Wed.Feb 26, 2025

article thumbnail

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason”

Krebs on Security

A U.S. Army soldier who pleaded guilty last week to leaking phone records for high-ranking U.S. government officials searched online for non-extradition countries and for an answer to the question “can hacking be treason?” prosecutors in the case said Wednesday. The government disclosed the details in a court motion to keep the defendant in custody until he is discharged from the military.

Hacking 259
article thumbnail

Roblox called “real-life nightmare for children” as Roblox and Discord sued

Malwarebytes

Last week it was reported that alawsuit has been initiated against gaming giant Roblox and leading messaging platform Discord. The court actioncharging them with thefacilitation of child predators and misleading parents into believing the platforms are safe to use for their childrencenters around a 13-year-old plaintiff who was targeted by a predator on these platforms.

Risk 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Microsoft Partner Center and Synacor Zimbra Collaboration Suite flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Partner Center and Synacor Zimbra Collaboration Suitevulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SonicWall SonicOS and Palo Alto PAN-OS vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

Android happy to check your nudes before you forward them

Malwarebytes

Sometimes the updates we install to keep our devices safe do a little bit more than we might suspect at first glance. Take the October 2024 Android Security Bulletin. It included a new service called Android System SafetyCore. If you can find a mention of that in the security bulletin, youre a better reader then I am. It wasnt until a few weeks later, when a Google security blog titled 5 new protections on Google Messages to help keep you safe revealed that one of the new protections was designe

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

New LightSpy spyware variant comes with enhanced data collection features targeting social media platforms

Security Affairs

Researchers found an updated LightSpy spyware with enhanced data collection features targeting social media platforms like Facebook and Instagram. Cybersecurity researchers at Hunt.io have found an updated version of the LightSpy spyware that supports an expanded set of data collection features to target social media platforms like Facebook and Instagram.

article thumbnail

Celebrating 1 Year of CSF 2.0

NSTIC

It has been one year since the release of the NIST Cybersecurity Framework (CSF) 2.0 ! To make improving your security posture even easier, in this blog we are: Sharing new CSF 2.0 resources; Taking a retrospective look at some resources and applications you may have missed; and Highlighting ways you can stay involved in our work, helping us help you implement better cybersecurity.

LifeWorks

More Trending

article thumbnail

US Officials Recommend Using Encrypted Apps for Messaging

eSecurity Planet

Our cybersecurity expert discusses why officials are warning that unencrypted messaging apps are vulnerable to hacking, surveillance and cyberattacks. Explore the risks of popular apps and why switching to encrypted alternatives is crucial. Take control of your data and protect your privacy before its too late! The post US Officials Recommend Using Encrypted Apps for Messaging appeared first on eSecurity Planet.

article thumbnail

Data Theft Drove 94% of Global Cyberattacks in 2024 & Ransomware Defenses are “Increasingly Complex”

Tech Republic Security

Ransomware groups now steal, encrypt, and threaten to leak company data on the dark web, forcing victims to pay or risk exposing sensitive information.

article thumbnail

Mishing Is the New Phishing — And It’s More Dangerous

eSecurity Planet

Cybercriminals are shifting their focus from emails to text messages, using mishing a more deceptive form of phishing to target mobile users and infiltrate corporate networks, according to new security research by Zimperium. The research found a sharp rise in mobile phishing attacks, with cybercriminals moving away from traditional email scams in favor of SMS-based attacks.

article thumbnail

New Ghostwriter campaign targets Ukrainian Government and opposition activists in Belarus

Security Affairs

A Ghostwriter campaign using a new variant of PicassoLoader targets opposition activists in Belarus, and Ukrainian military and government organizations. SentinelLABS observed a new Ghostwriter campaign targeting Belarusian opposition activists and Ukrainian military and government entities with a new variant of PicassoLoader. The campaign has been active since late 2024, threat actors used weaponized Microsoft Excel documents as lures.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

EncryptHub Exposed: 600+ Targets Hit by LARVA-208

Penetration Testing

A new and highly sophisticated threat actor, LARVA-208, also known as EncryptHub, has been launching targeted spear-phishing attacks The post EncryptHub Exposed: 600+ Targets Hit by LARVA-208 appeared first on Cybersecurity News.

article thumbnail

Exploits and vulnerabilities in Q4 2024

SecureList

Q4 2024 saw fewer published exploits for Windows and Linux compared to the first three quarters. Although the number of registered vulnerabilities continued to rise, the total number of Proof of Concept (PoC) instances decreased compared to 2023. Among notable techniques in Q4, attackers leveraged undocumented RPC interfaces and targeted the Windows authentication mechanism.

article thumbnail

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

The Hacker News

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42.

Malware 130
article thumbnail

Lock Out Hackers: Why Every School Needs Strong Passwords

Security Boulevard

Lock Out Hackers: Why Every School Needs Strong Passwords We recently hosted a live webinar to help kick off 2025, encouraging you to strengthen your school districts cybersecurity and online safety systems. This webinar featured two expert K-12 guest panelists: Skip Cooley, Director of Technology at Clinton School District, and Tyler Derickson, Cybersecurity & Systems.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

The Hacker News

More than a year's worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members.

article thumbnail

SonicWall Report: “Threat Actors are Moving at Unprecedented Speeds”

Tech Republic Security

SonicWalls 2025 Annual Threat Report noted the U.S. healthcare sector and Latin America were targeted by cybercriminals.

article thumbnail

Three Password Cracking Techniques and How to Defend Against Them

The Hacker News

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one. However, most end users are unaware of just how vulnerable their passwords are to the most common password-cracking methods.

Passwords 121
article thumbnail

Not all Echo devices will get Alexa Plus - see if yours made the list

Zero Day

Amazon's AI-powered Alexa Plus won't be available for all Echo devices when the enhanced virtual assistant begins rolling out in the coming weeks.

118
118
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company's CEO Ben Zhou declared a "war against Lazarus.

Hacking 116
article thumbnail

Have an old smartwatch or ring? Samsung will give you up to $250 off a new Galaxy Ring for it

Zero Day

Thanks to Samsung's sweet trade-in offers, you can declutter your tech drawer and upgrade to the latest Samsung health wearable -- the Galaxy Ring.

116
116
article thumbnail

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote access trojan named DCRat (aka DarkCrystal RAT). The Ukrainian cybersecurity authority said it observed the latest attack wave starting in mid-January 2025.

article thumbnail

Everything Amazon announced at its Alexa event today: Alexa Plus, Echo Show UI, and more

Zero Day

Amazon held its Devices and Services event today, during which it made some major announcements. Here's what you can expect from the new Alexa+.

116
116
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent

The Hacker News

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, its clear this isnt just a human problemits a math problem. There are simply too many threats and security tasks for any SOC to manually handle in a reasonable timeframe. Yet, there is a solution.

article thumbnail

ExpressVPN gets faster and more secure, thanks to Rust

Zero Day

By leveraging the power of Rust, ExpressVPN is setting a new standard for speed, security, and adaptability in VPN protocols.

VPN 114
article thumbnail

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

The Hacker News

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale.

111
111
article thumbnail

Last chance to download your Kindle books - Amazon is killing this option today

Zero Day

The clock is ticking for Kindle users. After February 2025, a long-standing feature disappears. Here's why it matters.

111
111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads

The Hacker News

Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is automslc, which has been downloaded over 104,000 times to date. First published in May 2019, it remains available on PyPI as of writing.

article thumbnail

Two easy ways to add MagSafe to your new iPhone 16e

Zero Day

Apple left MagSafe out of its latest budget handset, but you can still add it with these simple solutions.

111
111
article thumbnail

Using Trusted Digital Signatures for Remote Online Notarization

GlobalSign

The GlobalSign blog is the top resource to see what's trending in public key infrastructure (PKI), SSL/TSL, digital signing solutions, cybersecurity & more!

article thumbnail

Google now lets you delete personal info directly from Search - here's how

Zero Day

It's one of the simplest ways to remove your personal information online.

104
104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!