Sat.May 03, 2025 - Fri.May 09, 2025

article thumbnail

Another Move in the Deepfake Creation/Detection Arms Race

Schneier on Security

Deepfakes are now mimicking heartbeats In a nutshell Recent research reveals that high-quality deepfakes unintentionally retain the heartbeat patterns from their source videos, undermining traditional detection methods that relied on detecting subtle skin color changes linked to heartbeats. The assumption that deepfakes lack physiological signals, such as heart rate, is no longer valid.

article thumbnail

Pakistani Firm Shipped Fentanyl Analogs, Scams to US

Krebs on Security

A Texas firm recently charged with conspiring to distribute synthetic opioids in the United States is at the center of a vast network of companies in the U.S. and Pakistan whose employees are accused of using online ads to scam westerners seeking help with trademarks, book writing, mobile app development and logo designs, a new investigation reveals.

Scams 265
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Welcoming the Isle of Man Government to Have I Been Pwned

Troy Hunt

Today we welcome the 39th government and first self-governing British Crown Dependency to Have I Been Pwned, The Isle of Man. Their Office of Cyber-Security & Information Assurance (OCSIA) now has free and open access to query the government domains of their jurisdiction. We're delighted and encouraged to see HIBP put to good use across such a wide variety of government use cases and look forward to seeing many more in the future.

article thumbnail

New ‘Bring Your Own Installer (BYOI)’ technique allows to bypass EDR

Security Affairs

A new BYOI technique lets attackers bypass SentinelOne EDR, disable protection, and deploy Babuk ransomware by exploiting the agent upgrade process. Aons Stroz Friedberg discovered a new “Bring Your Own Installer” (BYOI) EDR bypass technique that exploits a flaw in SentinelOnes upgrade process to bypass its anti-tamper protections, leaving endpoints unprotected.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

The Hacker News

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor.

article thumbnail

This ultraportable LG laptop gives my 15-inch MacBook Air some serious competition

Zero Day

The LG Gram 17 (2025) with Intel's Lunar Lake chip feels like a big upgrade in terms of battery life and staying cool.

133
133

LifeWorks

More Trending

article thumbnail

CVE-2025-2774: Webmin Vulnerability Allows Root-Level Privilege Escalation

Penetration Testing

Webmin, a popular web-based system administration tool used to manage Unix-like servers and various services with approximately 1,000,000 The post CVE-2025-2774: Webmin Vulnerability Allows Root-Level Privilege Escalation appeared first on Daily CyberSecurity.

article thumbnail

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT

The Hacker News

Cisco has released software fixes to address a maximum-severity security flaw in its IOS XE Wireless Controller that could enable an unauthenticated, remote attacker to upload arbitrary files to a susceptible system. The vulnerability, tracked as CVE-2025-20188, has been rated 10.0 on the CVSS scoring system.

Wireless 134
article thumbnail

Benchmarks Q&A: What the finance sector’s new X9 PKI standard signals for other industries

The Last Watchdog

As organizations brace for the rising tide of machine identities and prepare for a post-quantum cryptographic era, a quiet but crucial shift is underway in the financial sector: the deployment of a new, private PKI standard designed specifically to meet bankings complex operational and compliance needs. Related: Why crypto-agility is a must have Sinha While the web-based PKI systemgoverned by browsers and certificate authoritieshas served the public internet well, its limitations are becoming ev

article thumbnail

Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage

WIRED Threat Level

CBP says it has disabled its use of TeleMessage following reports that the app, which has not cleared the US governments risk assessment program, was hacked.

Hacking 134
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Experts shared up-to-date C2 domains and other artifacts related to recent MintsLoader attacks

Security Affairs

MintsLoader is a malware loader delivering the GhostWeaver RAT via a multi-stage chain using obfuscated JavaScript and PowerShell. Recorded Future researchers observed MintsLoader delivering payloads like GhostWeaver via obfuscated scripts, evading detection with sandbox/VM checks, and uses DGA and HTTP C2. MintsLoader is a malware loader that was first spotted in 2024, the loader has been observed delivering various follow-on payloads like StealC and a modified version of the Berkeley Open Infr

Malware 126
article thumbnail

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. - Dutch Operation

The Hacker News

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that's powered by thousands of infected Internet of Things (IoT) and end-of-life (EoL) devices, enlisting them into a botnet for providing anonymity to malicious actors.

IoT 129
article thumbnail

MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction

The Last Watchdog

SAN FRANCISCO The cybersecurity industry showed up here in force last week: 44,000 attendees, 730 speakers, 650 exhibitors and 400 members of the media flooding Moscone Convention Center in the City by the Bay. Related: RSAC 2025 by the numbers Beneath the cacophony of GenAI-powered product rollouts, the signal that stood out was subtler: a broadening consensus that artificial intelligence especially the agentic kind isnt going away.

article thumbnail

Android fixes 47 vulnerabilities, including one zero-day. Update as soon as you can!

Malwarebytes

Google has patched 47 vulnerabilities in Android, including one actively exploited zero-day vulnerability in its May 2025 Android Security Bulletin. Zero-days are vulnerabilities that are exploited before vendors have a chance to patch themoften before they even know about them. The May updates are available for Android 13, 14, and 15. Android vendors are notified of all issues at least a month before publication, however, this doesnt always mean that the patches are available for all devices im

Software 135
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

AI, Cyber and Budgets: Top Themes at 2025 NASCIO Midyear

Lohrman on Security

The National Association of State Chief Information Officers held their 2025 Midyear Conference this past week in Philadelphia. Here are some trends, highlights and insights.

128
128
article thumbnail

Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

The Hacker News

The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an espionage-focused campaign using ClickFix-like social engineering lures.

article thumbnail

Malicious Go Modules designed to wipe Linux systems

Security Affairs

Researchers found 3 malicious Go modules with hidden code that can download payloads to wipe a Linux system’s main disk, making it unbootable. The malicious modules contain obfuscated code to fetch next-stage payloads that can wipe a Linux system’s primary disk and make it unbootable. “Sockets Threat Research Team uncovered a stealthy and highly destructive supply-chain attack targeting developers using Go modules.” read the report published by Socket. “Attackers le

Software 110
article thumbnail

Google Chrome will use AI to block tech support scam websites

Malwarebytes

Google has expressed plans to use Artificial Intelligence (AI) to stop tech support scams in Chrome. With the launch of Chrome version 137, Google plans to use the on-device Gemini Nano large language model (LLM) to recognize and block tech support scams. Users already have the ability to chose Enhanced Protection under Settings > Privacy and security > Security > Safe Browsing.

Scams 113
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car

WIRED Threat Level

Customs and Border Protection has called for tech companies to pitch real-time face recognition technology that can capture everyone in a vehiclenot just those in the front seats.

article thumbnail

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

The Hacker News

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published today, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025.

Hacking 126
article thumbnail

Cybercriminal services target end-of-life routers, FBI warns

Security Affairs

The FBI warns that attackers are using end-of-life routers to deploy malware and turn them into proxies sold on 5Socks and Anyproxy networks. The FBI released a FLASH alert warning about 5Socks and Anyproxy malicious services targeting end-of-life (EOL) routers. Attackers target EoL devices to deploy malware by exploiting vulnerabilities and create botnets for attacks or proxy services.

Malware 103
article thumbnail

WhatsApp hack: Meta wins payout over NSO Group spyware

Malwarebytes

Meta has won almost $170m in damages from Israel-based NSO Group, maker of the Pegasus spyware. The ruling comes after a six-year legal case against the company after Meta accused it of misusing its servers to spy on users. According to the original complaint against NSO Group, filed in October 2019, the spyware vendor used WhatsApp servers to send malware to around 1400 mobile phones.

Spyware 123
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Aikido Uncovers Malicious Code in Popular npm Package rand-user-agent

Penetration Testing

Aikido Security has uncovered a Remote Access Trojan (RAT) embedded in rand-user-agent, a JavaScript package downloaded ~45,000 times The post Aikido Uncovers Malicious Code in Popular npm Package rand-user-agent appeared first on Daily CyberSecurity.

article thumbnail

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

The Hacker News

Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system's primary disk and render it unbootable. The names of the packages are listed below - github[.]com/truthfulpharm/prototransform github[.]com/blankloggia/go-mcp github[.

Malware 130
article thumbnail

10 tiny gadgets I never leave home without - and AirTags are not on the list

Zero Day

If you're into gadgets that are both practical and budget-friendly, these picks deliver great value and make perfect gifts without breaking the bank.

Banking 115
article thumbnail

Windows 11 Version 24H2 Enters Final Deployment Phase, Microsoft Lists Known Issues

Tech Republic Security

Some devices will be placed under a compatibility hold as Microsoft works out ongoing issues.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Bluetooth 6.1 Enhances Privacy with Randomized Addresses

Penetration Testing

The Bluetooth Special Interest Group (SIG) has recently announced the release of the Bluetooth 6.1 specification, a minor The post Bluetooth 6.1 Enhances Privacy with Randomized Addresses appeared first on Daily CyberSecurity.

article thumbnail

Rhysida Ransomware gang claims the hack of the Government of Peru

Security Affairs

The Rhysida Ransomware gang claims the hack of the Government of Peru, the gang breached Gob.pe, the Single Digital Platform of the Peruvian State. The Rhysida ransomware gang claims responsibility for hacking the Government of Peru, breaching Gob.pe, which is the country’s official digital platform. The Government of Peru has been breached by Rhysida Ransomware. pic.twitter.com/6fsczNSrwu — Dominic Alvieri (@AlvieriD) May 2, 2025 The group published the images of multiple documents

article thumbnail

I changed 6 settings on my Roku TV to instantly improve its performance

Zero Day

Below are a few step-by-step ways to clear your Roku cache and speed up the performance in just minutes.

98
article thumbnail

Security Researchers Warn a Widely Used Open Source Tool Poses a 'Persistent' Risk to the US

WIRED Threat Level

The open source software easyjson is used by the US government and American companies. But its ties to Russias VK, whose CEO has been sanctioned, have researchers sounding the alarm.

Risk 121
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!