Thu.May 15, 2025

article thumbnail

Welcoming the Malaysian Government to Have I Been Pwned

Troy Hunt

Today, we welcome the 40th government onboarded to Have I Been Pwned's free gov service, Malaysia. The NC4 NACSA (National Cyber Coordination and Command Centre of the National Cyber Security Agency) in Malaysia now has full access to query all their government domains via API, and monitor them against future breaches. Malaysia is the first Asian nation to make use of this service, and we look forward to seeing many more from this corner of the world in the future.

article thumbnail

AI-Generated Law

Schneier on Security

On April 14, Dubai’s ruler, Sheikh Mohammed bin Rashid Al Maktoum, announced that the United Arab Emirates would begin using artificial intelligence to help write its laws. A new Regulatory Intelligence Office would use the technology to “regularly suggest updates” to the law and “accelerate the issuance of legislation by up to 70%.” AI would create a “comprehensive legislative plan” spanning local and federal law and would be connected to public adminis

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breachforums Boss to Pay $700k in Healthcare Breach

Krebs on Security

In what experts are calling a novel legal outcome, the 22-year-old former administrator of the cybercrime community Breachforums will forfeit nearly $700,000 to settle a civil lawsuit from a health insurance company whose customer data was posted for sale on the forum in 2023. Conor Brian Fitzpatrick , a.k.a. “ Pompompurin ,” is slated for resentencing next month after pleading guilty to access device fraud and possession of child sexual abuse material (CSAM).

article thumbnail

GUESST ESSAY: Cybercrime for hire: small businesses are the new bullseye of the Dark Web

The Last Watchdog

Small businesses make up 90% of all companies worldwide and account for half of global GDP. Yet despite their importance, many lack the cybersecurity expertise and resources to fend off a rising tide of digital threats. Related: Protecting lateral networks in SMBs Rich in sensitive data and often connected to larger supply chains, small businesses have become prime targets for attackers.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

The Hacker News

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. "Criminals targeted our customer support agents overseas," the company said in a statement.

article thumbnail

Steelmaker Nucor Faces Breach, Temporarily Halts Production

SecureWorld News

On May 14, 2025, Nucor Corporation, the largest steel producer in the United States, disclosed a cybersecurity incident involving unauthorized access to certain IT systems. In response, the Charlotte-based company proactively took affected systems offline and temporarily halted production at various locations as a precautionary measure. In its 8-K filing with the U.S.

LifeWorks

More Trending

article thumbnail

This hidden Google Earth slider lets you travel back in time - up to 80 years. How to try it

Zero Day

Ever wondered what your street looked like in the 80s - or even the 30s? Now you can view just about anywhere and see it throughout time in seconds with Google Earth's historical imagery feature. Here's how it works.

104
104
article thumbnail

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

The Hacker News

Cybersecurity researchers have discovered a malicious package named "os-info-checker-es6" that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems.

article thumbnail

I finally found a 3-in-1 USB-C charging cable that I can recommend

Zero Day

Multi-connector charging cables are usually terrible. This one is the exception. Here's why.

109
109
article thumbnail

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

The Hacker News

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day in MDaemon, according to new findings from ESET. The activity, which commenced in 2023, has been codenamed Operation RoundPress by the Slovak cybersecurity company.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

This big-screen Samsung tablet is the iPad Pro alternative Android users have been waiting for

Zero Day

The latest Samsung Galaxy Tab S10 Ultra has a large AMOLED 2X screen that creatives and professionals will gravitate toward, but there's more beneath the surface.

105
105
article thumbnail

Windows 10 Users Get 3 More Years of Microsoft 365 Security Updates

Tech Republic Security

In a surprise reversal, Microsoft has adjusted Microsoft 365 Apps support for Windows 10, granting security updates through 2028 as many users are delaying Windows 11 upgrades.

Software 104
article thumbnail

Threat landscape for industrial automation systems in Q1 2025

SecureList

Trends Relative stability from quarter to quarter. The percentage of ICS computers on which malicious objects were blocked remained unchanged from Q4 2024 at 21.9%. Over the last three quarters, the value has ranged from 22.0% to 21.9%. The quarterly figures are decreasing from year to year. Since Q2 2023, the percentage of ICS computers on which malicious objects were blocked has been lower than the indicator of the same quarter of the previous year.

Spyware 88
article thumbnail

I found an amp that easily turns any Bluetooth device into a modern home audio system

Zero Day

The Valoritiva Octa A1 integrated amp is easy to setup, and with its compact size makes a great option for small spaces.

96
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

iOS Kernel Vulnerability Exposed in Public PoC – Potential Jailbreak and Privilege Escalation Risk

Penetration Testing

A newly surfaced proof of concept (PoC) has reignited attention around a critical iOS kernel vulnerabilityCVE-2023-41992that Apple patched The post iOS Kernel Vulnerability Exposed in Public PoC – Potential Jailbreak and Privilege Escalation Risk appeared first on Daily CyberSecurity.

Risk 92
article thumbnail

Coinbase disclosed a data breach after an extortion attempt

Security Affairs

Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach reported to the SEC. Coinbase said rogue contractors stole data on under 1% of users and demanded $20M; the data breach was disclosed in an SEC filing. On May 11, 2025, the company received a ransom demand from a threat actor claiming to have customer and internal data.

article thumbnail

Sony WH-1000XM6 vs. Bose QuietComfort Ultra: Which headphones should you buy?

Zero Day

Looking for the best noise-canceling headphones? The Sony WH-1000XM6 and Bose QuietComfort Ultra can give you that, and here's how to decide on one.

90
article thumbnail

Pen Testing for Compliance Only? It's Time to Change Your Approach

The Hacker News

Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine software update. By April, attackers had already exploited a vulnerability introduced in that February update, gaining access to customer data weeks before being finally detected.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

You can try Microsoft's free AI skills training for two more weeks, and I recommend you do

Zero Day

Microsoft's AI Skills Fest offers free AI training for beginners and pros, plus prizes and discounts. You can register now for free access through May 28th.

88
article thumbnail

Patch Now: SonicWall SMA1000 Flaw (CVE-2025-40595) Enables Stealth SSRF Attacks

Penetration Testing

A newly disclosed Server-Side Request Forgery (SSRF) vulnerability in SonicWalls SMA1000 series appliances could allow remote attackers to The post Patch Now: SonicWall SMA1000 Flaw (CVE-2025-40595) Enables Stealth SSRF Attacks appeared first on Daily CyberSecurity.

article thumbnail

These budget earbuds have no business sounding this good for the price

Zero Day

The CMF Buds 2 Plus offer a comfortable fit, clear sound, good ANC performance, and a long-lasting battery life, all for just $79.

86
article thumbnail

TransferLoader Malware Unmasked: IPFS-Enabled Loader Deploys Ransomware and Backdoors with Obfuscation Precision

Penetration Testing

Zscaler ThreatLabz has uncovered a new and dangerous malware loader dubbed TransferLoader, actively used in the wild since The post TransferLoader Malware Unmasked: IPFS-Enabled Loader Deploys Ransomware and Backdoors with Obfuscation Precision appeared first on Daily CyberSecurity.

Malware 80
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Proton VPN vs IPVanish: Which VPN is right for you?

Zero Day

Proton VPN and IPVanish are both solid VPN options. Here's why you might want to choose one over the other, based on our testing.

VPN 81
article thumbnail

Popular Selenium Library WebDriverManager Hit by Critical XXE Bug (CVE-2025-4641, CVSS 9.3)

Penetration Testing

A critical XML External Entity (XXE) injection vulnerability has been identified in WebDriverManager, an essential Java library widely The post Popular Selenium Library WebDriverManager Hit by Critical XXE Bug (CVE-2025-4641, CVSS 9.3) appeared first on Daily CyberSecurity.

article thumbnail

Kosovo authorities extradited admin of the cybercrime marketplace BlackDB.cc

Security Affairs

Kosovar citizen extradited to the US for running the cybercrime marketplace BlackDB.cc appeared in federal court facing related charges. Kosovo citizen Liridon Masurica (33) of Gjilan, was extradited to the US for running the cybercrime marketplace BlackDB.cc and appeared in federal court facing related charges. The online criminal marketplace BlackDB.cc has been active sunce 2018, the platform offered for sale compromised credentials and PII used by crooks for tax fraud, credit card fraud, and

article thumbnail

Pgpool-II Hit by Critical CVE-2025-46801: CVSS 9.8 Risk Lets Attackers Bypass Authentication

Penetration Testing

The PgPool Global Development Group has issued a high-severity security advisory for Pgpool-II, a widely used middleware that The post Pgpool-II Hit by Critical CVE-2025-46801: CVSS 9.8 Risk Lets Attackers Bypass Authentication appeared first on Daily CyberSecurity.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Why I recommend this cordless stick vacuum over my Dyson - especially at this sale price

Zero Day

The Tineco Pure One Station cordless vacuum cleaner has easily become a household staple for its innovative and helpful features.

80
article thumbnail

High-Risk Flaws in a-blog cms: CVE-2025-36560 Scores Critical 9.2 on CVSS Scale

Penetration Testing

JPCERT/CC has issued a vulnerability note disclosing multiple security flaws in a-blog cms, a popular content management system The post High-Risk Flaws in a-blog cms: CVE-2025-36560 Scores Critical 9.2 on CVSS Scale appeared first on Daily CyberSecurity.

Risk 78
article thumbnail

5 BCDR Essentials for Effective Ransomware Defense

The Hacker News

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks.

article thumbnail

This $95 Lenovo tablet is fantastic for mobile entertainment - and I'm tempted to buy two

Zero Day

The Lenovo Tab M9 is a solid tablet for watching shows and movies. The best part? It's very affordable.

Mobile 78
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!