Fri.Jun 06, 2025

article thumbnail

Report on the Malicious Uses of AI

Schneier on Security

OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams.

article thumbnail

Signal Phishing Alert: Sophisticated Campaign Targets Armenian Civil Society & Government

Penetration Testing

A sophisticated spear-phishing campaign using Signal targeted Armenian civil society and government in March 2025, linked to threat actor UNC5792.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hearing on the Federal Government and AI

Schneier on Security

On Thursday I testified before the House Committee on Oversight and Government Reform at a hearing titled “ The Federal Government in the Age of Artificial Intelligence.” The other speakers mostly talked about how cool AI was—and sometimes about how cool their own company was—but I was asked by the Democrats to specifically talk about DOGE and the risks of exfiltrating our data from government agencies and feeding it into AIs.

article thumbnail

86 million AT&T customer records reportedly up for sale on the dark web

Zero Day

X Trending Memorial Day tech sales 2025 Memorial Day TV sales 2025 Memorial Day lawn & outdoor sales 2025 Memorial Day phone sales 2025 Memorial Day health tracker sales 2025 Memorial Day headphone sales 2025 Memorial Day laptop sales 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builders of 2025 Best free web hosting services of 2025 Best malware removal software of 2025 Best remote access software of 2025 Best passwo

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

CISA Alert: Critical Vulnerabilities Found in CyberData SIP Emergency Intercom Devices

Penetration Testing

CISA issues critical warning for CyberData SIP Emergency Intercom (Model 011209) with severe vulnerabilities (CVSS 9.8), risking remote access and code execution. Update now.

Risk 86
article thumbnail

Play ransomware group hit 900 organizations since 2022

Security Affairs

A joint advisory from the US and Australian authorities states that Play ransomware has hit approximately 900 organizations over the past three years. A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) states that Play ransomware has hit approximately 900 organizations over the past three years.

LifeWorks

More Trending

article thumbnail

U.S. Offers $10M bounty for info on RedLine malware creator and state hackers

Security Affairs

The U.S. offers up to $10M for info on state hackers linked to RedLine malware and its creator, Maxim Rudometov, tied to attacks on U.S. infrastructure. The U.S. Department of State offers a reward of up to $10 million for information nation-state actors linked to the RedLine infostealer and its alleged author, Russian national Maxim Alexandrovich Rudometov.

Malware 81
article thumbnail

MY TAKE: Are we ‘Super f**cked’ by AI? — debate gets 10 million-plus views on YouTube

The Last Watchdog

The day after my column dissecting Chris Sacca’s viral outburst went live—his now-notorious claim that we are “super f**ked” by artificial intelligence—I stumbled onto another AI conversation that had already amassed over 10 million views: a roundtable debate hosted by Steven Bartlett on his widely watched YouTube show, Diary of a CEO.

article thumbnail

Honeywell Report OT Under Siege

SecureWorld News

The Honeywell 2025 Cyber Threat Report delivers a sobering snapshot of today's industrial cybersecurity landscape: cyberattacks targeting operational technology (OT) environments are no longer rare or speculative—they're persistent, highly targeted, and increasingly sophisticated. This year's report is a must-read for practitioners defending OT-heavy sectors like manufacturing, energy, logistics, and critical infrastructure.

Media 76
article thumbnail

How global threat actors are weaponizing AI now, according to OpenAI

Zero Day

X Trending Miss out on Nintendo Switch 2 preorders? Here's how to buy one Nintendo Switch 2 revealed: Specs, pricing, release date (out now), and more official details The $700 Android phone that made me forget about my Pixel 9 Pro Best small business web hosting services of 2025 Memorial Day headphone sales 2025 Best Linux VPNs of 2025 Best online video editors of 2025 Best CRM software of 2025 Best small business CRM software of 2025 Best free website builders of 2025 Best website builder

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

The Hacker News

Cybersecurity researchers are alerting to a new malware campaign that employs the ClickFix social engineering tactic to trick users into downloading an information stealer malware known as Atomic macOS Stealer (AMOS) on Apple macOS systems. The campaign, according to CloudSEK, has been found to leverage typosquat domains mimicking U.S.-based telecom provider Spectrum.

article thumbnail

Booking.com reservation abused as cybercriminals steal from travelers

Malwarebytes

Robert Woodford, a recruitment marketing specialist, recently shared on LinkedIn how he fell victim to a highly sophisticated scam while booking a hotel in Verona through Booking.com, providing a striking example of how attacks on the hospitality industry affect travelers. After completing a legitimate booking—and trading some communications with the hotel—Woodford received a separate message that he believed came from the official Booking.com messaging system.

Scams 79
article thumbnail

Unpatched XSS Vulnerability in Jenkins Gatling Plugin Puts Users at Risk (CVE-2025-5806)

Penetration Testing

A high-severity XSS flaw (CVE-2025-5806) in Jenkins Gatling Plugin bypasses CSP, risking session hijacking and credential theft. Downgrade to v1.3.0 immediately!

Risk 67
article thumbnail

MCP (Model Context Protocol) and Its Critical Vulnerabilities

Security Boulevard

Model Context Protocol connects AI assistants to external tools and data. Think of it as a bridge between Claude, ChatGPT, or Cursor and your Gmail, databases, or file systems. Released. The post MCP (Model Context Protocol) and Its Critical Vulnerabilities appeared first on Strobes Security. The post MCP (Model Context Protocol) and Its Critical Vulnerabilities appeared first on Security Boulevard.

84
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

The Hacker News

A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos.

Malware 80
article thumbnail

Popular Chrome Extensions Caught Leaking Sensitive User Data via Unencrypted HTTP

Penetration Testing

Symantec reveals popular Chrome extensions like Browsec VPN & DualSafe Password Manager are leaking sensitive user data over unencrypted HTTP, risking privacy.

article thumbnail

Marks & Spencer’s ransomware nightmare – more details emerge

Graham Cluley

Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty, shut down online ordering, some staff unable to clock in and out, and caused some of its major suppliers to resort to pen and paper. In a gloating abuse-filled email to M&S CEO Stuart Machin, the DragonForce hacker group claimed responsibility for the attack.

article thumbnail

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam

The Hacker News

India's Central Bureau of Investigation (CBI) has revealed that it has arrested four individuals and dismantled two illegal call centers that were found to be engaging in a sophisticated transnational tech support scam targeting Japanese citizens.

Scams 82
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Cybercriminals Are Hiding Malicious Web Traffic in Plain Sight

WIRED Threat Level

In an effort to evade detection, cybercriminals are increasingly turning to “residential proxy” services that cover their tracks by making it look like everyday online activity.

Hacking 63
article thumbnail

Empower Users and Protect Against GenAI Data Loss

The Hacker News

When generative AI tools became widely available in late 2022, it wasn’t just technologists who paid attention. Employees across all industries immediately recognized the potential of generative AI to boost productivity, streamline communication and accelerate work.

75
article thumbnail

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead

Security Boulevard

Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead The rules of cybersecurity are shifting—again. As 2025 unfolds, companies face a paradox: digital acceleration is non-negotiable, but it’s also becoming their biggest liability. From API sprawl to AI-driven phishing, today’s threats evolve […] The post Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead appeared first on Cyber security services prov

Risk 52
article thumbnail

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

The Hacker News

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker’s mindset. This is where AEV comes in.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Security Boulevard

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction. Dive into five things that are top of mind for the week ending June 6. 1 - Group releases roadmap for adopting post-quantum cryptography Is your organization looking for gu

CISO 52
article thumbnail

US offers $10 million reward for tips about state-linked RedLine hackers

Graham Cluley

How would you like to earn yourself millions of dollars? Well, it may just be possible - if you have information which could help expose the identities of cybercriminals involved with the notorious RedLine information-stealing malware. Read more in my article on the Tripwire State of Security blog.

Malware 72
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25

Security Boulevard

Insight No. 1 — Fixing threat actor names Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple names for the same threat actors. But what matters most is who did it (if we know), what they accessed and what’s being done about it. That’s what customers, media and leadership want to hear. What if, in the heat of a live incident response, the only thing slowing you down was trying to decipher whether "Storm-0530" was a new group or just another name for someth

CISO 52
article thumbnail

TA397’s Global Targeting Tactics Reveal Indian State-Backed Cyber Operations

Penetration Testing

Proofpoint reveals TA397 (Bitter APT) is an India-aligned state-backed group conducting long-term espionage campaigns globally, targeting rivals and partners.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Why Securing NHIs Reduces Your Cyber Risk

Security Boulevard

Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk management and cyber protection. Among the most notable security risks lies in the management of Non-Human Identities (NHIs).

article thumbnail

Claude Gov: Anthropic’s AI Brain for U.S. National Security

Penetration Testing

Anthropic unveils Claude Gov, an AI model for US national security, deployed in classified environments for intelligence and defense operations.

article thumbnail

Unleashing Powerful Cloud-Native Security Techniques

Security Boulevard

Is Managing Non-Human Identities the Key to Achieving Robust Cloud-Native Security? Where humans and machines square off, intent on breaching each other’s defenses. However, an important facet often goes unnoticed – Non-Human Identities (NHIs). NHIs are machine identities, especially in the context of cloud-native security. Understanding the Strategic Importance of NHI NHIs are crafted by […] The post Unleashing Powerful Cloud-Native Security Techniques appeared first on Entro.

article thumbnail

Attackers exploit Fortinet flaws to deploy Qilin ransomware

Security Affairs

Qilin ransomware now exploits Fortinet vulnerabilities to achieve remote code execution on impacted devices. Threat intelligence firm PRODAFT warned that Qilin ransomware (aka Phantom Mantis) group targeted multiple organizations between May and June 2025 by exploiting multiple FortiGate vulnerabilities, including CVE-2024-21762 , and CVE-2024-55591. “Phantom Mantis recently launched a coordinated intrusion campaign targeting multiple organizations between May and June 2025.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!