Sat.Mar 08, 2025

article thumbnail

Akira ransomware gang used an unsecured webcam to bypass EDR

Security Affairs

The Akira ransomware gang exploited an unsecured webcam to bypass EDR and launch encryption attacks on a victim’s network. Cybersecurity researchers at S-RM team discovered a novel attack technique used by the Akira ransomware gang. The ransomware group used an unsecured webcam to encrypt systems within atarget’s network, bypassing Endpoint Detection and Response (EDR).

article thumbnail

Women in Cybersecurity & IWD: Why I’m Done!

Jane Frankland

For nearly a decade, we’ve heard the same discussion in cybersecurity circles about the gender diversity problem. As the first women owned penetration testing provider in the UK some 28-years ago, Ive researched, campaigned, written, spoken and stepped up as a visible role model, always presenting the business case. I’ve also watched how panels, passion projects, and awareness campaigns touting the need for inclusivity and diversity have come and gone including my own.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 442

Troy Hunt

We survived the cyclone! That was a seriously weird week with lots of build-up to an event that last occurred before I was born. It'd been 50 years since a cyclone came this far south, and the media was full of alarming predictions of destruction. In the end, we maxed out at 52kts just after I recorded this video: It’s here. But 47kts max gusts isn’t too bad, nothing actually blowing over here (yet). pic.twitter.com/qFyrZdiyRW — Troy Hunt (@troyhunt) March 7, 2025 We re

Phishing 145
article thumbnail

Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies

Security Affairs

A data breach suffered by the Japanese telecom giant NTT exposed information of nearly 18,000 corporate customers. Japanese telecom giant NTT suffered a data breach that exposed information of nearly 18,000 corporate customers. On February 5th, the security team detected suspicious activity in its ‘Order Information Distribution System,’ and immediately restricted access to device A. “NTT Communications Corporation (NTT Com) discovered that its facilities had been illegally acc

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

BananaGun Bot: The Ultimate Tool for Copytrade and Memecoin Sniping

SecureBlitz

In this post, I’ll talk about the BananaGun Bot, the ultimate tool for Copytrade and Memecoin sniping. Ever felt like your crypto trading tools were stuck in the Stone Age? Enter BananaGun Bot‘s latest upgrades, catapulting your trading experience into the future. The Web App Launch BananaGun Bot, once confined to Telegram, is now stepping […] The post BananaGun Bot: The Ultimate Tool for Copytrade and Memecoin Sniping appeared first on SecureBlitz Cybersecurity.

article thumbnail

Security Affairs newsletter Round 514 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Akira ransomware gang used an unsecured webcam to bypass EDR Japanese telecom giant NTT suffered a data breach that impacted 18,000 companies Mirai-based botnets exploit CVE-2025-1316 zero-day in Edimax IP cameras The Role of Differential Privacy in Prote

More Trending

article thumbnail

This ultraportable Asus laptop gives the M4 MacBook Air a run for its money - and it looks great

Zero Day

Asus' Zenbook A14 is a lightweight 2.1-pound laptop with a stunning OLED display and impressive multi-day battery life. However, its standout feature is its design.

100
100
article thumbnail

Celebrating Women’s Excellence: Happy International Women’s Day!

Responsible Cyber

Today, on International Womens Day , we take a moment to honor, celebrate, and empower the incredible women who are shaping our world across all fields technology, cybersecurity, risk management, innovation, science, and beyond. Breaking Barriers & Driving Change Women have long been at the forefront of transformation and progress , yet their contributions have often gone unrecognized.

article thumbnail

I tested a Windows PC that outdoes the M4 Mac Mini in several ways - and it's on sale

Zero Day

Minisforum AI X1 Pro is a Windows mini PC with AMD's latest processor and support for an external GPU. But it shines with AI-powered tasks.

92
article thumbnail

CVE-2024-50394: QNAP Helpdesk Vulnerability Could Allow Remote System Compromise

Penetration Testing

QNAP has issued a security advisory regarding an improper certificate validation vulnerability in its Helpdesk app. The vulnerability, The post CVE-2024-50394: QNAP Helpdesk Vulnerability Could Allow Remote System Compromise appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

I replaced my iPhone 16 Pro with the 16e for a week - here's my buying advice now

Zero Day

If you care about Apple Intelligence, owning the latest iPhone for less money, and not so much the number of cameras at your disposal, this phone is a win.

90
article thumbnail

Cybercriminals Allegedly Used a StubHub Backdoor to Steal Taylor Swift Tickets

WIRED Threat Level

Plus: The worlds largest illicit online marketplace gets hit by regulators, police seize the Garantex crypto exchange, and scammers trick targets by making up ransomware attacks.

article thumbnail

This portable Bluetooth speaker delivers room-filling sound at an extraordinarily low price

Zero Day

Short on space but still want powerful sound? Treblab's HD-GO speaker delivers big audio in a compact package.

89
article thumbnail

Texas to House OpenAI’s Massive New AI Data Center

Penetration Testing

At the beginning of this year, OpenAI, SoftBank, and Oracle, in collaboration with the White House, announced the The post Texas to House OpenAI’s Massive New AI Data Center appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Want to win in the age of AI? You can either build it or build your business with it

Zero Day

In-depth knowledge of generative AI is in high demand - and the need for technical chops and business savvy is converging

87
article thumbnail

Siri’s Big Update Delayed: Apple Confirms 2026 Launch

Penetration Testing

In a statement provided to Daring Fireball, Apple confirmed that the release of the new version of Siridesigned The post Siri’s Big Update Delayed: Apple Confirms 2026 Launch appeared first on Cybersecurity News.

article thumbnail

This smart air purifier opened my eyes to a troublesome metric I had no idea about

Zero Day

The Levoit Sprout smart air purifiers are specifically designed to monitor and improve the air quality in the rooms of those most vulnerable.

60
article thumbnail

Smartwares Security Breach: Vulnerabilities Expose Cameras to Remote Takeover

Penetration Testing

CERT Polska, operating within the National Research Institute (NASK), has unveiled security vulnerabilities affecting Smartwares CIP-37210AT and C724IP The post Smartwares Security Breach: Vulnerabilities Expose Cameras to Remote Takeover appeared first on Cybersecurity News.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Enigma Dropper For Hosting Files and Folders On The Internet

Hacker's King

One key challenge in penetration testing and ethical hacking is deploying payloads across different operating systems without hassle. This is where Enigma , a multiplatform payload dropper , comes into play. Enigma is designed to automate and execute , making it easier for cybersecurity professionals to test system security. In this guide, well explain homework and how to set it up for legal and ethical security assessments.

article thumbnail

Larry Page Backs AI-Powered Manufacturing Startup Dynatomics

Penetration Testing

Reports indicate that Google co-founder Larry Page is investing in Dynatomics, a startup dedicated to enhancing manufacturing efficiency The post Larry Page Backs AI-Powered Manufacturing Startup Dynatomics appeared first on Cybersecurity News.

article thumbnail

New Telegram Vulnerability Evil-Dropper | CVE 2025-1450 Full Details and POC

Hacker's King

Ever thought a simple video file could redirect you to a malicious site? What if clicking a Telegram video preview could expose your IP address, login credentials, or even install malware ? Sounds dangerous, right? Well, thats exactly what Telegram-EvilDropper does. In this guide, well break down how this proof-of-concept (POC) works and how you can set it up for ethical cybersecurity research.

Malware 52
article thumbnail

This compact power bank with 'Beast Mode' is my new travel essential - let me explain

Zero Day

Don't be fooled by its size. The budget-friendly Cuktech 15 Ultra packs plenty of power and ports, making it a solid choice for nearly any charging requirement.

Banking 41
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cybercriminals Exploit DeepSeek’s Popularity to Distribute Trojanized AI Clients

Penetration Testing

With the rapid growth of AI-driven platforms, cybercriminals have wasted no time in exploiting the popularity of DeepSeek, The post Cybercriminals Exploit DeepSeeks Popularity to Distribute Trojanized AI Clients appeared first on Cybersecurity News.

article thumbnail

How can NHI risks be reduced without compromising system performance?

Security Boulevard

Are your Non-Human Identities (NHIs) and Secrets effectively managed? NHIs and Secrets have emerged as crucial elements. However, the question looms: are these entities being effectively managed to reduce risks without compromising system performance? Understanding the Critical Role of NHIs and Secrets NHIs are machine identities used in cybersecurity, akin to digital passports that provide [] The post How can NHI risks be reduced without compromising system performance?

Risk 52
article thumbnail

Trump Signs Executive Order to Establish U.S. Bitcoin Reserve and Digital Asset Stockpile

Penetration Testing

David Sacks, the AI and cryptocurrency chief appointed by President Trump, announced on his personal X page that The post Trump Signs Executive Order to Establish U.S. Bitcoin Reserve and Digital Asset Stockpile appeared first on Cybersecurity News.

article thumbnail

Cruel And Vindictive By Design

Security Boulevard

(This post originally published on 47 Watch) Recent administrative changes at the Social Security Administration (SSA) reveal a concerning pattern of decisions that disproportionately impact vulnerable populations while being implemented in ways that limit public awareness and oversight. Two specific policy reversals highlight this trend: the reinstatement of 100% benefit withholding for overpayments and the [] The post Cruel And Vindictive By Design appeared first on rud.is.

52
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.