Thu.Feb 27, 2025

article thumbnail

Weekly Update 441

Troy Hunt

Processing data breaches (especially big ones), can be extremely laborious. And, of course, everyone commenting on them is an expert, so there's a heap of opinions out there. And so it was with the latest stealer logs, a corpus of data that took the better part of a month to process. And then I made things confusing in various ways which led to both Disqus comment and ticket hell.

Spyware 246
article thumbnail

The SOC files: Chasing the web shell

SecureList

Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like lightweight exploitation frameworks. These tools often include features such as in-memory module execution and encrypted command-and-control (C2) communication, giving attackers flexibility while minimizing their footprint. This article walks through a SOC investigation where efficient surface-level analysis led to the identification of a web shell associated with a well-k

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PayPal’s “no-code checkout” abused by scammers

Malwarebytes

We recently identified a new scam targeting PayPal customers with very convincing ads and pages. Crooks are abusing both Google and PayPal’s infrastructure in order to trick victims calling for assistance to speak with fraudsters instead. Combining official-looking Google search ads with specially-crafted PayPal pay links, makes this scheme particularly dangerous on mobile devices due to their screen size limitation and likelihood of not having security software.

Scams 114
article thumbnail

Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access

Security Boulevard

A survey of 1,942 IT and IT security practitioners finds nearly half (47%) work for organizations that have experienced a data breach or cyberattack in the past 12 months that involved a third-party that has access to their network. The post Survey: Nearly Half of Data Breaches Involved Third-Party Remote Access appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

China-linked threat actors stole 10% of Belgian State Security Service (VSSE)’s staff emails

Security Affairs

Belgian authorities are investigating Chinese hackers for breaching its State Security Service (VSSE), stealing 10% of emails from 2021 to May 2023. The Belgian federal prosecutor’s office is probing a possible security breach on its State Security Service (VSSE) by China-linked threat actors. Chinese hackers gained access to the VSSE’s email server between 2021 and May 2023, stealing 10% of staff incoming and outgoing emails. “For nearly two years, hackers working for Chinese

Malware 72
article thumbnail

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

Tech Republic Security

Trends in cybersecurity across 2024 showed less malware and phishing, though more social engineering. CrowdStrike offers tips on securing your business.

LifeWorks

More Trending

article thumbnail

Cybersecurity Certifications: The Key to Advancing Your Career in 2025

SecureWorld News

As global cybersecurity threats continue to rise, information security professionals must enroll in continuous education and training programs to acquire current knowledge and skills that help organizations thwart these costly risks. Many cybersecurity certification programs are available for beginner and senior security professionals looking to advance their careers in cybersecurity.

article thumbnail

Operation SalmonSlalom: New Malware Campaign Targets Industrial Organizations in Asia-Pacific

Penetration Testing

Kaspersky ICS CERT has uncovered a new malware campaign, dubbed “Operation SalmonSlalom,” specifically targeting industrial organizations across the The post Operation SalmonSlalom: New Malware Campaign Targets Industrial Organizations in Asia-Pacific appeared first on Cybersecurity News.

Malware 65
article thumbnail

Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online

WIRED Threat Level

A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmarwhere tens of thousands of people are enslavedare using Starlink to get online.

Scams 144
article thumbnail

North Korean Hackers Deploy RustDoor and Koi Stealer to Target Cryptocurrency Developers on macOS

Penetration Testing

A recent cybersecurity report from Unit 42 has revealed a new wave of North Korean-linked cyberattacks targeting macOS The post North Korean Hackers Deploy RustDoor and Koi Stealer to Target Cryptocurrency Developers on macOS appeared first on Cybersecurity News.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Mounting Threats to Cyber-Physical Systems

Security Boulevard

Over the past few years, cyber adversaries have increasingly set their sights on systems that bridge digital and physical operations. These targets include vital infrastructure in sectors such as oil, gas, and water, where breaches can have severe repercussions. A notable example involved malicious actors interfering with Operational Technology (OT) controls in several nations, including [] The post Mounting Threats to Cyber-Physical Systems appeared first on ColorTokens.

article thumbnail

10 bugs still haunt Windows 11 24H2 despite multiple patches

Zero Day

Microsoft's 24H2 update for Windows 11 has been hit with one bug after another. Many have been patched, but these remain.

130
130
article thumbnail

Turning 56 Billion Attacks into a Proactive Defense Strategy: A CISO’s Guide to HYAS Insight

Security Boulevard

In todays rapidly evolving threat landscape, the sheer volume of malicious activity can be overwhelming. One client recently shared with me a startling statistic: on average, they observed 56 billion unique attacks every quarter. Yes, that number was 56 billion. For any security leader or CISO, these numbers may seem insurmountablea deluge of data, noise, and potential vulnerabilities that would certainly keep teams awake at night if not drive burnout, with the high likelihood that the most impo

CISO 52
article thumbnail

Microsoft battles more bugs in Windows 11 24H2 with new round of patches

Zero Day

Released this week, the optional update also improves a number of features.

127
127
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

The Hacker News

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country's National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications.

article thumbnail

Nextcloud challenges cloud powers with Hub 10 release

Zero Day

Don't trust Google Docs or Microsoft 365 with your work, but still want to use the cloud for your personal or professional work? Then give Nextcloud Hub 10 a try and run your own software-as-a-service cloud.

Software 126
article thumbnail

Optimistic About Future Cybersecurity Trends?

Security Boulevard

Can We Be Optimistic About Future Cybersecurity Trends? Driven by the incessant need for safer digital environments where data and machine identities form the core of many organizational operations. A seasoned data management expert and cybersecurity specialist, must ponder, how promising are the future cybersecurity trends? Can we remain optimistic about the future of security?

article thumbnail

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

The Hacker News

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent. The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It's tracking the activity under the name Erudite Mogwai.

Malware 121
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Bybit Hack: FBI Attributes to North Korea, Urges Crypto Sector to Act

SecureWorld News

The U.S. Federal Bureau of Investigation (FBI) officially attributed the massive $1.5 billion hack of cryptocurrency exchange Bybit to North Korea's state-sponsored hacking group, TraderTraitor, more commonly known as the infamous Lazarus Group. In a newly released public service announcement, the agency detailed how the stolen assets are rapidly being laundered through Bitcoin and other virtual assets across thousands of blockchain addresses.

Hacking 59
article thumbnail

Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI

Security Boulevard

How Morpheus revolutionizes security automation with dynamically generated, context-aware workflows. The post Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI appeared first on D3 Security. The post Morpheus: Building Dynamic, Context-Specific Response Playbooks with AI appeared first on Security Boulevard.

52
article thumbnail

This $200 Motorola is the cheap Android phone to beat in 2025 - and I love the design

Zero Day

For a budget phone, the Moto G (2025) offers outstanding battery life that lasts for days, along with a surprisingly capable camera.

113
113
article thumbnail

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

The Hacker News

Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce.

Risk 112
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to print from an Android phone

Zero Day

If you need to print from your Android phone, you'd be surprised at how easy it is to make it work.

111
111
article thumbnail

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

The Hacker News

A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of 2023. French cybersecurity company Sekoia said it observed the unknown threat actors leveraging CVE-2023-20118 (CVSS score: 6.

article thumbnail

Your Google Pixel Watch 3 is about to get a life-saving update - for free

Zero Day

This might be the Pixel Watch 3's most important update yet -- and it brings something even the Apple Watch can't do.

111
111
article thumbnail

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

The Hacker News

Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public reporting.

Banking 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Do Powerful Tools Enhance Your Data Security?

Security Boulevard

How Can Powerful Security Tools Impact Your Data Protection Strategy? Has it ever occurred to you how critical it is to have a robust data protection framework in massive digitalization? The need for advanced cybersecurity measures becomes more critical. One aspect of data security that demands attention from organizations operating in the cloud is the [] The post Do Powerful Tools Enhance Your Data Security?

article thumbnail

Forrester Report: ReliaQuest Sees Where Security Operations Needs to Go Next

Digital Shadows

In its recent Wave, Forrester said ReliaQuest sees where security operations needs to go next and is ahead of others in the market with a strong strategy. MDR providers have long played a role in SecOps, but the market has shifted as customers demand more proactive solutions. Today, its no longer enough to simply detect and investigate threatsSecOps providers must differentiate by advancing detection engineering, leveraging generative AI, and influencing their customers’ overall security p

article thumbnail

DEF CON 32 – Fool Us Once, Fool Us Twice: Hacking Norwegian Banks

Security Boulevard

Author/Presenter: Per Thorsheim Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. The post DEF CON 32 – Fool Us Once, Fool Us Twice: Hacking Norwegian Banks appeared first on Security Boulevard.

Banking 52
article thumbnail

Hackers stole this engineer's 1Password database. Could it happen to you?

Zero Day

A software engineer for the Disney Company unwittingly downloaded a piece of malware that turned his life upside down. Was his password manager to blame?

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!