Thu.Jan 09, 2025

article thumbnail

Massive breach at location data seller: “Millions” of users affected

Malwarebytes

Like many other data brokers, Gravy is a company you may never have heard of, but it almost certainly knows a lot about you if youre a US citizen. Data brokers come in different shapes and sizes. What they have in common is that they gather personally identifiable data from various sourcesfrom publicly available data to stolen datasetsand then sell the gathered data on.

Media 129
article thumbnail

From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions 

Security Boulevard

What to expect in 2025 and beyond, into the future. Here are some likely predictions across cybersecurity, GenAI and innovation, and defensive cyber. The post From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Chrome AI extensions deliver info-stealing malware in broad attack

Malwarebytes

Small businesses and boutique organizations should use caution when leaning on browser-friendly artificial intelligence (AI) tools to generate ideas, content, and marketing copy, as a set of Google Chrome extensions were recently compromised to deliver info-stealing malware disguised as legitimate updates. Analyzed by researchers at Extension Total, the cybercriminal campaign has managed to take over the accounts of at least 36 Google Chrome extensions that provide AI and VPN services.

Malware 124
article thumbnail

Cybersecurity Resolutions for 2025

IT Security Guru

As we begin the New Year, it offers a chance for reflection on 2024 and to consider what we can do as security professionals and business leaders in 2025 that will keep us relevant and in the best position to counter cyber threats going forward. The IT Security Guru caught up with Darren Guccione, CEO and co-founder of Keeper Security to see what he thinks should be the industry’s resolutions in the coming year.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Zero-Day Vulnerability in Ivanti VPN

Schneier on Security

It’s being actively exploited.

VPN 274
article thumbnail

Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal

Security Boulevard

A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what Fortinet's CISO is calling a "phish-free" phishing campaign. The post Fortinet CISO Details Phish-Free Phishing Scheme Using PayPal appeared first on Security Boulevard.

CISO 113

LifeWorks

More Trending

article thumbnail

Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency

Security Boulevard

While AI/ML and automation promise to help streamline and reduce security operation costs, these efforts could be significantly boosted by the increased availability of standard interfaces The post Open Interfaces Needed to Cut Security Operations Costs & Boost Efficiency appeared first on Security Boulevard.

article thumbnail

What’s Next for Open Source Software Security in 2025?

Tech Republic Security

Hidden dependencies, social engineering attacks, and the complexity of foundation models can all contribute tothe insecure use of open-source software in 2025.

Software 197
article thumbnail

Ukrainian Cyber Alliance destroyed the connectivity of Russian ISP Nodex

Security Affairs

A group of hacktivists, known as the Ukrainian Cyber Alliance, breached Russian ISP Nodex, stole sensitive documents, and wiped systems. Ukrainian Cyber Alliance hacked Russian ISP Nodex, stole sensitive data, and wiped systems, highlighting their cyberattack capabilities. The Ukrainian Cyber Alliance has been active since 2016, the Pro-Ukraine group has targeted Russian entities since the invasion of Ukraine.

Backups 70
article thumbnail

Building Resilience Into Cyber-Physical Systems Has Never Been This Mission-Critical  

Security Boulevard

Our nations critical infrastructure is increasingly brittle and under attack. Take the recent report that the drinking water of millions of Americans is at risk due to technical vulnerabilities. The post Building Resilience Into Cyber-Physical Systems Has Never Been This Mission-Critical appeared first on Security Boulevard.

Risk 64
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

U.S. Medical billing provider Medusind suffered a sata breach

Security Affairs

Medusind, a medical billing provider, disclosed a data breach that occurred in December 2023 and affected over 360,000 individuals. Medusind is a company that provides medical billing, coding, and revenue cycle management (RCM) services to healthcare organizations, including medical practices, dental practices, and other providers. The company disclosed a data breach discovered on December 29, 2023, that impacted 360,934 individuals.

article thumbnail

10 Linux apps I always install first - and you should too

Zero Day

If you're just now jumping onto the Linux train, you might be wondering what apps to install first. Here are the first 10 I find should be installed by all.

145
145
article thumbnail

The School Shootings Were Fake. The Terror Was Real

WIRED Threat Level

The inside story of the teenager whose swatting calls sent armed police racing into hundreds of schools nationwideand the private detective who tracked him down.

135
135
article thumbnail

How Cracks and Installers Bring Malware to Your Device

Trend Micro

Our research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.

Malware 131
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location

WIRED Threat Level

A hack of location data company Gravy Analytics has revealed which apps areknowingly or notbeing used to collect your information behind the scenes.

Hacking 134
article thumbnail

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption

The Hacker News

Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple's XProtect," Check Point Research said in a new analysis shared with The Hacker News.

article thumbnail

We have named the 12 winners for the official Best of CES 2025 awards

Zero Day

Our experts sifted through thousands of CES exhibitors to find the best tech. ZDNET, CNET, PCMag, Mashable, and Lifehacker combined to select the winners.

122
122
article thumbnail

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan

The Hacker News

Japan's National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Best of CES 2025 awards are in, as selected by ZDNET and the rest of CNET Group

Zero Day

Our experts sifted through the thousands of CES exhibitors to find the best tech.

122
122
article thumbnail

How the US TikTok Ban Would Actually Work

WIRED Threat Level

The fate of TikTok now rests in the hands of the US Supreme Court. If a law banning the social video app this month is upheld, it wont disappear from your phonebut it will get messy fast.

Media 115
article thumbnail

Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection

The Hacker News

Threat actors are attempting to take advantage of a recently disclosed security flaw impacting GFI KerioControl firewalls that, if successfully exploited, could allow malicious actors to achieve remote code execution (RCE).

Firewall 115
article thumbnail

The Linux Foundation launches an initiative to support open-source Chromium-based browsers

Zero Day

Google's Chromium source code will be used as the basis for new open-source web browsers.

111
111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Security Implications of Configuration Drift 

Security Boulevard

Addressing configuration drift - a seemingly minor issue - is essential to maintaining a secure and resilient IT environment. The post Security Implications of Configuration Drift appeared first on Security Boulevard.

article thumbnail

The best robot vacuum of CES 2025 - and 4 others that impressed us

Zero Day

Robot vacuums are getting some outstanding upgrades this year, and ZDNET has picked the best ones of them all.

111
111
article thumbnail

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

The Hacker News

Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data.

article thumbnail

These headphones may look they play music but they actually clean your ears - and you can watch them do it

Zero Day

The Bebird EarSight Flow gently shoots water into your ears to clean them and has a special camera that allows you to watch the process in real time from the app.

105
105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Digital Wallets: From Consumer Convenience to Corporate Security

Security Boulevard

From storing state IDs, driver's licenses and passports to managing payment information, digital wallets have revolutionized the way we handle personal credentials. The post Digital Wallets: From Consumer Convenience to Corporate Security appeared first on Security Boulevard.

article thumbnail

Finally! A robot vacuum that can climb stairs (well, kind of)

Zero Day

At CES 2025, Dreame introduced its premium X50 Ultra, which aspires to go where no robot vac has gone before.

105
105
article thumbnail

The School Shootings Were Fake. The Terror Was Real

WIRED Threat Level

The inside story of the teenager whose swatting calls sent armed police racing into hundreds of schools nationwideand the private detective who tracked him down.

102
102
article thumbnail

How to encrypt any email - in Outlook, Gmail, and other popular services

Zero Day

If you ever send emails that contain sensitive or private information, consider email encryption. Getting started is a lot easier than you'd expect.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!