Thu.Mar 06, 2025

article thumbnail

Federal Contractor Cybersecurity Vulnerability Reduction Act Passes in U.S. House

SecureWorld News

Cybersecurity threats against federal contractors are escalating, with adversaries continuously seeking vulnerabilities within governmental supply chains. To address this challenge, the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025 (HR 872) is poised to mandate stronger security measures across contractors working with the U.S. government.

article thumbnail

The Combined Cipher Machine

Schneier on Security

Interesting article —with photos!—of the US/UK “Combined Cipher Machine” from WWII.

232
232
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Elastic patches critical Kibana flaw allowing code execution

Security Affairs

Elasticfixed a critical flaw inthe Kibanadata visualization dashboard software forElasticsearchthat could lead to arbitrary code execution. Elasticreleased security updates to address a critical vulnerability, tracked asCVE-2025-25012 (CVSS score of 9.9), impacting the Kibana data visualization dashboard software forElasticsearch. Kibana provides visualization capabilities on top of the content indexed on an Elasticsearch cluster.

article thumbnail

Hackers Made $600,000 Selling Stolen Taylor Swift Concert Tickets

Security Boulevard

Employees of a third-party company hacked into StubHub's computer system, stole almost 1,000 digital tickets to Taylor Swift concerts and other events, and emailed them to conspirators in New York, who then sold them on StubHub in a scheme that brought them $635,000 in profit. The post Hackers Made $600,000 Selling Stolen Taylor Swift Concert Tickets appeared first on Security Boulevard.

Hacking 64
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Pentagon Cuts Threaten Programs That Secure Loose Nukes and Weapons of Mass Destruction

WIRED Threat Level

Documents obtained by WIRED show the US Department of Defense is considering cutting up to 75 percent of workers who stop the spread of chemical, biological, and nuclear weapons.

145
145
article thumbnail

Deciphering Black Basta’s Infrastructure from the Chat Leak

Security Boulevard

By Oleg Lypko, with Estelle Ruellan and Tammy Harper (Flare Research) This article has originally appeared on Cybercrime Diaries On February 20, 2025, the cybersecurity community received an unexpected stroke of luck as internal strife seemingly spread within the infamous Black Basta ransomware group. On that day, an unknown individual using the alias ExploitWhispers released [] The post Deciphering Black Bastas Infrastructure from the Chat Leak appeared first on Flare | Cyber Threat Intel

LifeWorks

More Trending

article thumbnail

Emulating the Relentless RansomHub Ransomware

Security Boulevard

AttackIQ has released a new attack graph emulating the behaviors exhibited by RansomHub ransomware since its emergence in February 2024. This sophisticated ransomware employs double extortion techniques and shares notable similarities with Knight ransomware. The post Emulating the Relentless RansomHub Ransomware appeared first on AttackIQ. The post Emulating the Relentless RansomHub Ransomware appeared first on Security Boulevard.

article thumbnail

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

The Hacker News

Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that injects four separate backdoors. "Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed," c/side researcher Himanshu Anand said in a Wednesday analysis. The malicious JavaScript code has been found to be served via cdn.

128
128
article thumbnail

Why Traditional Security Tools Fail to Detect Breaches [+ 4 Examples]

Security Boulevard

Cybersecurity tools have evolved significantly over the years, yet organizations are still experiencing devastating breaches at an alarming rate. High-profile cyberattacks continue to dominate headlines, raising the question: If companies are investing heavily in security tools like endpoint protection (EPP), security information and event management (SIEM), vulnerability management (VM), and threat detection and response (TDR), why are breaches still happeningand why does the problem seem to be

article thumbnail

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

The Hacker News

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-25012, carries a CVSS score of 9.9 out of a maximum of 10.0. It has been described as a case of prototype pollution.

Software 125
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

DEF CON 32 – War Stories – Hacking Millions Of Modems And Investigating Who Hacked My Modem

Security Boulevard

Author/Presenter: Sam Curry Our sincere appreciation to DEF CON , and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conferences events located at the Las Vegas Convention Center ; and via the organizations YouTube channel. Permalink The post DEF CON 32 – War Stories – Hacking Millions Of Modems And Investigating Who Hacked My Modem appeared first on Security Boulevard.

Hacking 52
article thumbnail

I wore a low-cost, OTC continuous glucose monitor for two weeks - what I learned

Zero Day

The Abbott Lingo CGM is a different kind of meal tracker, and I recommend it to anyone who's bio-wearable-curious. Here's why.

119
119
article thumbnail

Indictments of Chinese Cyber Spies Reveal Hacker-For-Hire Operation

Security Boulevard

The U.S. DOJ indicted a dozen Chinese nationals for their role in a years-long hacker-for-hire campaign that included the Chinese government using private companies and freelance hackers to steal data from U.S. and other governments while obscuring its role in the attacks. The post Indictments of Chinese Cyber Spies Reveal Hacker-For-Hire Operation appeared first on Security Boulevard.

article thumbnail

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

The Hacker News

Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto heist is a "highly sophisticated, state-sponsored attack," stating the North Korean threat actors behind the hack took steps to erase traces of the malicious activity in an effort to hamper investigation efforts.

Hacking 114
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How Cisco, LangChain, and Galileo aim to contain 'a Cambrian explosion of AI agents'

Zero Day

This open-source collective proposes an internet of agents - an open, scalable way to connect and coordinate AI across different frameworks, vendors,

Internet 111
article thumbnail

PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectors

The Hacker News

Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025.

109
109
article thumbnail

Did you get an E-ZPass text demanding payment? Don't click - it's a scam

Zero Day

E-ZPass phishing texts seem to be hitting everyone - even non-drivers. Here's what to watch for and what to do if you receive one.

Scams 107
article thumbnail

How can NHIs be incorporated into our overall security strategy?

Security Boulevard

Do Non-Human Identities Play a Significant Role in Our Security Strategy? Indeed, they do. Non-Human Identities (NHIs) are becoming increasingly crucial in the security scenario and their importance in corporate IT ecosystems cant be overstressed. Incorporating them into your overall cybersecurity strategy has proven to help organizations fortify their infrastructure against potential threats and vulnerabilities, [] The post How can NHIs be incorporated into our overall security strategy?

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Finally, open-ear headphones that sound great and fit me comfortably

Zero Day

The EarFun OpenJump open-ear earbuds have all-day comfort and a surprisingly extensive level of customization.

105
105
article thumbnail

How can I align NHI management with our digital transformation initiatives?

Security Boulevard

Why is Non-Human Identities Management Critical for Digital Transformation? Have you ever considered the sheer quantity of non-human identities (NHIs) that exist within your corporate network? These NHIs, also known as machine identities, play an integral role but are often overlooked. When organizations increasingly leverage cloud-based solutions in their digital transformation journey, the successful management [] The post How can I align NHI management with our digital transformation initiati

article thumbnail

How to protect yourself from tax-related scams in 2025: 10 expert tips

Zero Day

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency.

Scams 104
article thumbnail

How to Install Librewolf

Security Boulevard

When configured properly, Mozilla Firefox offers great privacy and security. However, achieving a higher level of privacy and security in Mozilla Firefox requires many tweaks across all levels. Some users may not be too comfortable with this and may prefer an out-of-the-box solution that isn't Chromium dependent. Enter Librewolf - which aims to be user privacy and security focused straight from first launch.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

The Hacker News

The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware, while also working on a new product called EncryptRAT.

Phishing 103
article thumbnail

I never travel without these universal chargers - and they can power laptops

Zero Day

Not all universal travel adapters are the same. Picking the right one can greatly enhance your travel experience, and this lineup is a reliable choice.

98
article thumbnail

Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

The Hacker News

The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and 2024. In the first two months of 2025 alone, the group has claimed over 40 attacks, according to data from the Symantec Threat Hunter Team said in a report shared with The Hacker News.

article thumbnail

Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations

Security Boulevard

Agentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches. The post Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations appeared first on D3 Security. The post Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations appeared first on Security Boulevard.

52
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The lightest 16-inch convertible laptop I've tested comes with a free portable monitor

Zero Day

The LG Gram Pro 16 2-in-1 combines a gorgeous OLED display with an ultralight form factor. And right now, LG is giving away a free portable monitor with purchase.

94
article thumbnail

Save 70% on a Course Showing You How to Invest in Crypto

Tech Republic Security

In this online training course, learn about NFTs, blockchain, decentralized apps, and more.

article thumbnail

Roku TV is expanding to another major brand - and its OLED model looks promising

Zero Day

Roku TV is expanding its lineup to include Philips for the first time, featuring an OLED model available exclusively at a select retailer.

Retail 93
article thumbnail

Outsmarting Cyber Threats with Attack Graphs

The Hacker News

Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static vulnerability lists to stay secure. Instead, they need a dynamic approach that provides real-time insights into how attackers move through their environment. This is where attack graphs come in.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!