Thu.Jan 25, 2024

article thumbnail

Using Google Search to Find Software Can Be Risky

Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make searching for software on Google a dicey affair.

Software 251
article thumbnail

Quantum Computing Skeptics

Schneier on Security

Interesting article. I am also skeptical that we are going to see useful quantum computers anytime soon. Since at least 2019, I have been saying that this is hard. And that we don’t know if it’s “land a person on the surface of the moon” hard, or “land a person on the surface of the sun” hard. They’re both hard, but very different.

242
242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent Phishing Attacks with Multi-Factor Authentication

Tech Republic Security

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.

article thumbnail

23andMe data breach: Hackers stole raw genotype data, health reports

Bleeping Computer

Genetic testing provider 23andMe confirmed that hackers stole health reports and raw genotype data of customers affected by a credential stuffing attack that went unnoticed for five months, from April 29 to September 27. [.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Malicious AdTech Spies on People as NatSec Targets

Security Boulevard

Targeted ads target targets: Patternz and Nuviad enable potentially hostile governments to track individuals by misusing ad bidding. The post Malicious AdTech Spies on People as NatSec Targets appeared first on Security Boulevard.

article thumbnail

Hackers target WordPress database plugin active on 1 million sites

Bleeping Computer

Malicious activity targeting a critical severity flaw in the 'Better Search Replace' WordPress plugin has been detected, with researchers observing thousands of attempts in the past 24 hours. [.

140
140

More Trending

article thumbnail

Cisco warns of critical RCE flaw in communications software

Bleeping Computer

Cisco is warning that several of its Unified Communications Manager (CM) and Contact Center Solutions products are vulnerable to a critical severity remote code execution security issue. [.

Software 138
article thumbnail

CVE-2024-0402: GitLab Releases Urgent Security Patches for Critical Vulnerability

Penetration Testing

GitLab has addressed a critical severity vulnerability that could allow an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace. GitLab is a web-based DevOps platform that... The post CVE-2024-0402: GitLab Releases Urgent Security Patches for Critical Vulnerability appeared first on Penetration Testing.

article thumbnail

AI is already being used by ransomware gangs, warns NCSC

Graham Cluley

In a newly published report, the UK's National Cyber Security Centre (NCSC) has warned that malicious attackers are already taking advantage of artificial intelligence and that the volume and impact of threats - including ransomware - will increase in the next two years. Read more in my article on the Tripwire State of Security blog.

article thumbnail

iPhone apps abuse iOS push notifications to collect user data

Bleeping Computer

Numerous iOS apps are using background processes triggered by push notifications to collect user data about devices, potentially allowing the creation of fingerprinting profiles used for tracking. [.

Mobile 127
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cisco warns of a critical bug in Unified Communications products, patch it now!

Security Affairs

Cisco addressed a critical flaw in its Unified Communications and Contact Center Solutions products that could lead to remote code execution. Cisco released security patches to address a critical vulnerability, tracked as CVE-2024-20253 (CVSS score of 9.9), impacting multiple Unified Communications and Contact Center Solutions products. An unauthenticated, remote attacker can exploit the flaw to execute arbitrary code on an affected device.

Hacking 124
article thumbnail

Tesla hacked again, 24 more zero-days exploited at Pwn2Own Tokyo

Bleeping Computer

Security researchers hacked the Tesla infotainment system and demoed a total of 24 zero-days on the second day of the Pwn2Own Automotive 2024 hacking competition. [.

Hacking 128
article thumbnail

AI Will Fuel Rise in Ransomware, UK Cyber Agency Says

Security Boulevard

The accelerating innovation of generative AI will increase the risks of ransomware and other cyberthreats over the next two years as bad actors integrate the technologies into their nefarious operations, according to a report this week from the UK’s top cybersecurity agency. The National Cyber Security Centre (NCSC) warned that the volume and impact of.

article thumbnail

Blackwood hackers hijack WPS Office update to install malware

Bleeping Computer

A previously unknown advanced threat actor tracked as 'Blackwood' is using sophisticated malware called NSPX30 in cyberespionage attacks against companies and individuals. [.

Malware 120
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CI/CD Pipeline Security: Best Practices Beyond Build and Deploy

Security Boulevard

CI/CD Pipeline Security Given the demand for rapid innovation and the adoption of agile methodologies, Continuous Integration/Continuous Deployment (CI/CD) pipelines have become the foundation on which all DevOps processes are built. They are the backbone of efficient delivery. In fact, according to to the State of Continuous Delivery report, using CI/CD tools correlates with better.

Software 118
article thumbnail

Are site safety briefings best delivered on-site or at home?

IT Security Guru

Site safety briefings are an essential – and legally necessary – part of the onboarding process for any new starter on a construction site. By offering in-depth safety knowledge to a worker before they begin, construction companies are arming them with all the information they need to keep themselves and their fellow colleagues safe. But with the rise of digital and cloud technology, these companies now have more options than ever to deliver this information in a format that may diff

Software 116
article thumbnail

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024

Security Boulevard

As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena. The post The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024 appeared first on Security Boulevard.

article thumbnail

Zoho Vault Review (2024): Pricing, Features, Pros & Cons

Tech Republic Security

While its decision to leave some user data unencrypted is a miss, Zoho Vault’s business-centered password management features may warrant a second look.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

That new X cryptocurrency? It’s a scam.

Security Boulevard

In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using the likeness of Elon Musk. This quarter, we uncovered advertisements featuring Musk to promote a supposed new cryptocurrency. The irony is striking – these ads were paid for and displayed on a platform owned by Musk himself, creating a deceptive endorsement loop.

Scams 117
article thumbnail

Memory Scanning for the Masses

Fox IT

Author: Axel Boesenach and Erik Schamper In this blog post we will go into a user-friendly memory scanning Python library that was created out of the necessity of having more control during memory scanning. We will give an overview of how this library works, share the thought process and the why’s. This blog post will not cover the inner workings of the memory management of the respective platforms.

Malware 110
article thumbnail

Zscaler Adds SASE Offering to Zero-Trust Portfolio of Cloud Services

Security Boulevard

Zscaler added a SASE based on its existing cloud platform through which it provides access to specific apps via encrypted TLS tunnels. The post Zscaler Adds SASE Offering to Zero-Trust Portfolio of Cloud Services appeared first on Security Boulevard.

article thumbnail

Assessing and mitigating supply chain cybersecurity risks

We Live Security

Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Risk 114
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Guide: The Best Cybersecurity Conferences and Events of 2024

Security Boulevard

There is no doubt that our world has never seen as much data as what. The post Guide: The Best Cybersecurity Conferences and Events of 2024 appeared first on Security Boulevard.

article thumbnail

AllaKore RAT: The Trojan Horse Targeting Mexico’s Financial Titans

Penetration Testing

In a cyber landscape increasingly dominated by sophisticated threats, a recent campaign was found targeting Mexican financial institutions and cryptocurrency trading platforms. This operation, driven by a financially motivated threat actor, utilizes a modified... The post AllaKore RAT: The Trojan Horse Targeting Mexico’s Financial Titans appeared first on Penetration Testing.

article thumbnail

Linux Kernel 6.7 Released with Various Security Improvements

Security Boulevard

Linus Torvalds has announced the release of Linux kernel 6.7, featuring various improvements and new features. One major addition is the bcachefs file system, designed to compete with Btrfs and ZFS for modern features while maintaining the speed of EXT4 and XFS. This article aims to explore the security features and updates introduced in this […] The post Linux Kernel 6.7 Released with Various Security Improvements appeared first on TuxCare.

110
110
article thumbnail

Malicious ads for restricted messaging applications target Chinese users

Malwarebytes

An ongoing campaign of malicious ads has been targeting Chinese-speaking users with lures for popular messaging applications such as Telegram or LINE with the intent of dropping malware. Interestingly, software like Telegram is heavily restricted and was previously banned in China. Many Google services, including Google search, are also either restricted or heavily censored in mainland China.

Malware 106
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Scoping Chatbots for Safe and Effective Experiences

Security Boulevard

The most effective chatbots are secure, ethical and customizable to align with an organization’s structure and specific use cases. The post Scoping Chatbots for Safe and Effective Experiences appeared first on Security Boulevard.

article thumbnail

Russian TrickBot malware dev sentenced to 64 months in prison

Bleeping Computer

Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his role in creating and distributing the Trickbot malware used in attacks against hospitals, companies, and individuals worldwide. [.

Malware 105
article thumbnail

Top Cyber-Threat Techniques in Q4 2023: What We’re Seeing

Digital Shadows

Find out the most notable trends of 2023’s final quarter, to set priorities and alerts for 2024. We cover techniques used to achieve initial access, defense evasion, command-and-control, and impact.

article thumbnail

SystemBC Malware's C2 Server Analysis Exposes Payload Delivery Tricks

The Hacker News

Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. "SystemBC can be purchased on underground marketplaces and is supplied in an archive containing the implant, a command-and-control (C2) server, and a web administration portal written in PHP," Kroll said in an analysis published last week.

Malware 104
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.