Fri.Jan 17, 2025

article thumbnail

Social Engineering to Disable iMessage Protections

Schneier on Security

I am always interested in new phishing tricks, and watching them spread across the ecosystem. A few days ago I started getting phishing SMS messages with a new twist. They were standard messages about delayed packages or somesuch, with the goal of getting me to click on a link and entering some personal information into a website. But because they came from unknown phone numbers, the links did not work.

article thumbnail

I spent hours testing ChatGPT Tasks - and its refusal to follow directions was mildly terrifying

Zero Day

ChatGPT tasks offers AI prompt scheduling and automation, but what happens when things go wrong?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of national security

The Last Watchdog

President Bidens detailed executive order relating to cybersecurity is great to see. Bidens order reflects the importance of cybersecurity at the highest levels it is an issue of national security and should be treated as such. One of the big themes coming out of the order is the need to implement the right controls, and being able to provide evidence.

100
100
article thumbnail

Why the OnePlus 13R is the best-value Android phone you can buy right now

Zero Day

The OnePlus 13R undercuts the competition by hundreds of dollars, leveraging the same winning formula from the OnePlus 12R to help it stand out.

109
109
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation

The Hacker News

Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty's Tomer Goldschmidt said in a Thursday report.

article thumbnail

5 lightweight Linux distributions that will bring your old PC back to life

Zero Day

If you have an aging computer and want to repurpose it, these lightweight Linux distributions will serve you for years to come.

109
109

More Trending

article thumbnail

10 Linux apps I install on every new machine (and why you should, too)

Zero Day

If you're wondering which apps take priority on your new Linux machine, these 10 will help you get the most out of the OS.

109
109
article thumbnail

AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats

Security Boulevard

AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats AI in Cybersecurity: Leveraging Generative AI and AI Agents to Stay Ahead of Threats Artificial Intelligence (AI) is revolutionizing the cybersecurity landscape, offering advanced tools to predict, detect, and respond to threats with unprecedented speed and accuracy.

101
101
article thumbnail

I tested an ink pen that digitizes your handwriting, but the app makes it truly useful

Zero Day

The Nuwa Pen incorporates three tiny cameras to transcribe what you write (on paper!) to the app, acting as a digital solution for those who prefer using a pen and notebook.

89
article thumbnail

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

The Hacker News

Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. "Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

4 surprise products that we could see at Samsung Unpacked 2025

Zero Day

The Galaxy S25 series is expected at the event, but we may also get surprise appearances on the wearables side.

88
article thumbnail

New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

The Hacker News

Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December.

article thumbnail

Why the 'Bring Your Own AI' trend could mean big trouble for business leaders

Zero Day

Your staff will take matters into their own hands if you don't take a tight grip on generative AI. Here's how to wrestle back control.

84
article thumbnail

ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems

Security Affairs

Researchers detailed a now-patched vulnerability that could allow a bypass of the Secure Boot mechanism in UEFI systems. ESET disclosed details of a now-patched vulnerability, tracked as CVE-2024-7344 (CVSS score: 6.7), that could allow a bypass of the Secure Boot mechanism in UEFI systems. The Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface between an operating system and platform firmware.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Supreme Court backs TikTok's ban. What comes next?

Zero Day

The US Supreme Court ruled that a law banning TikTok is constitutional. Here's what that means for you.

81
article thumbnail

U.S. CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical Aviatrix Controllers OS Command Injection vulnerability, tracked as CVE-2024-50603 (CVSS score of 10) to its Known Exploited Vulnerabilities (KEV) catalog.

63
article thumbnail

This tiny power bank is one of my everyday essentials (and it's on sale for $20)

Zero Day

Anker's Nano Power Bank lives up to its name as an ultraportable USB charger with impressive power for its size.

Banking 79
article thumbnail

DORA arrives: Here’s what you need to know

BH Consulting

Today the Digital Operational Resilience Act (DORA) becomes binding across the EU, aiming to strengthen financial entities stability and security. Arguably, its never been more needed than now. According to SailPoint, the financial industry was the most targeted sector for data breaches in 2024. Close to 65 per cent of financial organisations said they experienced a ransomware incident, up from 34 per cent in 2021.

Risk 65
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to send and receive Apple's iMessages in Windows

Zero Day

Nestled In front of your Windows PC? You don't have to pick up your iPhone when you get a new message. Microsoft's Phone Link and Intel's Unison apps work with Apple's iMessage, though Unison supports only Windows 11.

76
article thumbnail

WhatsApp spear phishing campaign uses QR codes to add device

Malwarebytes

A cybercriminal campaign linked to Russia is deploying QR codes to access the WhatsApp accounts of high-profile targets like journalists, members of think tanks, and employees of non-governmental organizations (NGOs), according to new details revealed by Microsoft. The group, which Microsoft tracks by the name “Star Blizzard,” is also referred to as Coldriver by other researchers.

64
article thumbnail

Why TikTok isn't vanishing this weekend

Zero Day

Does the Supreme Court's ruling mean TikTok is going dark this Sunday? Here's what to know.

73
article thumbnail

Mercedes-Benz Head Unit security research report

SecureList

Introduction This report covers the research of the Mercedes-Benz Head Unit, which was made by our team. Mercedes-Benz’s latest Head Unit (infotainment system) is called Mercedes-Benz User Experience (MBUX). We performed analysis of the first generation MBUX. MBUX was previously analysed by KeenLab. Their report is a good starting point for diving deep into the MBUX internals and understanding the architecture of the system.

Backups 58
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

My cat Norbert loves this automatic wet food feeder, and it's on sale

Zero Day

The Petlibro Polar Wet Food Automatic Feeder helps keep your pet's eating schedule on time, even when you're away. Plus, you can save $30 when you buy it on Amazon.

70
article thumbnail

5 Reasons to Start a Cybersecurity Career with Security+

CompTIA on Cybersecurity

Kickstart your cybersecurity career with CompTIA Security+. Explore the top 5 reasons why this certification is a must-have for IT professionals.

59
article thumbnail

FTC's 'click to cancel' just kicked in, but unsubscribing may not get easier just yet - here's why

Zero Day

The ruling, which went into effect this week, requires businesses to make canceling a subscription as easy as signing up for it in the first place.

70
article thumbnail

How Much of Your Business is Exposed on the Dark Web?

Security Boulevard

The dark web is a thriving underground market where stolen data and corporate vulnerabilities are openly traded. This hidden economy poses a direct and growing threat to businesses worldwide. Recent breaches highlight the danger. The post How Much of Your Business is Exposed on the Dark Web? appeared first on Security Boulevard.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

This $600 OnePlus phone has made it very difficult for me to recommend pricier flagships

Zero Day

The OnePlus 13R undercuts the competition by hundreds of dollars while offering a display and performance package that's easy to appreciate.

59
article thumbnail

The FCC’s Jessica Rosenworcel Isn’t Leaving Without a Fight

WIRED Threat Level

As the US faces the worst telecommunications hack in our nations history, by Chinas Salt Typhoon hackers, the outgoing FCC chair is determined to bolster network security if its the last thing she does.

58
article thumbnail

Managing AI agents as employees is the challenge of 2025, says Goldman Sachs CIO

Zero Day

There may even be AI 'layoffs' as programs are replaced by more highly capable versions.

58
article thumbnail

Cohesity Extends Services Reach to Incident Response Platforms

Security Boulevard

Cohesity has extended its Cyber Event Response Team (CERT) service to include third-party providers of incident response platforms, including Palo Alto Networks Unit 42, Arctic Wolf, Sophos, Fenix24 and Semperis. The post Cohesity Extends Services Reach to Incident Response Platforms appeared first on Security Boulevard.

66
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.