Tue.Jan 21, 2025

article thumbnail

AI tool GeoSpy analyzes images and identifies locations in seconds

Malwarebytes

It’s just become even more important to be conscious about the pictures we post online. GeoSpy is an Artificial Intelligence (AI) supported tool that can derive a persons location by analyzing features in a photo like vegetation, buildings, and other landmarks. And it can do so in seconds based on one picture. Graylark Technologies who makes GeoSpy says its been developed for government and law enforcement.

Media 144
article thumbnail

Experts found multiple flaws in Mercedes-Benz infotainment system

Security Affairs

Kaspersky researchers shared details about multiple vulnerabilities impacting the Mercedes-Benz MBUX infotainment system. Kaspersky published research findings on the first-generation Mercedes-Benz User Experience (MBUX) infotainment system, specifically focusing on the Mercedes-Benz Head Unit. The researchers started from the results of another study conducted by KeenLab on the MBUX internals.

Software 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From Pest Control to Cybersecurity: What CISOs Can Learn from Pestie

SecureWorld News

As I was spraying Pestiea DIY pest spray subscription servicearound my home this weekend (sun's out, spray gun's out), I was thinking about the correlation of this home perimeter defense to what CISOs and their teams do to keep their organizations secure. Keeping pests out of your home and keeping cyber threats out of your organization might seem worlds apart, but there are surprising parallels between the two.

CISO 111
article thumbnail

CERT-UA warned of scammers impersonating the agency using fake AnyDesk requests

Security Affairs

CERT-UA warned of scammers impersonating the agency, using fake AnyDesk requests to conduct fraudulent security audits. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of cyber scams involving threat actors impersonating the agency by sending fraudulent AnyDesk connection requests under the guise of security audits. CERT-UA pointed out that it uses the software AnyDesk in some cases, but only with prior approval via official channels. “The Ukrainian government’s comp

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The Future of Automotive Cybersecurity: Why Learning Car Hacking is Essential 

Security Boulevard

As vehicles become smarter, the stakes for securing them grow higher. Learning car hacking is no longer a niche skill its a necessity for anyone interested in the future of cybersecurity. The post The Future of Automotive Cybersecurity: Why Learning Car Hacking is Essential appeared first on Security Boulevard.

Hacking 117
article thumbnail

Why MSPs need proactive, 24/7 threat hunting

Webroot

Cybercriminals are becoming increasingly sophisticated, agile, and fast. For managed service providers (MSPs) supporting small and medium-sized businesses (SMBs) with cybersecurity services, staying ahead of these adversaries is crucial. One of the most effective ways to do so is through round-the-clock threat hunting. In this blog, we’ll explore why constant threat hunting is essential, the challenges MSPs face in providing it, and how OpenText MDR can help overcome these challenges while

LifeWorks

More Trending

article thumbnail

New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers

Security Affairs

Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called Murdoc Botnet. Murdoc Botnet is a new Mirai botnet variant that targets vulnerabilities in AVTECH IP cameras and Huawei HG532 routers, the Qualys Threat Research Unit reported. The botnet has been active since at least July 2024, the experts discovered that over 1300 IPs werefound active on this campaign.

IoT 86
article thumbnail

Forescout Report Detail Hunters International Ransomware Gang Tactics

Security Boulevard

An analysis of the operations of Hunters International, the ransomware-as-a-service platform that has been used to compromise more than 200 organizations, conducted by Forescout Technologies reveals the cybercriminal syndicate that created it is employing a wide range of new and old tactics and techniques. The post Forescout Report Detail Hunters International Ransomware Gang Tactics appeared first on Security Boulevard.

article thumbnail

‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security

Tech Republic Security

The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes.

article thumbnail

Cyber Hygiene: Strengthening Your Digital Immune System Through Routine Maintenance

Security Boulevard

Good cyber hygiene isnt a one-time effort; its an ongoing process that requires diligence, awareness and consistency. The post Cyber Hygiene: Strengthening Your Digital Immune System Through Routine Maintenance appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Former CIA analyst pleaded guilty to leaking top-secret documents

Security Affairs

A former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024. Asif William Rahman, a former CIA analyst with Top-Secret clearance since 2016, pleaded guilty to leaking classified information on social media in October 2024. Rahman has access to Sensitive Compartmented Information (SCI).

Media 71
article thumbnail

Three Keys to Modernizing Data Security: DSPM, AI, and Encryption

Thales Cloud Protection & Licensing

Three Keys to Modernizing Data Security: DSPM, AI, and Encryption andrew.gertz@t Tue, 01/21/2025 - 14:56 Discover how DSPM, AI, and encryption are transforming data security strategies, reducing vulnerabilities, and improving compliance. Data Security Cloud Security Security Intelligence Lynne Murray | Director of Product Marketing for Data Security More About This Author > Organizations worldwide face a perfect storm of increasing and ever-evolving cyber threats.

article thumbnail

API Security’s Role in Responsible AI Deployment

Security Boulevard

By now, you will almost certainly be aware of the transformative impact artificial intelligence (AI) technologies are having on the world. What you may not be aware of, however, is the role Application Programming Interfaces (APIs) are playing in the AI revolution. The bottom line is that APIs are critical to AI systems but [.] The post API Securitys Role in Responsible AI Deployment appeared first on Wallarm.

article thumbnail

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device

The Hacker News

Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia.

DDOS 139
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to set up God Mode in Windows 11 - and the wonders you can do with it

Zero Day

God Mode provides easy access to an array of Windows settings from one single window. Here's how it works.

138
138
article thumbnail

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

The Hacker News

Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances.

136
136
article thumbnail

PlushDaemon compromises supply chain of Korean VPN service

We Live Security

ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon

VPN 132
article thumbnail

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

The Hacker News

Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc_Botnet.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft is forcing Windows 11 24H2 update on all eligible PCs, but is it stable enough?

Zero Day

Computers running the Home and Pro flavors of Windows 11 23H2 and 22H2 will gradually be updated, whether you like it or not.

128
128
article thumbnail

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

The Hacker News

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity.

127
127
article thumbnail

How ChatGPT solved an Ancestry DNA mystery for me and my long-lost cousin

Zero Day

Even though we share just 1% of our DNA, my third cousin and I used AI to connect the dots between generations. Here's how and what we learned.

128
128
article thumbnail

CVE-2025-23083: Node.js Vulnerability Exposes Sensitive Data and Resources

Penetration Testing

The Node.js project has released updates to address several security vulnerabilities, including a high-severity flaw that could allow The post CVE-2025-23083: Node.js Vulnerability Exposes Sensitive Data and Resources appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

The Hacker News

A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity "take[s] advantage of misconfigured DNS records to pass email protection techniques," Infoblox security researcher David Brunsdon said in a technical report published last week.

DNS 126
article thumbnail

How to tell if an AirTag is secretly tracking you - and what to do about it

Zero Day

Apple's trackers have been misused to track some without their consent. Here's how to check if an AirTag is tracking you, whether you use an iPhone or Android phone. Plus, what to do next if you find one.

122
122
article thumbnail

Critical Apache Ambari Security Vulnerabilities Discovered: What You Need to Know

Penetration Testing

Critical flaws in the popular Hadoop management platform leave systems open to remote code execution and data breaches. The post Critical Apache Ambari Security Vulnerabilities Discovered: What You Need to Know appeared first on Cybersecurity News.

article thumbnail

The Excel World Championship is real, and it just crowned the king of spreadsheets

Zero Day

The winner got $5,000, a fancy title, and perhaps most importantly -- a real championship title belt.

116
116
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Invisible Prompt Injection: A Threat to AI Security

Trend Micro

This article explains the invisible prompt injection, including how it works, an attack scenario, and how users can protect themselves.

article thumbnail

How to retrieve recently deleted texts on an iPhone

Zero Day

Need to revive a text that you inadvertently deleted? That's possible, at least if you act quickly enough.

115
115
article thumbnail

Best Automated Patch Management Software in 2025

Heimadal Security

Did you know? Recent research shows that 80% of cyberattacks happen due to unpatched software vulnerabilities. This highlights the critical role of automated patch management software in safeguarding systems. These tools not only streamline updates but also fortify your systems against evolving cyber threats. In this article, well talk about the best automated patch […] The post Best Automated Patch Management Software in 2025 appeared first on Heimdal Security Blog.

article thumbnail

Can you make an AirTag last 10 years? I just did with this clever gadget

Zero Day

I have over a dozen AirTags in use, and my biggest bugbear is having to change the batteries every year or so. No more!

111
111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!