Sat.Jan 18, 2025 - Fri.Jan 24, 2025

article thumbnail

AI Mistakes Are Very Different from Human Mistakes

Schneier on Security

Humans make mistakes all the time. All of us do, every day, in tasks both new and routine. Some of our mistakes are minor and some are catastrophic. Mistakes can break trust with our friends, lose the confidence of our bosses, and sometimes be the difference between life and death. Over the millennia, we have created security systems to deal with the sorts of mistakes humans commonly make.

article thumbnail

MasterCard DNS Error Went Unnoticed for Years

Krebs on Security

The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for nearly five years until a security researcher spent $300 to register the domain and prevent it from being grabbed by cybercriminals.

DNS 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You Can't Trust Hackers, and Other Data Breach Verification Tales

Troy Hunt

It's hard to find a good criminal these days. I mean a really trustworthy one you can be confident won't lead you up the garden path with false promises of data breaches. Like this guy yesterday: For my international friends, JB Hi-Fi is a massive electronics retailer down under and they have my data! I mean by design because I've bought a bunch of stuff from them, so I was curious not just about my own data but because a breach of 12 million plus people would be massive in a coun

article thumbnail

7-Zip bug could allow a bypass of a Windows security feature. Update now

Malwarebytes

A patch is available for a vulnerability in 7-Zip that could have allowed attackers to bypass the Mark-of-the-Web (MotW) security feature in Windows. The MotW is an attribute added to files by Windows when they have been sourced from an untrusted location, like the internet or a restricted zone. The MotW is what triggers warnings that opening or running such files could lead to potentially dangerous behavior, including installing malware on their devices. 7-Zip added support for MotW in June 202

Internet 144
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

From Notifications to Deepfakes: How Human Behaviour Is Shifting and What It Means for Cybersecurity

Jane Frankland

It had been another long day, and I’d let the non-stop barrage of tasks and notifications, each one demanding more bandwidth than I had to spare, get to me. As I sat in my kitchen, chatting to my daughter about the amount of pings each of us got, an uncomfortable thought surfaced. A few minutes earlier, Id been scrolling through LinkedIn when a video caught my attention.

article thumbnail

A 7-Zip bug allows to bypass the Mark of the Web (MotW) feature

Security Affairs

A vulnerability in the 7-Zip file software allows attackers to bypass the Mark of the Web (MotW) Windows security feature. Attackers can exploit a vulnerability, tracked as CVE-2025-0411 , in the free, open-source file archiver software 7-Zip to bypass the Mark of the Web (MotW) Windows security feature. Mark of the Web (MotW) is a security feature in Microsoft Windows that identifies files downloaded from untrusted sources, such as the internet.

Software 126

LifeWorks

More Trending

article thumbnail

AI tool GeoSpy analyzes images and identifies locations in seconds

Malwarebytes

It’s just become even more important to be conscious about the pictures we post online. GeoSpy is an Artificial Intelligence (AI) supported tool that can derive a persons location by analyzing features in a photo like vegetation, buildings, and other landmarks. And it can do so in seconds based on one picture. Graylark Technologies who makes GeoSpy says its been developed for government and law enforcement.

Media 144
article thumbnail

Future-Proof Your WordPress Site: Essential Plugins for 2025

IT Security Guru

The digital landscape is constantly growing and evolving. As such, some tips and tricks that worked for websites in 2023 might be obsolete in 2025. For any digital professional, remaining dedicated to top-quality practice that stands the test of time is just the start. This means staying ahead of the curve and leveraging the best tools available. When it comes to WordPress, that often means choosing the right plugins at the right time.

article thumbnail

A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks

Security Affairs

A WordPress W3 Total Cache plugin vulnerability could allow attackers to access information from internal services, including metadata on cloud-based apps. A severe vulnerability, tracked as CVE-2024-12365 (CVSS score of 8.5) in the WordPress W3 Total Cache plugin could expose metadata from internal services and cloud apps. The WordPress W3 Total Cache plugin is a popular performance optimization tool designed to improve the speed and efficiency of WordPress websites.

article thumbnail

TP-Link Vulnerability: PoC Exploit for CVE-2024-54887 Reveals Remote Code Execution Risks

Penetration Testing

Security researcher Joward has published an in-depth analysis and Proof of Concept (PoC) exploit for a critical vulnerability, The post TP-Link Vulnerability: PoC Exploit for CVE-2024-54887 Reveals Remote Code Execution Risks appeared first on Cybersecurity News.

Risk 145
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Your location or browsing habits could lead to price increases when buying online

Malwarebytes

Companies are showing customers different prices for the same goods and services based what data they have on them, including details like their precise location or browser history. The name for this method is surveillance pricing, and the FTC has just released initial findings of a report looking into that practice. In July 2024, the FTC requested information from eight companies offering surveillance pricing products and services that incorporate data about consumers characteristics and behavi

article thumbnail

GhostGPT: A Malicious AI Chatbot for Hackers

Security Boulevard

A malicious generative AI chatbot dubbed "GhostGPT" is being advertised to cybercriminals on underground forums as a tool for more quickly and efficiently creating malware, running BEC attacks, and other nefarious activities, lowering the barrier for less-skilled hackers to launch attacks. The post GhostGPT: A Malicious AI Chatbot for Hackers appeared first on Security Boulevard.

article thumbnail

J-magic malware campaign targets Juniper routers

Security Affairs

Threat actors are targeting Juniper routers with a custom backdoor in a campaign called code-named “J-magic,” attackers are exploiting a Magic Packet flaw. Lumen Technologies researchers reported that the J-magic campaign targets Juniper routers with a custom backdoor using a passive agent based on the cd00r variant (an open-source backdoor by fx ).

Malware 122
article thumbnail

OT Cybersecurity and the Evolving Role of Controls Engineers

SecureWorld News

Industrial automation and operational technology (OT) are at a critical intersection where cybersecurity is not a "nice to have" but an essential component of system design and implementation. The expectations placed on control engineers have evolved significantly due to the growth in required customer requirements, stronger cybersecurity, and increasing complexity of OT environments.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Texas scrutinizes four more car manufacturers on privacy issues

Malwarebytes

The Texas Attorney Generals Office has started an investigation into how Ford, Hyundai, Toyota, and Fiat Chrysler collect, share, and sell consumer data, expanding an earlier probe launched last year into how modern automakers are potentially using customer driving data. We’ve addressed cars and privacy at some length on Malwarebytes Labs and came to the conclusionwith the help of many experts in the fieldthat modern cars simply aren’t very good at it.

article thumbnail

Palo Alto Networks Makes Post Quantum Cryptography API Available

Security Boulevard

Palo Alto Networks this week released an open application programming interface (API) framework that organizations can use to more easily deploy encryption keys that are not likely to be broken by a quantum computer. The post Palo Alto Networks Makes Post Quantum Cryptography API Available appeared first on Security Boulevard.

article thumbnail

Chinese threat actors used two advanced exploit chains to hack Ivanti CSA

Security Affairs

US agencies revealed Chinese threat actors used two advanced exploit chains to breach Ivanti Cloud Service Appliances (CSA). The US governments cybersecurity and law enforcement revealed that Chinese threat actors used at least two sophisticated exploit chains to compromise Ivanti Cloud Service Appliances (CSA). A CISA and FBI published a joint advisory warning that Chinese hackers exploited four Ivanti flaws ( CVE-2024-8963 , CVE-2024-9379 , CVE-2024-8190 , CVE-2024-9380 ) to achieve remote cod

Hacking 117
article thumbnail

From Pest Control to Cybersecurity: What CISOs Can Learn from Pestie

SecureWorld News

As I was spraying Pestiea DIY pest spray subscription servicearound my home this weekend (sun's out, spray gun's out), I was thinking about the correlation of this home perimeter defense to what CISOs and their teams do to keep their organizations secure. Keeping pests out of your home and keeping cyber threats out of your organization might seem worlds apart, but there are surprising parallels between the two.

CISO 112
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Why MSPs need proactive, 24/7 threat hunting

Webroot

Cybercriminals are becoming increasingly sophisticated, agile, and fast. For managed service providers (MSPs) supporting small and medium-sized businesses (SMBs) with cybersecurity services, staying ahead of these adversaries is crucial. One of the most effective ways to do so is through round-the-clock threat hunting. In this blog, we’ll explore why constant threat hunting is essential, the challenges MSPs face in providing it, and how OpenText MDR can help overcome these challenges while

article thumbnail

Building Secure Multi-Cloud Architectures: A Framework for Modern Enterprise Applications  

Security Boulevard

Companies are embracing multi-cloud strategies not just because they want to avoid vendor lock-in, but because different providers excel at other things. The post Building Secure Multi-Cloud Architectures: A Framework for Modern Enterprise Applications appeared first on Security Boulevard.

article thumbnail

Experts found multiple flaws in Mercedes-Benz infotainment system

Security Affairs

Kaspersky researchers shared details about multiple vulnerabilities impacting the Mercedes-Benz MBUX infotainment system. Kaspersky published research findings on the first-generation Mercedes-Benz User Experience (MBUX) infotainment system, specifically focusing on the Mercedes-Benz Head Unit. The researchers started from the results of another study conducted by KeenLab on the MBUX internals.

Software 133
article thumbnail

Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising Cyber Threats

Heimadal Security

BARCELONA, Spain, and COPENHAGEN, Denmark, January 20, 2025 Heimdal, a leading cybersecurity company, has partnered with Interbel, a Spanish cybersecurity and Email value added distributor with over 27 years of experience. Together, they will deliver powerful and user-friendly cybersecurity solutions to businesses across Spain, addressing the rising challenges of sophisticated cyber threats and complex […] The post Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising C

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Oracle’s January 2025 Critical Patch Update: Addressing 320 Security Vulnerabilities

Penetration Testing

Oracle has released its Critical Patch Update Pre-Release Announcement for January 2025, providing advance notice of the crucial The post Oracle’s January 2025 Critical Patch Update: Addressing 320 Security Vulnerabilities appeared first on Cybersecurity News.

article thumbnail

The Future of Automotive Cybersecurity: Why Learning Car Hacking is Essential 

Security Boulevard

As vehicles become smarter, the stakes for securing them grow higher. Learning car hacking is no longer a niche skill its a necessity for anyone interested in the future of cybersecurity. The post The Future of Automotive Cybersecurity: Why Learning Car Hacking is Essential appeared first on Security Boulevard.

Hacking 117
article thumbnail

U.S. Treasury Sanctions Chinese cybersecurity firm and actor over federal agency breach tied to Salt Typhoon

Security Affairs

The U.S. Treasury’s OFAC sanctioned a Chinese cybersecurity firm and a Shanghai cyber actor for ties to Salt Typhoon and a federal agency breach. The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned Chinese firm Sichuan Juxinhe Network Technology Co., LTD., for its involvement in the activities of the Salt Typhoon APT group, which recently compromised multiple U.S. telecommunication and internet service providers.

article thumbnail

How to Prepare for NIS2 Audits – A Compliance Expert’s View

Heimadal Security

Third-party security questionnaires and the number of audits that are growing every year are killing everybody’s soul! – Larisa Mihai, Cyber Compliance Expert In October 2024, European Union member states had a deadline to transpose the NIS2 Directive into national law. Although not all countries have begun enforcing the rules, it will eventually become the […] The post How to Prepare for NIS2 Audits – A Compliance Expert’s View appeared first on Heimdal Security Bl

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

IP2World Proxy Introduction

SecureBlitz

In this post, I will talk about the IP2World Proxy services. IP2World Proxy is a leading provider of proxy services, offering a wide range of solutions to meet individuals’ and businesses’ secure and reliable internet access needs. With over 90 million real, clean, and anonymous residential proxy IPs, covering more than 220 countries and regions […] The post IP2World Proxy Introduction appeared first on SecureBlitz Cybersecurity.

article thumbnail

Almost 10% of GenAI Prompts Include Sensitive Data: Study

Security Boulevard

A study by cybersecurity startup Harmonic Security found that 8.5% of prompts entered into generative AI models like ChatGPT, Copilot, and Gemini last year included sensitive information, putting personal and corporate data at risk of being leaked. The post Almost 10% of GenAI Prompts Include Sensitive Data: Study appeared first on Security Boulevard.

Risk 109
article thumbnail

Esperts found new DoNot Team APT group’s Android malware

Security Affairs

Researchers linked the threat actor DoNot Teamto a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA researchers linked a recently discovered Android malware to the Indian APT group known as DoNot Team. The Donot Team (aka APT-C-35 and Origami Elephant) has been active since 2016, it focuses ongovernment and military organizations, ministries of foreign affairs, and embassies in India, Pakistan, Sri Lanka, Bangladesh, and other South Asian countries.

Malware 115
article thumbnail

GhostGPT: Uncensored Chatbot Used by Cyber Criminals for Malware Creation, Scams

Tech Republic Security

Researchers from Abnormal Security discovered an advert for the chatbot on a cybercrime forum and tested its capabilities by asking it to create a DocuSign phishing email.

Scams 211
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!