Tue.May 13, 2025

article thumbnail

Court Rules Against NSO Group

Schneier on Security

The case is over : A jury has awarded WhatsApp $167 million in punitive damages in a case the company brought against Israel-based NSO Group for exploiting a software vulnerability that hijacked the phones of thousands of users. I’m sure it’ll be appealed. Everything always is.

Software 202
article thumbnail

Author’s Q&A: It’s high time for CISOs to start leading strategically — or risk being scapegoated

The Last Watchdog

The cybersecurity landscape has never moved faster and the people tasked with defending it have never felt more exposed. Related: How real people are really using GenAI Todays Chief Information Security Officers (CISOs) operate in a pressure cooker: responsible for protecting critical assets, expected to show up in the boardroom with fluency, yet rarely granted the authority, resources or organizational alignment to succeed.

CISO 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Noodlophile Malware Distributed Through Bogus AI Video Generators: Who Are the Targets?

Tech Republic Security

By downloading what they believe is an AI-generated video, victims have installed malware that can steal their data or offer attackers remote access to infected devices.

Malware 129
article thumbnail

News Alert: INE Security outlines top 5 training priorities emerging from RSAC 2025

The Last Watchdog

Cary, NC, May 13, 2025, CyberNewswire –Fresh from a high-impact presence at RSAC 2025, where INE Security welcomed thousands of visitors to its interactive booth at San Franciscos Moscone Center, the global cybersecurity training and certification provider is addressing some of the top cybersecurity priorities emerging from the industry-leading event.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

The Hacker News

A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors to target critical infrastructure networks. "Actors leveraged CVE-2025-31324, an unauthenticated file upload vulnerability that enables remote code execution (RCE)," EclecticIQ researcher Arda Bykkaya said in an analysis published today.

117
117
article thumbnail

Meta Scores $168M Legal Victory Over NSO Group for Spyware Abuse

SecureWorld News

In a landmark ruling that reverberates across the cybersecurity and tech policy landscape, Meta has won a $ 167.7 million judgment against NSO Group, the Israeli company behind the Pegasus spyware. The United States federal jury awarded $ 444,719 in compensatory damages and $ 167.25 million in punitive damages, marking the first time a U. S. company has successfully held a commercial spyware vendor accountable in a court of law, Reuters reports.

Spyware 104

LifeWorks

More Trending

article thumbnail

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The Hacker News

The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor's targeting beyond Russia. Enterprise security firm Proofpoint said the end goal of the campaign is to collect intelligence on the "trajectory of the Russian invasion.

Malware 106
article thumbnail

Moldovan Police arrested a 45-year-old foreign man participating in ransomware attacks on Dutch companies

Security Affairs

A 45-year-old foreign man has been arrested in Moldova for allegedly participating in ransomware attacks on Dutch companies in 2021. Moldovan police arrested a 45-year-old foreign man as a result of a joint international operation involving Moldovan and Dutch authorities. He is internationally wanted for multiple cybercrime, including ransomware attacks, blackmail, and money laundering, targeting Dutch companies.

article thumbnail

Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads

The Hacker News

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to be an application related to the Solana blockchain, but contains malicious functionality to steal source code and developer secrets. The package, named solana-token, is no longer available for download from PyPI, but not before it was downloaded 761 times.

article thumbnail

Swan Vector Espionage Targets Japan & Taiwan with Advanced Malware

Penetration Testing

The Seqrite Labs APT-Team has uncovered a complex cyber-espionage operation dubbed Swan Vector, targeting educational institutions and the The post Swan Vector Espionage Targets Japan & Taiwan with Advanced Malware appeared first on Daily CyberSecurity.

Malware 107
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado

WIRED Threat Level

Before a crackdown by Telegram, Xinbi Guarantee grew into one of the internets biggest markets for Chinese-speaking crypto scammers and money laundering. And all registered to a US address.

Marketing 107
article thumbnail

Your Android phone is getting a huge security upgrade for free - what's new

Zero Day

Google says these new security features will help keep scam calls and texts, sketchy apps, and phone thieves at bay. Here's how.

Scams 104
article thumbnail

Deepfake Defense in the Age of AI

The Hacker News

The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large language models (LLMs) to impersonate trusted individuals and automate these social engineering tactics at scale. Lets review the status of these rising attacks, whats fueling them, and how to actually prevent, not detect, them.

article thumbnail

How to use ChatGPT freely without giving up your privacy - with one simple trick

Zero Day

I change this ChatGPT setting for almost everything - even mundane chats - to protect my privacy. Here's why.

104
104
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Andor: Think like a leader

Adam Shostack

Think like a what??! Theres an amazing moment of dialog in Andor: Luthen: Youre thinking like a thief! Andor: Im thinking like a soldier! Luthen: I need you to think like a leader! Now, maybe this just hit me because of my own rebellion against think like an attacker, but I think its a great small bit. Luthen doesnt explain how a leader thinks, but then, many leaders dont know how leaders think.

100
100
article thumbnail

5 factors steadily fueling Linux's desktop rise

Zero Day

Linux has been quietly moving from niche to mainstream - and this is why.

99
article thumbnail

From Compliance to Confidence: How AI Is Reshaping Third-Party Risk

SecureWorld News

As geopolitical instability, supply chain disruption, and cyber threats continue to escalate, third-party risk management (TPRM) is evolving from a compliance function to a strategic business imperative. The 2025 EY Global Third-Party Risk Management Survey highlights a critical shift: organizations are increasingly turning to artificial intelligence to manage growing risk complexity, but many still struggle to operationalize TPRM at scale.

Risk 81
article thumbnail

Why I recommend this 2-in-1 laptop to business professionals (and gamers, too)

Zero Day

HP's Envy x360 is a 16-inch laptop/tablet hybrid that delivers the qualities consumers want in a big screen 2-in-1.

102
102
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

APT group exploited Output Messenger Zero-Day to target Kurdish military operating in Iraq

Security Affairs

A Trkiye-linked group used an Output Messenger zero-day to spy on Kurdish military targets in Iraq, collecting user data since April 2024. Since April 2024, the threat actor Marbled Dust (aka Sea Turtle , Teal Kurma, Marbled Dust, SILICON and Cosmic Wolf) has exploited a zero-day flaw ( CVE-2025-27920 ) in Output Messenger to target Kurdish military-linked users in Iraq, collecting user data and deploying malicious files.

DNS 84
article thumbnail

10 things I always do after installing Ubuntu to instantly improve the experience

Zero Day

Now that the dust has cleared from the grand unleashing of Ubuntu 25.04, you might be ready to install it. Here's what I recommend you do immediately after.

91
article thumbnail

Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

WIRED Threat Level

Androids Scam Detection protection in Google Messages will now be able to flag even more types of digital fraud.

Scams 81
article thumbnail

Samsung Galaxy S25 Edge hands-on: This ultra-thin phone made my iPhone feel outdated

Zero Day

The dimensions paint a clear picture, but nothing prepares you for how thin and light the new Samsung phone feels.

97
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Dior China Discloses Customer Data Breach After Unauthorized Access

Penetration Testing

French luxury brand Dior recently sent SMS notifications to its customers in China, disclosing a data breach incident. The post Dior China Discloses Customer Data Breach After Unauthorized Access appeared first on Daily CyberSecurity.

article thumbnail

Have a genius business idea? These 2 AI tools can help you turn it into a reality

Zero Day

Want to build an app with AI? Here's where to start.

95
article thumbnail

Five Years Later: Evolving IoT Cybersecurity Guidelines

NSTIC

The Backgroundand NISTs Plan for Improving IoT Cybersecurity The passage of the Internet of Things (IoT) Cybersecurity Improvement Act in 2020 marked a pivotal step in enhancing the cybersecurity of IoT products. Recognizing the increasing internet connectivity of physical devices, this legislation tasked NIST with developing cybersecurity guidelines to manage and secure IoT effectively.

IoT 80
article thumbnail

Apple just confirmed several iOS 19 features ahead of WWDC - and it's a big accessibility win

Zero Day

Switch Control, which lets you control your devices without any physical movement, is just one of more than a dozen new features spanning the company's product line.

89
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Quietly Updates Logo with Gradient Colors Before Google I/O

Penetration Testing

In the days leading up to Google I/O 2025, Google has quietly unveiled a subtle redesign of its The post Google Quietly Updates Logo with Gradient Colors Before Google I/O appeared first on Daily CyberSecurity.

article thumbnail

Android 16 may be my favorite Google software design overhaul yet - here's what's new

Zero Day

I've been using Android since version 1.5, and I've not seen a UI refresh this good since it all started.

article thumbnail

Using a Mythic agent to optimize penetration testing

SecureList

Introduction The way threat actors use post-exploitation frameworks in their attacks is a topic we frequently discuss. It’s not just about analysis of artifacts for us, though. Our company’s deep expertise means we can study these tools to implement best practices in penetration testing. This helps organizations stay one step ahead. Being experts in systems security assessment and information security in general, we understand that a proactive approach always works better than simply

article thumbnail

I wanted a privacy screen protector - until I put one on my Galaxy S25 Ultra

Zero Day

The extra security is cool. Too bad the drawbacks aren't.

88
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!