Thu.Dec 12, 2024

article thumbnail

Operation PowerOFF took down 27 DDoS platforms across 15 countries

Security Affairs

Operation PowerOFF took down 27 DDoS stresser services globally, disrupting illegal platforms used for launching cyberattacks. A global law enforcement operation codenamed Operation PowerOFF disrupted 27 of the most popular platforms (including zdstresser.net, orbitalstress.net, and starkstresser.net) to launch Distributed Denial-of-Service (DDoS) attacks. “Law enforcement agencies worldwide have disrupted a holiday tradition for cybercriminals: launching Distributed Denial-of-Service (DDo

DDOS 112
article thumbnail

Sweet Treats, Sour Breach: Cyberattack Hits Krispy Kreme

SecureWorld News

When most people think of Krispy Kreme, they picture warm, glazed doughnuts and coffee, not cyberattacks. Yet, the recent cybersecurity breach at the beloved doughnut chain highlights critical lessons for organizations of all sizes and industries. The details of the Krispy Kreme hack are still emerging, but the companys Form 8-K filing brought the incident to light, offering a rare glimpse into the challenges businesses face when their systems are compromised.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Careto is back: what’s new after 10 years of silence?

SecureList

During the first week of October, Kaspersky took part in the 34th Virus Bulletin International Conference , one of the longest-running cybersecurity events. There, our researchers delivered multiple presentations, and one of our talks focused on newly observed activities by the Careto threat actor, which is also known as “The Mask” You can watch the recording of this presentation here: The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks sinc

Malware 110
article thumbnail

Update now! Apple releases new security patches for vulnerabilities in iPhones, Macs, and more

Malwarebytes

Apple has released security patches for most of its operating systems, including iOS, Mac, iPadOS, Safari, and visionOS. To check if youre using the latest software version, go to Settings (or System Settings ) > General > Software Update. Its also worth turning on Automatic Updates if you havent already, which you can do on the same screen. iPadOS update available Updates are available for: Safari 18.2 macOS Ventura and macOS Sonoma iOS 18.2 and iPadOS 18.2 iPhone XS and later, iPad Pro

Mobile 125
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

AI Slop is Hurting Security — LLMs are Dumb and People are Dim

Security Boulevard

Artificial stupidity: Large language models are terrible if you need reasoning or actual understanding. The post AI Slop is Hurting Security LLMs are Dumb and People are Dim appeared first on Security Boulevard.

article thumbnail

Data brokers should stop trading health and location data, new bill proposes

Malwarebytes

Senators introduced a bill on Tuesday that would prohibit data brokers from selling or transferring location and health data. Data brokers have drawn attention this year by leaking several large databases, with the worst being the National Public Data leak. The data breach made international headlines because it affected hundreds of millions of people, and it included Social Security Numbers.

LifeWorks

More Trending

article thumbnail

Experts discovered surveillance tool EagleMsgSpy used by Chinese law enforcement

Security Affairs

Chinese law enforcement uses the mobile surveillance tool EagleMsgSpy to gather data from Android devices, as detailed by Lookout. Researchers at the Lookout Threat Lab discovered a surveillance tool, dubbed EagleMsgSpy, used by Chinese law enforcement to spy on mobile devices. The researchers analyzed multiple samples of the malware and gained access to internal documents obtained from open directories on attacker infrastructure.

article thumbnail

Google Launches Gemini 2.0 with Autonomous Tool Linking

Tech Republic Security

Gemini 2.0 Flash is available now, with other model sizes coming in January. It adds multilingual voice output, image output, and some trendy agentic capabilities.

article thumbnail

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

The Hacker News

Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information. The flaw, tracked as CVE-2024-44131 (CVSS score: 5.

141
141
article thumbnail

This Is Why Hackers First Favorite Operating System Is Linux!

Hacker's King

Kali Linux is often associated with hackers, but is it truly a tool only for them? In this article, well explore Kali Linux , its purpose, and whether its exclusively for hackers or useful for anyone interested in cybersecurity. Whether you're an aspiring ethical hacker or a security enthusiast, Kali Linux offers powerful tools for learning and professional use.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online

The Hacker News

Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks.

article thumbnail

A Year in Data Security: Five Things We’ve Learned From 2024

Security Boulevard

As the dust settles on another hectic 12 months, business and IT leaders should enjoy a well-earned break. But not for long. The end of one year offers a fantastic vantage point from which to view the macro trends that may go on to shape the next. With this in mind, these are the five things weve learned about cybersecurity in 2024. The post A Year in Data Security: Five Things Weve Learned From 2024 appeared first on Security Boulevard.

article thumbnail

Russia’s Secret Blizzard APT targets Ukraine with Kazuar backdoor

Security Affairs

Russia-linked APT group Secret Blizzardis using Amadey Malware-as-a-Service to infect systems in Ukraine with the Kazuar backdoor. The Russia-linked APT group Secret Blizzard (aka Turla , Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON )was spotted using the Amadey malware to deploy the KazuarV2 backdoor on devices in Ukraine. Microsoft also assesses that in January 2024, Secret Blizzard used the backdoor of Storm-1837, a Russia-based threat actor, to download the Tavdig and KazuarV2 bac

article thumbnail

WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

The Hacker News

Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, tracked as CVE-2024-11972 (CVSS score: 9.8), affects all versions of the plugin prior to 1.9.0. The plugin has over 10,000 active installations.

Risk 128
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1

Security Boulevard

AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024. The post Emulating the Financially Motivated Criminal Adversary FIN7 Part 1 appeared first on AttackIQ. The post Emulating the Financially Motivated Criminal Adversary FIN7 Part 1 appeared first on Security Boulevard.

article thumbnail

Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States

The Hacker News

The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. "BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims," Lookout said in an analysis.

Spyware 125
article thumbnail

GenAI to Advanced Microsegmentation: Secure Workload 3.10 Has It All!

Cisco Security

Secure Workload platform has taken a significant leap forward with the launch of its 3.10 release earlier this month packed with Gen AI and many more.

108
108
article thumbnail

FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized

The Hacker News

The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox ("rydox[.]ru" and "rydox[.]cc") for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud. In tandem, three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli, have been arrested.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Charges Against CISOs Create Worries, Hope in Security Industry: Survey

Security Boulevard

A survey of IT security pros by cybersecurity firm BlackFog found that 70% of them said federal cases like that against SolarWinds' CISO hurt their opinion about the position, but some said they expected the boards of directors would take the issues of security more seriously. The post Charges Against CISOs Create Worries, Hope in Security Industry: Survey appeared first on Security Boulevard.

CISO 104
article thumbnail

SaaS Budget Planning Guide for IT Professionals

The Hacker News

SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, its no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity.

107
107
article thumbnail

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion

Trend Micro

In this blog entry, we discuss a social engineering attack that tricked the victim into installing a remote access tool, triggering DarkGate malware activities and an attempted C&C connection.

article thumbnail

US Bitcoin ATM operator Byte Federal suffered a data breach

Security Affairs

US Bitcoin ATM operator Byte Federal suffered a data breach impacting 58,000 customers, attackers gained unauthorized access to a server via GitLab flaw. US Bitcoin ATM operator Byte Federal disclosed a data breach after threat actors gained unauthorized access to a company server by exploiting a GitLab vulnerability. Byte Federal is a company specializing in cryptocurrency services through its network of over 1,200 Bitcoin ATMs across the United States.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Charity Scams During the Holidays: How to Verify Legitimate Charities

Security Boulevard

The holiday season is a time of giving and generosity, but its also a prime time for scammers to take advantage of peoples goodwill. According to the FBI, charity scams increase significantly during the holidays as criminals look to exploit those who wish to donate to a good cause. Heres how you can verify the [] The post Charity Scams During the Holidays: How to Verify Legitimate Charities appeared first on BlackCloak | Protect Your Digital Life.

Scams 52
article thumbnail

Experts discovered the first mobile malware families linked to Russia’s Gamaredon

Security Affairs

The Russia-linked APT Gamaredon used two new Android spyware tools calledBoneSpyandPlainGnome against former Soviet states. Lookout researchers linked the BoneSpy and PlainGnome Android surveillance families to the Russian APT group Gamaredon (a.k.a. Armageddon , Primitive Bear, and ACTINIUM). These are the first known mobile malware families linked to the Russian APT.

Mobile 100
article thumbnail

Black Hat Europe 2024: Can AI systems be socially engineered?

We Live Security

Attackers could use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally in carrying out malicious activities

article thumbnail

This Pixel feature can improve your phone's battery health - how to turn it on

Zero Day

Google's bypass charging feature lets you cap your phone's battery charge at 80%. There are two great reasons you'll want to take advantage of that.

89
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Active Exploitation Observed for CVE-2024-11972 (CVSS 9.8): WordPress Plugin Flaw Exposes 10,000+ Sites to Backdoor Attacks

Penetration Testing

A serious vulnerability in the Hunk Companion plugin for WordPress, tracked as CVE-2024-11972 (CVSS 9.8), has been discovered by the WPScan team. This flaw, present in versions below 1.9.0, allows... The post Active Exploitation Observed for CVE-2024-11972 (CVSS 9.8): WordPress Plugin Flaw Exposes 10,000+ Sites to Backdoor Attacks appeared first on Cybersecurity News.

article thumbnail

The best small tablets of 2025: Expert tested and reviewed

Zero Day

Bigger doesn't always mean better in the tablet world. We tested the best small tablets that combine affordability, great battery life, and fast processors in a small form factor.

75
article thumbnail

APT-C-60 Exploits Legitimate Services in Sophisticated Malware Attack Targeting Japanese Organizations

Penetration Testing

In August 2024, JPCERT/CC confirmed a targeted attack against a Japanese organization, believed to be the work of the threat group APT-C-60. This advanced campaign utilized legitimate services like Google... The post APT-C-60 Exploits Legitimate Services in Sophisticated Malware Attack Targeting Japanese Organizations appeared first on Cybersecurity News.

Malware 84
article thumbnail

A Critical Guide to PCI Compliance

Thales Cloud Protection & Licensing

A Critical Guide to PCI Compliance madhav Thu, 12/12/2024 - 08:28 You are shopping online, adding items to your cart, and you're ready to pay with your credit card. You expect that when you hit "Checkout," your payment details will be safe. This sense of trust exists thanks largely to PCI DSSthe Payment Card Industry Data Security Standard. PCI DSS is a security system for your credit card and its data.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!