Mon.Dec 23, 2024

article thumbnail

U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit

Security Affairs

A U.S. court ruled in favor of WhatsApp against NSO Group, holding the spyware vendor liable for exploiting a flaw to deliver Pegasus spyware. WhatsApp won a legal case against NSO Group in a U.S. court over exploiting a vulnerability to deliver Pegasus spyware. Will Cathcart of WhatsApp called the ruling a major privacy victory, emphasizing accountability for spyware firms after a five-year legal battle.

Spyware 110
article thumbnail

Enhancing IT Support for Manufacturing Systems: Addressing Critical Gaps

SecureWorld News

IT support is a fundamental requirement for operational productivity and system uptime for any industry. Manufacturing systems, especially the ones that work with SCADA technology (Supervisory Control and Data Acquisition), IoT devices, and other critical technologies, depend heavily on efficient IT support to ensure that the downtime is minimal, and the performance is optimal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Italy’s data protection watchdog fined OpenAI €15 million over ChatGPT’s data management violations

Security Affairs

Italy’s data protection watchdog fined OpenAI 15 million for ChatGPT’s improper collection of personal data. Italys privacy watchdog, Garante Privacy, fined OpenAI 15M after investigating ChatGPT’s personal data collection practices. The Italian Garante Priacy also obliges OpenAI to conduct a six-month informational campaign over ChatGPTs data management violations.

article thumbnail

Health Care Data of Almost 1 Million ConnectOnCall User Exposed

Security Boulevard

A hack of health care services provider ConnectOnCall exposed the sensitive data of more than 914,000 users, the latest proof point of the growing interest threat actors have in targeting hospitals and other health care organizations. The post Health Care Data of Almost 1 Million ConnectOnCall User Exposed appeared first on Security Boulevard.

Hacking 119
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Criminal Complaint against LockBit Ransomware Writer

Schneier on Security

The Justice Department has published the criminal complaint against Dmitry Khoroshev, for building and maintaining the LockBit ransomware.

article thumbnail

Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims

Security Boulevard

Chinese crooks are running a global network of more than 75,000 fake online shops to steal credit card data and process fraudulent payments. The post Best of 2024: Massive Online Shopping Scam Racks Up 850,000 Victims appeared first on Security Boulevard.

Scams 105

LifeWorks

More Trending

article thumbnail

Cybercriminals Exploit Cracked Acunetix Scanner for Malicious Attacks

Penetration Testing

Cybercriminals are increasingly weaponizing cracked versions of legitimate vulnerability scanning tools, like the Araneida Scanner, for malicious activities, according to Silent Push Threat Analysts. Based on unauthorized modifications of Acunetix,... The post Cybercriminals Exploit Cracked Acunetix Scanner for Malicious Attacks appeared first on Cybersecurity News.

article thumbnail

Protect 3 Devices With This Maximum Security Software

Tech Republic Security

Trend Micro guards desktop and mobile devices from ransomware, phishing schemes, spam, and more for one year.

Software 167
article thumbnail

Best of 2024: National Public Data Sued for Hack that Exposed Data of 2.9 Billion People

Security Boulevard

National Public Data, a background check company that collects sensitive personal information, is facing a class-action legal complaint for allowing the data from 2.9 billion people to be stolen in a breach and later sold on the dark web for millions of dollars. The post Best of 2024: National Public Data Sued for Hack that Exposed Data of 2.9 Billion People appeared first on Security Boulevard.

Hacking 59
article thumbnail

Best Patch Management Software (2024): Compare Features & Pricing

Tech Republic Security

Patch management software ensures that known vulnerabilities are patched efficiently to prevent breaches while streamlining IT workflows. Find the best patch management solution for your business.

Software 167
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Rspack Supply Chain Attack Injects Cryptojacking Malware Into npm Ecosystem

Penetration Testing

The Rspack ecosystem, known for its high-performance JavaScript bundler written in Rust, has become the latest victim of a supply chain attack. The breach impacted two widely used npm packages,... The post Rspack Supply Chain Attack Injects Cryptojacking Malware Into npm Ecosystem appeared first on Cybersecurity News.

Malware 62
article thumbnail

The Ultimate Guide to Establishing a Strong Cybersecurity Baseline: Key Steps and Best Practices

Centraleyes

Security baselines are the foundational guidelines that help organizations maintain a minimum protection standard. They provide a starting pointa basic level of security that must be in place to protect against the most common threats. However, its important to understand how baselines differ from broader security controls or standards. Baselines are not meant to be exhaustive; instead, they represent the essential, non-negotiable practices that every organization should have in place.

article thumbnail

AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case

The Hacker News

Cybersecurity researchers have found that it's possible to use large language models (LLMs) to generate new variants of malicious JavaScript code at scale in a manner that can better evade detection.

Malware 142
article thumbnail

My favorite USB-C accessory of all time scores a magnetic upgrade

Zero Day

USB-C is great, but the ports can be fragile and vulnerable to damage. This breakaway accessory eliminates the chances of damaging your port.

134
134
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks

The Hacker News

The Apache Software Foundation (ASF) has released a security update to address an important vulnerability in its Tomcat server software that could result in remote code execution (RCE) under certain conditions. The vulnerability, tracked as CVE-2024-56337, has been described as an incomplete mitigation for CVE-2024-50379 (CVSS score: 9.

Software 140
article thumbnail

15 surprising ways I used AI to save me weeks of work in 2024

Zero Day

In 2024, AI became truly helpful. Here are 15 clever ways I integrated it into my workflow for quicker, better results - and what I hope to do with it in 2025.

133
133
article thumbnail

U.S. Judge Rules Against NSO Group in WhatsApp Pegasus Spyware Case

The Hacker News

Meta Platforms-owned WhatsApp scored a major legal victory in its fight against Israeli commercial spyware vendor NSO Group after a federal judge in the U.S. state of California ruled in favor of the messaging giant for exploiting a security vulnerability to deliver Pegasus.

Spyware 130
article thumbnail

The Linux log files you should know and how to use them

Zero Day

If you really want to see what's happening beneath the hood of your Linux distribution, you need to use log files.

130
130
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Top 10 Cybersecurity Trends to Expect in 2025

The Hacker News

The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025, organizations will be challenged with protecting sensitive information for their customers while continuing to provide seamless and easy user experiences.

article thumbnail

One of my favorite budget tablets this year managed to be replace both my Kindle and iPad

Zero Day

I've been a Kindle user for over a decade, but the TCL Tab 10 Nxtpaper 5G became my new favorite e-reader tablet in 2024 for several reasons.

128
128
article thumbnail

Achieving Stability with Enhanced Secret Detection

Security Boulevard

Is the Quest for Stability an Uphill Battle in Cybersecurity? In the vast landscape of data management and cybersecurity, professionals constantly grapple with threats that lurk in the shadows, invisible and unpredictable. The elusive nature of these threats often leaves CISOs, SOC teams, and other cybersecurity professionals wondering: how can stability be achieved in a [] The post Achieving Stability with Enhanced Secret Detection appeared first on Entro.

CISO 52
article thumbnail

I used Copilot AI Vision to browse the web for me, and it has big potential

Zero Day

Who really needs an AI assistant to help find information on the internet? It depends on what you're trying to find.

Internet 126
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service

The Hacker News

An interruption to the phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA has led to a rapid uptick in activity from another nascent offering named FlowerStorm.

Phishing 124
article thumbnail

5 biggest Linux and open-source stories of 2024: From AI arguments to security close calls

Zero Day

AI arrived, security troubles were dodged, and after years of development, real-time Linux finally made it into mainstream Linux. Here's what shook up the open-source world this year and what it means for 2025.

122
122
article thumbnail

“Holy League” Hacktivist Group Emerges, Targets West

Penetration Testing

Radwares latest report unveils the emergence of the Holy Leaguea hacktivist formed in July 2024. This group is the result of a strategic merger between the pro-Russian High Society and... The post “Holy League” Hacktivist Group Emerges, Targets West appeared first on Cybersecurity News.

article thumbnail

ExpressVPN vs NordVPN: Which VPN is best for you?

Zero Day

Many experts deem these two VPN providers to be the best in the game, but which is better? My in-depth research reveals which VPN should be your pick for every user case.

VPN 119
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

PoC Exploit Released for CVE-2024-30085: Windows Elevation of Privilege Vulnerability

Penetration Testing

Security researcher Alex Birnberg with SSD Secure Disclosure published the technical details and a proof-of-concept (PoC) exploit code for CVE-2024-30085 – a Windows Cloud Files Mini Filter Driver Elevation of... The post PoC Exploit Released for CVE-2024-30085: Windows Elevation of Privilege Vulnerability appeared first on Cybersecurity News.

article thumbnail

Ultramarine Linux 40 continues to be one fine unofficial Fedora Spin

Zero Day

If you're looking for a version of Fedora that offers a few extra tweaks to make the desktop even more user-friendly, look no further than Ultramarine Linux.

119
119
article thumbnail

The Invisible Russia-Ukraine Battlefield

WIRED Threat Level

In Russias war against Ukraine, electronic warfare, including signal-jamming, anti-drone weapons, and innovative protections for critical military systems, has become a key piece of the conflict.

108
108
article thumbnail

How to create your own Bluesky domain - and why I recommend it

Zero Day

Using a domain on Bluesky helps identify you to your followers. Here's how to do it, step-by-step.

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!