Mon.Jan 27, 2025

article thumbnail

New VPN Backdoor

Schneier on Security

A newly discovered VPN backdoor uses some interesting tactics to avoid detection: When threat actors use backdoor malware to gain access to a network, they want to make sure all their hard work can’t be leveraged by competing groups or detected by defenders. One countermeasure is to equip the backdoor with a passive agent that remains dormant until it receives what’s known in the business as a “magic packet.” On Thursday, researchers revealed that a never-before-seen back

VPN 341
article thumbnail

Spatial Reasoning and Threat Modeling

Adam Shostack

Do diagrams leverage the brain in a different way? Creating, refining, communicating, and working with models are all important parts of how I think about answering what are we working on? People often want to eliminate the diagramming or modeling step as not required, and thats a mistake. The act of engaging with the higher order question of what are we building working on is important, and diagramming acts as a forcing function.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UnitedHealth almost doubles victim numbers from massive Change Healthcare data breach

Malwarebytes

UnitedHealth says it now estimates that the data breach on its subsidiary Change Healthcare affected 190 million people, nearly doubling its previous estimate from October. In May, UnitedHealth CEO Andrew Witty estimated that the ransomware attack compromised the data of a third of US individuals when he testified before the Senate Finance Committee on Capitol Hill.

article thumbnail

Apple fixed the first actively exploited zero-day of 2025

Security Affairs

Apple addressed the first zero-day vulnerability of 2025, which is actively exploited in attacks in the wild aimed at iPhone users. Apple released security updates to address 2025’s first zero-day vulnerability, tracked as CVE-2025-24085 , actively exploited in attacks targeting iPhone users. The vulnerability is a privilege escalation vulnerability that impacts the Core Media framework. “A malicious application may be able to elevate privileges.

Spyware 119
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

News alert: INE Security announces new initiative to help companies accelerate CMMC 2.0 compliance

The Last Watchdog

Cary, NC, Jan. 26, 2025, CyberNewswire — INE Security , a leading global provider of cybersecurity training and certifications, today announced a new initiative designed to accelerate compliance with the Department of Defense’s (DoD) newly streamlined Cybersecurity Maturity Model Certification (CMMC) 2.0. This initiative aims to assist Defense Industry Base (DIB) contractors in swiftly adapting to the updated certification standards, which are critical to securing and maintaining def

article thumbnail

Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam

Security Boulevard

A large-scale phishing campaign is using PDF files and hidden malicious links, as well as posing at the U.S. Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal information, Zimperium researchers say. The post Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam appeared first on Security Boulevard.

Mobile 116

LifeWorks

More Trending

article thumbnail

Humans are the Beating Heart of the Autonomous SOC

Security Boulevard

Ultimately, the goal of the autonomous SOC is to create a more efficient and effective security environment where human analysts and AI work together to achieve a higher level of security than either could achieve alone. Working together, each improves the other. The post Humans are the Beating Heart of the Autonomous SOC appeared first on Security Boulevard.

article thumbnail

ESXi ransomware attacks use SSH tunnels to avoid detection

Security Affairs

Threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Researchers at cybersecurity firm Sygnia warn that threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Ransomware groups are exploiting unmonitored ESXi appliances to persist and access corporate networks.

article thumbnail

Do You Know What Your Assets Are? 

Security Boulevard

Asset awareness is the first step in understanding your complete security posture. If you dont know what assets you own, how can you protect them? The post Do You Know What Your Assets Are? appeared first on Security Boulevard.

article thumbnail

Racing the Clock: Outpacing Accelerating Attacks

Digital Shadows

Key Findings 2024 was the year cyber threats got quicker. Cyber attackers really picked up the pace, executing faster, more efficient breaches that pushed traditional defenses to their limits. Our research reveals 2024 saw a 22% increase in attack speed compared to 2023, with the fastest incident achieving lateral movement in just 27 minutes. This quicker infiltration leaves organizations with even less time to respond, making automated defenses crucial in matchingand surpassingthe speed of adve

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Exabeam Extends Generative AI Reach to LogRhythm SIEM

Security Boulevard

Exabeam has extended the reach of its generative artificial intelligence (GenAI) capabilities to its LogRhythm security information event management platform which is designed to be deployed by internal IT teams. The post Exabeam Extends Generative AI Reach to LogRhythm SIEM appeared first on Security Boulevard.

article thumbnail

DeepSeek Chatbot Beats OpenAI on App Store Leaderboard

Tech Republic Security

Competing with OpenAIs o1, DeepSeeks models scored higher on benchmarks and disrupted the AI market, sparking debates on U.S.-China tech dynamics.

Marketing 201
article thumbnail

Multiple Git flaws led to credentials compromise

Security Affairs

Vulnerabilities in the Git credential retrieval protocol could have allowed threat actors to access user credentials. Security researcher RyotaK from GMO Flatt Security Inc discovered multiple v ulnerabilities in the Git credential retrieval protocol that could have allowed threat actors to access user credentials. The vulnerabilities stem from the improper handling of messages in Gits credential retrieval protocol.

article thumbnail

A week in security (January 20 – January 26)

Malwarebytes

Last week on Malwarebytes Labs: Your location or browsing habits could lead to price increases when buying online AI tool GeoSpy analyzes images and identifies locations in seconds 7-Zip bug could allow a bypass of a Windows security feature. Update now Warning: Dont sell or buy a second hand iPhone with TikTok already installed Texas scrutinizes four more car manufacturers on privacy issues Last week on ThreatDown: What is SQL injection (SQLi), and how can it be prevented?

DNS 77
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Attackers allegedly stole $69 million from cryptocurrency platform Phemex

Security Affairs

Crooks stole at least $69 million from Singapore-based cryptocurrency platform Phemex in an alleged cyberattack. Singapore-based crypto platform Phemex paused operations after a cyberattack that resulted in the theft of $69M. PhemexCEO Federico Variola stated they are restoring withdrawals and temporarily manually reviewing all requests. On Thursday, researchers at the blockchain security firm PeckShield noticed a suspicious ‘outflow of large funds from the cryptocurrency platform.

article thumbnail

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

The Hacker News

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-24085, has been described as a use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate privileges.

Media 144
article thumbnail

TalkTalk confirms data breach involving a third-party platform

Security Affairs

UK telecommunications firm TalkTalk disclosed a data breach after a threat actor announced the hack on a cybercrime forum. UK telecommunications company TalkTalk confirmed a data breach after a threat actor claimed responsibility for the cyber attack on a cybercrime forum and offered for sale alleged customer data. A threat actor named “b0nd” claimed the theft of data of over 18.8 million TalkTalk subscribers’ data, including names, email addresses, IP addresses, phone numbers,

article thumbnail

DeepSeek’s Popular AI App Is Explicitly Sending US Data to China

WIRED Threat Level

Amid ongoing fears over TikTok, Chinese generative AI platform DeepSeek says its sending heaps of US user data straight to its home country, potentially setting the stage for greater scrutiny.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

GamaCopy targets Russia mimicking Russia-linked Gamaredon APT

Security Affairs

New threat actor GamaCopy mimics Russia-linked Gamaredon APT in attacks on Russian-speaking targets. The Knownsec 404 Advanced Threat Intelligence team recently analyzed attacks on Russian-speaking targets using military-themed bait, 7z SFX for payloads, and UltraVNC, mimicking Gamaredons TTPs. The researchers linked the activity to the APT Core Werewolf (aka Awaken Likho, PseudoGamaredon), it mimics Gamaredon and for this reason, researchers called it GamaCopy.

Hacking 62
article thumbnail

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

The Hacker News

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it's restricting registrations on the service, citing malicious attacks. "Due to large-scale malicious attacks on DeepSeek's services, we are temporarily limiting registrations to ensure continued service," the company said in an incident report page.

article thumbnail

Furious over the Pixel 4a update fiasco? You may be entitled to compensation

Zero Day

If Google's update ruined your phone's battery life, you can choose a battery replacement, a Google store credit, or a cash payment. Here's how.

118
118
article thumbnail

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

The Hacker News

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user's Git credentials.

Risk 119
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Scammers Are Creating Fake News Videos to Blackmail Victims

WIRED Threat Level

Yahoo Boy scammers are impersonating CNN and other news organizations to create videos that pressure victims into making blackmail payments.

116
116
article thumbnail

Is this the iPhone SE 4? Leaked photos reveal major changes coming in 2025

Zero Day

Rumored to launch in April, the SE 4 sports a single camera, a notch, a USB-C port, and no more Home button, according to photos and a video shared by a known leaker.

115
115
article thumbnail

Markets Plummet Amid Surprise AI Breakthrough from China's DeepSeek

SecureWorld News

This morning, U.S. stock markets took a sharp nosedive, with the S&P 500, Nasdaq, and Dow Jones all shedding significant points within hours of opening. The catalyst? A groundbreaking announcement from Chinese AI company DeepSeek, which unveiled a major technological leap that threatens to upend the competitive balance in AI innovation. While investors scramble to interpret the implications, the cybersecurity industry is left grappling with what this means for national security, data privacy

Marketing 112
article thumbnail

My favorite bone conduction headphones for swimming just got a brilliant new feature

Zero Day

Bone conduction headsets let you stay aware while working out. The Nank Runner Diver2 Pro adds a new design element to take that idea even further.

108
108
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Do We Really Need The OWASP NHI Top 10?

The Hacker News

The Open Web Application Security Project has recently introduced a new Top 10 project - the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.

108
108
article thumbnail

How to remove Copilot from your Microsoft 365 plan

Zero Day

Copilot has muscled its way into Microsoft 365 with a price hike to boot. But you can remove the AI from Word and revert to the classic plan. Here's how.

103
103
article thumbnail

Are Third-Party Risk Management Solutions Effective Enough?  

Security Boulevard

A modern EASM solution offers more by incorporating meaningful first-party and third-party cyber risk insights than conventional TPRM solutions. The post Are Third-Party Risk Management Solutions Effective Enough? appeared first on Security Boulevard.

Risk 91
article thumbnail

This versatile HP laptop will satisfy business professionals and creatives alike

Zero Day

HP's EliteBook x360 1040 has an adaptable form factor with one of the best video conferencing experiences I've tested on a laptop.

102
102
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!