Thu.Nov 28, 2024

article thumbnail

Bootkitty: Analyzing the first UEFI bootkit for Linux

We Live Security

ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.

137
137
article thumbnail

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

The Hacker News

A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024. "Cybercriminals have been taking advantage of Godot Engine to execute crafted GDScript code which triggers malicious commands and delivers malware," Check Point said in a new analysis published Wednesday.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

T-Mobile detected network intrusion attempts and blocked them

Security Affairs

T-Mobile reported recent infiltration attempts but pointed out that threat actors had no access to its systems and no sensitive data was compromised. T-Mobile detected recent infiltration attempts but confirmed no unauthorized system access occurred, and no sensitive data was compromised. The carrier is investigating reports that are linking it to “ Salt Typhoon ” cyberattacks tied to Chinese state actors. “Like the entire telecommunications industry, T-Mobile has been closely

Mobile 105
article thumbnail

Zero-Day in Active Directory Certificate Services: Researcher Exposes CVE-2024-49019 with PoC

Penetration Testing

Security researchers from TrustedSec have uncovered a critical zero-day vulnerability, CVE-2024-49019, affecting Active Directory Certificate Services (AD CS). This flaw exploits a feature of version 1 certificate templates, allowing attackers... The post Zero-Day in Active Directory Certificate Services: Researcher Exposes CVE-2024-49019 with PoC appeared first on Cybersecurity News.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

APT trends report Q3 2024

SecureList

Kaspersky’s Global Research and Analysis Team (GReAT) has been releasing quarterly summaries of advanced persistent threat (APT) activity for over seven years now. Based on our threat intelligence research, these summaries offer a representative overview of what we’ve published and discussed in more detail in our private APT reports. They are intended to highlight the significant events and findings that we think are important for people to know about.

Malware 97
article thumbnail

XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner

The Hacker News

Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems.

More Trending

article thumbnail

U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency

The Hacker News

A 59-year-old U.S. citizen who immigrated from the People's Republic of China (PRC) has been sentenced to four years in prison for conspiring to act as a spy for the country and sharing sensitive information about his employer with China's principal civilian intelligence agency.

110
110
article thumbnail

Get a refurbished Amazon Fire HD 10 tablet for as little as $40 with this Black Friday deal

Zero Day

Save big this holiday season on an Amazon Fire HD 10 tablet that's perfect for a kid or casual use.

99
article thumbnail

Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP

The Hacker News

Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated privileges.

Wireless 109
article thumbnail

Want an entire tech repair shop of tools in a single messenger bag? Get 20% off for Black Friday

Zero Day

The iFixit Repair Business Toolkit got a refresh in 2023. I've been using the kit for over a year. Here's what I have inside the bag now.

88
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Future of Serverless Security in 2025: From Logs to Runtime Protection

The Hacker News

Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration.

88
article thumbnail

Scams to look out for this holiday season

We Live Security

‘Tis the season to be wary – be on your guard for fraud doing the rounds during the holiday sales surge

Scams 87
article thumbnail

Data broker exposes 600,000 sensitive files including background checks

Malwarebytes

A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container. The 713.1 GB container (an Amazon S3 bucket ) did not have password-protection, and the data was left unencrypted, so anybody who stumbled on them could read the files. The files not only contained thousands of people’s vehicle records (license plate and VIN) and property ownership reports, but also criminal histories, and background checks.

article thumbnail

Malicious npm Packages Threaten Crypto Developers: Keylogging and Wallet Theft Revealed

Penetration Testing

Researchers at Socket have uncovered a malicious campaign targeting crypto developers. The attacker, operating under the pseudonym “topnotchdeveloper12”, has published three malicious npm packages—crypto-keccak, crypto-jsonwebtoken, and crypto-bignumber—that mimic legitimate cryptographic... The post Malicious npm Packages Threaten Crypto Developers: Keylogging and Wallet Theft Revealed appeared first on Cybersecurity News.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The 25 best Black Friday Best Buy deals 2024: Early sales are live

Zero Day

With Black Friday one away, we've rounded up some top discounts already available at Best Buy.

84
article thumbnail

TikTok Takes Aim at Appearance-Altering Filters and Underage Users in Latest Safety Push

Penetration Testing

In a move driven by both legal pressures and growing concerns about the impact of social media on young people, TikTok has announced new measures to restrict the use of... The post TikTok Takes Aim at Appearance-Altering Filters and Underage Users in Latest Safety Push appeared first on Cybersecurity News.

Media 85
article thumbnail

A cyberattack impacted operations at UK Wirral University Teaching Hospital

Security Affairs

UK’s Wirral University Teaching Hospital suffered a cyberattack that caused delays in appointments and procedures. Wirral University Teaching Hospital NHS Foundation Trust (WUTH) is an NHS Foundation Trust. It provides healthcare for people of the Wirral Peninsula and the surrounding areas of North West England and North Wales. The trust is responsible for Arrowe Park Hospital, Clatterbridge Hospital, and Wirral Women and Children’s Hospital.

article thumbnail

Integer Overflow Vulnerability in Windows Driver Enables Privilege Escalation, PoC Published

Penetration Testing

An independent researcher has uncovered a critical vulnerability in the ksthunk.sys driver, a component of the Windows operating system responsible for facilitating 32-bit to 64-bit process communications. The flaw, which... The post Integer Overflow Vulnerability in Windows Driver Enables Privilege Escalation, PoC Published appeared first on Cybersecurity News.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Instead of AirPods, I'd recommend Meta Ray-Bans as the best tech deal of Black Friday 2024

Zero Day

A special Black Friday Meta Ray-Bans deal delivers a rare discount up to 50% off. The smart glasses have audio nearly as good as a pair of AirPods, plus you get a fast camera and a hands-free AI assistant.

82
article thumbnail

Godot Engine Compromised: Malware Distributed via GodLoader

Penetration Testing

Check Point Research has identified the misuse of the Godot game engine—a popular, open-source tool for game development—as a platform for distributing malware. Dubbed GodLoader, this novel technique highlights how... The post Godot Engine Compromised: Malware Distributed via GodLoader appeared first on Cybersecurity News.

article thumbnail

Score a free Google Pixel 9 phone with this T-Mobile Black Friday deal

Zero Day

T-Mobile gives you a free Pixel 9 phone with qualifying trade-in or new line activation, with up to $800 back across 24 months of credits.

Mobile 81
article thumbnail

Evasive Malware Campaign Leverages CleverSoar Installer & Nidhogg Rootkit

Penetration Testing

Rapid7 Labs has uncovered a sophisticated malware campaign employing the newly identified CleverSoar installer, a highly evasive threat targeting Chinese and Vietnamese-speaking users. With advanced evasion techniques and layered malicious... The post Evasive Malware Campaign Leverages CleverSoar Installer & Nidhogg Rootkit appeared first on Cybersecurity News.

Malware 76
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

How I bought the Meta Ray-Bans for 20% off on Black Friday - and got an Amazon gift card too

Zero Day

Consistent feature updates, a rare discount, and a free $90 Amazon gift card make the Meta Ray-Ban smart glasses a no-brainer purchase for me this holiday season.

76
article thumbnail

Zello urges users to reset passwords following a cyber attack

Security Affairs

Zello urges customers with accounts created before November 2 to reset passwords following a potential security breach. Zello is warning customers who have an account created before November 2 to reset their passwords, a circumstance that suggests that the incident took place on November 2. Zello is a tech software company in Austin, Texas, U.S., known for the Zello app, which emulates push-to-talk (PTT) walkie-talkies over cell phone networks.

article thumbnail

I found every iPhone 16 model on sale for one cent on Amazon this Black Friday

Zero Day

It might be one of those 'too good to be true' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo.

Mobile 75
article thumbnail

Contiki-NG IoT OS Patches Critical Vulnerabilities

Penetration Testing

Researchers have identified and addressed three critical vulnerabilities in Contiki-NG, a popular open-source operating system for Internet of Things (IoT) devices. These vulnerabilities could allow attackers to crash devices or... The post Contiki-NG IoT OS Patches Critical Vulnerabilities appeared first on Cybersecurity News.

IoT 64
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Flipper Zero goes retro with this cool limited-edition version (and it's back for Black Friday)

Zero Day

If you want one, you'd better act fast.

70
article thumbnail

When Your Coffee Break Faces a Cyber Threat

Centraleyes

What happens when the backbone of global operations—supply chain software—comes under attack? Starbucks and leading UK supermarkets like Morrisons and Sainsbury’s are now living that reality. A recent ransomware breach on Blue Yonder disrupted everything from payroll systems to fresh produce logistics, sending a clear message: supply chain security is more critical than ever.

article thumbnail

The 30+ best Black Friday Apple deals 2024: Early sales available now

Zero Day

We found the best deals on Apple products before Black Friday launches tomorrow. Looking for an iPhone, iPad, MacBook, or AirPods? Look no further.

70
article thumbnail

Credit Card Skimmer Malware Uncovered: Targeting Magento Checkout Pages

Penetration Testing

Magento, a leading eCommerce platform, has once again become the target of sophisticated cybercriminal tactics. Security Analyst Puja Srivastava, from Sucuri, recently reported on a malicious JavaScript injection that compromises... The post Credit Card Skimmer Malware Uncovered: Targeting Magento Checkout Pages appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.