built upon Veo, Imagen, and Gemini, Flow allows Google AI Pro and AI Ultra subscribers to easily generate and edit videos.

89
article thumbnail

Heimdal Launches New Podcast: The MSP Security Playbook

Heimadal Security

COPENHAGEN, Denmark,May 21, 2025 – Heimdal launches a new podcast, The MSP Security Playbook– a show for managed service providers ready to scale smarter, boost profitability, and lead with next-gen cybersecurity solutions. The first episode featuresNigel Moore, founder ofThe Tech Tribe, who discusses how MSPs can move beyond reactive IT support models and embrace more […] The post Heimdal Launches New Podcast: The MSP Security Playbook appeared first on Heimdal Security Blog.

article thumbnail

You can win $250K from OpenAI if you help solve archaeological mysteries with AI

Zero Day

The company hopes that its AI models can help to reveal new evidence of a lost civilization in one of the world's most mysterious regions.

77
article thumbnail

DoorDash Hack

Schneier on Security

A DoorDash driver stole over $2.5 million over several months: The driver, Sayee Chaitainya Reddy Devagiri, placed expensive orders from a fraudulent customer account in the DoorDash app. Then, using DoorDash employee credentials, he manually assigned the orders to driver accounts he and the others involved had created. Devagiri would then mark the undelivered orders as complete and prompt DoorDash’s system to pay the driver accounts.

Hacking 180
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Your Google Gemini assistant is getting 8 useful features - here's the update log

Zero Day

At Google I/O 2025, the company teased upcoming features coming to its latest AI assistant. Here's the rundown.

82
article thumbnail

23andMe and its customers’ genetic data bought by a pharmaceutical org

Malwarebytes

The bankrupt genetic testing company 23andMe has been scooped up by drug producer Regeneron Pharmaceuticals for $256 million dollars. But why would a pharmaceutical company like Regeneron buy a bankrupt genetics testing company like 23andMe for such a large amount of money? Well, Regeneron is a leading biotechnology company that invents, develops, and monetizes life-transforming medicines for people with serious diseases.

article thumbnail

How to watch Google I/O 2025 today (and why you shouldn't miss it)

Zero Day

Google's annual developer conference is officially kicking off. Here's what we're expecting to see.

78
article thumbnail

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

Security Affairs

Cybersecurity Observatory of the Unipegaso’s malware lab published a detailed analysis of the Sarcoma ransomware. It is with great pleasure and honor that I present the first report produced by the Malware Analysis Lab, led by Luigi Martire. The lab was established within the Cybersecurity Observatory of the Unipegaso University, which I have the privilege of directing.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!