Tue.Mar 11, 2025

article thumbnail

Soft-Launching and Open Sourcing the Have I Been Pwned Rebrand

Troy Hunt

Designing the first logo for Have I Been Pwned was easy: I took a SQL injection pattern, wrote "have i been pwned?" after it and then, just to give it a touch of class, put a rectangle with rounded corners around it: Job done! I mean really, what more did I need for a pet project with a stupid name that would likely only add to the litany of failed nerdy ideas I'd had before that?

Passwords 299
article thumbnail

Alleged Co-Founder of Garantex Arrested in India

Krebs on Security

Authorities in India today arrested the alleged co-founder of Garantex , a cryptocurrency exchange sanctioned by the U.S. government in 2022 for facilitating tens of billions of dollars in money laundering by transnational criminal and cybercriminal organizations. Sources close to the investigation told KrebsOnSecurity the Lithuanian national Aleksej Besciokov , 46, was apprehended while vacationing on the coast of India with his family.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Silk Typhoon Hackers Indicted

Schneier on Security

Lots of interesting details in the story : The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade of hacker intrusions around the world, including eight staffers for the contractor i-Soon, two officials at China’s Ministry of Public Security who allegedly worked with them, and two other alleged hackers who are said to be part of the Chinese hacker group APT27, or Silk Typhoon, which prosecutors say was involved in the US T

article thumbnail

Microsoft: 6 Zero-Days in March 2025 Patch Tuesday

Krebs on Security

Microsoft today issued more than 50 security updates for its various Windows operating systems, including fixes for a whopping six zero-day vulnerabilities that are already seeing active exploitation. Two of the zero-day flaws include CVE-2025-24991 and CVE-2025-24993 , both vulnerabilities in NTFS , the default file system for Windows and Windows Server.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CyberSecurity Expert Joseph Steinberg To Lecture At Columbia University During Summer 2025

Joseph Steinberg

During the upcoming Summer 2025 semester, cybersecurity expert Joseph Steinberg will once again lecture at Columbia University. Steinberg, a faculty member of the Columbia University School of Professional Studies, will teach students pursuing graduate degrees in Technology Management ; the title of the course will be Cybersecurity Strategy and Executive Response , and the course will be taught on Columbia’s main New York City campus in May, June, and July of 2025.

article thumbnail

Apple fixed the third actively exploited zero-day of 2025

Security Affairs

Apple addressed a zero-day vulnerability, tracked as CVE-2025-24201, that has been exploited in “extremely sophisticated” cyber attacks. Apple has released emergency security updates to address a zero-day vulnerability, tracked as CVE-2025-24201, in the WebKit cross-platform web browser engine. The vulnerability is an out-of-bounds write issue that was exploited in “extremely sophisticated” attacks.

More Trending

article thumbnail

U.S. CISA adds Advantive VeraCore and Ivanti EPM flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Advantive VeraCore and IvantiEPMflaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2025-25181 Advantive VeraCore SQL Injection Vulnerability CVE-2024-57968 Advantive VeraCore Unrestricted File Upload Vulnerability CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Pat

Hacking 99
article thumbnail

If I Had to Start Over in Cybersecurity, Here's What I'd Do Differently

SecureWorld News

I didn't take the "traditional" path into cybersecurity, because when I started, there wasn't one. My degree? Mathematics. But that had nothing to do with how I landed my first security job. My real break came in the Air Force, managing Top Secret systems as a Communications and Computer Systems Officer. That role gave me military-grade security experience and a Top Secret clearance, but it's not a path most people can follow (or one I could repeat if I had to start over).

article thumbnail

Sony Removes 75,000 Deepfake Items, Highlighting a Growing Problem

Security Boulevard

Sony Music told UK regulators that it had to remove more than 75,000 deepfake songs and other material, the latest example of the burgeoning problem of AI-generated false videos, images, and sound that threaten everything from national security to business to individuals. The post Sony Removes 75,000 Deepfake Items, Highlighting a Growing Problem appeared first on Security Boulevard.

article thumbnail

News alert: 360 Privacy secures $36M to deliver turnkey digital executive protection platform

The Last Watchdog

Nashville, TN Mar. 11, 2025 360 Privacy , a leading digital executive protection platform, today announced that it has secured a $36 million growth equity investment from FTV Capital , a sector-focused growth equity firm with a successful track record of investing across the enterprise technology landscape. The investment will enable 360 Privacy to expand its engineering and revenue teams, accelerate technology and product innovation, and further enhance its ability to deliver best-in-class cus

B2C 100
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

DCRat backdoor returns

SecureList

Since the beginning of the year, we’ve been tracking in our telemetry a new wave of DCRat distribution, with paid access to the backdoor provided under the Malware-as-a-Service (MaaS) model. The cybercriminal group behind it also offers support for the malware and infrastructure setup for hosting the C2 servers. Distribution The DCRat backdoor is distributed through the YouTube platform.

article thumbnail

Switzerland’s NCSC requires cyberattack reporting for critical infrastructure within 24 hours

Security Affairs

Switzerland’s NCSC mandates critical infrastructure organizations to report cyberattacks within 24 hours of discovery. Switzerland’s National Cybersecurity Centre (NCSC) now requires critical infrastructure organizations to report cyberattacks within 24 hours due to rising cybersecurity threats. The new policy related to security breach notification is introduced as a response to the increasing number of cyber incident. “In view of the increasing threat of cyber incidents, Swit

article thumbnail

US Cities Warn of Surge in Unpaid Parking Phishing Text Scams

eSecurity Planet

A growing number of U.S. cities are alerting residents to a widespread phishing scam involving fraudulent text messages about unpaid parking violations. These deceptive messages aim to steal personal and financial information from unsuspecting motorists. Phishing scam details The scam involves text messages that appear to be official notices from city parking authorities.

Scams 63
article thumbnail

SideWinder APT targets maritime and nuclear sectors with enhanced toolset

Security Affairs

The APT group SideWinder targets maritime and logistics companies across South and Southeast Asia, the Middle East, and Africa. Kaspersky researchers warn that the APT group SideWinder (also known as Razor Tiger, Rattlesnake, and T-APT-04) is targeting maritime, logistics, nuclear, telecom, and IT sectors across South Asia, Southeast Asia, the Middle East, and Africa.

Malware 68
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What Really Happened With the DDoS Attacks That Took Down X

WIRED Threat Level

Elon Musk said a massive cyberattack disrupted X on Monday and pointed to IP addresses originating in the Ukraine area as the source of the attack. Security experts say that's not how it works.

DDOS 145
article thumbnail

DuckDuckGo Unleashes Duck.ai: Free and Private AI-Powered Chat for Everyone

Penetration Testing

Following the earlier release of DuckAssist, a digital assistant designed to help users quickly grasp webpage summaries or The post DuckDuckGo Unleashes Duck.ai: Free and Private AI-Powered Chat for Everyone appeared first on Cybersecurity News.

article thumbnail

How to Use NordPass: A Step-by-Step Guide

Tech Republic Security

NordPass is a secure password manager for storing and auto-filling passwords. Learn how to set it up, save logins, and explore its features.

article thumbnail

Critical Flaw Exposes 100,000+ WooCommerce Sites: Unauthenticated File Inclusion Threatens Total Takeover

Penetration Testing

A severe vulnerability has been discovered in the popular WordPress plugin “HUSKY WooCommerce Products Filter Professional,” formerly The post Critical Flaw Exposes 100,000+ WooCommerce Sites: Unauthenticated File Inclusion Threatens Total Takeover appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)

Security Boulevard

Overview Recently, NSFOCUS CERT detected that Apache issued a security announcement and fixed the remote code execution vulnerability of Apache Tomcat (CVE-2025-24813). An unauthenticated attacker can execute arbitrary code to gain server privileges when the application has servlet write enabled (disabled by default), uses Tomcat file session persistence and a default storage location, and contains [] The post Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) appeared first on N

article thumbnail

CVE-2025-26865: Apache OFBiz Vulnerability Could Lead to Remote Code Execution

Penetration Testing

A recently discovered vulnerability in the Apache OFBiz eCommerce plugin could allow attackers to execute arbitrary code on The post CVE-2025-26865: Apache OFBiz Vulnerability Could Lead to Remote Code Execution appeared first on Cybersecurity News.

eCommerce 129
article thumbnail

Lessons from the Field, Part III: Why Backups Alone Won’t Save You

Security Boulevard

James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. Its been a while since Ive put some thoughts together for the CISO Blog, and with World Backup Day coming at the end of this month, the timing felt right. Ive mentioned in the past that backups are crucial to keeping your data preserved [] The post Lessons from the Field, Part III: Why Backups Alone Wont Save You appeared first on CISO Global.

Backups 59
article thumbnail

AT&T just made a video call from space - and the implications are astronomical

Zero Day

The US carrier, in partnership with AST SpaceMobile, completed a video call without modifying the phone in any special way.

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

News alert: GitGuardian discloses 70% of leaked secrets remain active 2 years — remediation urgent

Security Boulevard

Boston, Mass., Mar. 11, 2025, CyberNewswire GitGuardian , the security leader behind GitHubs most installed application, today released its comprehensive 2025 State of Secrets Sprawl Report, revealing a widespread and persistent security crisis that threatens organizations of all sizes. (more) The post News alert: GitGuardian discloses 70% of leaked secrets remain active 2 years remediation urgent first appeared on The Last Watchdog.

52
article thumbnail

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

The Hacker News

Unpatched TP-Link Archer routers have become the target of a new botnet campaign dubbed Ballista, according to new findings from the Cato CTRL team.

Internet 110
article thumbnail

Silk Typhoon Hackers Indicted

Security Boulevard

Lots of interesting details in the story : The US Department of Justice on Wednesday announced the indictment of 12 Chinese individuals accused of more than a decade of hacker intrusions around the world, including eight staffers for the contractor i-Soon, two officials at Chinas Ministry of Public Security who allegedly worked with them, and two other alleged hackers who are said to be part of the Chinese hacker group APT27, or Silk Typhoon, which prosecutors say was involved in the US Treasury

Media 52
article thumbnail

Employers want workers with AI skills, but what exactly does that mean?

Zero Day

Almost one in four tech jobs in the US need people with AI skills, according to recent job data.

109
109
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How the EU Product Liability Directive (EU PLD) is Changing Software Security | Contrast Security

Security Boulevard

Companies that sell software that can be used or downloaded by anyone in the European Union are facing a major new liability. Late last year, the European Commission finalized fundamental changes to the EU Product Liability Directive (PLD) changes that have far-reaching ramifications. While the changes wont apply broadly until 2026, they will likely lead to a significant change in how companies think about and handle software security.

article thumbnail

Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks

The Hacker News

Apple on Tuesday released a security update to address a zero-day flaw that it said has been exploited in "extremely sophisticated" attacks. The vulnerability has been assigned the CVE identifier CVE-2025-24201 and is rooted in the WebKit web browser engine component.

article thumbnail

Generative AI software development boosts productivity — and risk

Security Boulevard

The use of AI coding assistants is on the rise, and while they can juice a developer's productivity, they also threaten the quality and security of software development, a recent study analyzing millions of lines of code has found. The post Generative AI software development boosts productivity and risk appeared first on Security Boulevard.

article thumbnail

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

The Hacker News

Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed by Kaspersky in 2024, spread across Bangladesh, Cambodia, Djibouti, Egypt, the United Arab Emirates, and Vietnam.

106
106
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!