Wed.Dec 18, 2024

article thumbnail

How to Lose a Fortune with Just One Bad Click

Krebs on Security

Image: Shutterstock, iHaMoo. Adam Griffin is still in disbelief over how quickly he was robbed of nearly $500,000 in cryptocurrencies. A scammer called using a real Google phone number to warn his Gmail account was being hacked, sent email security alerts directly from google.com, and ultimately seized control over the account by convincing him to click “yes” to a Google prompt on his mobile device.

article thumbnail

Attack Exposure: Unpatched Cleo Managed File-Transfer Software

Data Breach Today

At Least 200 Servers Still Vulnerable as Ransomware Group Claims Mass Exploits More than 200 Cleo managed file-transfer servers remain internet-exposed and unpatched, despite warnings of a mass attack targeting critical vulnerabilities in the widely used software. The Clop ransomware operation, which has repeatedly targeted MFT software, claimed credit for the attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

The Last Watchdog

Today, part three of Last Watchdog s year-end roundtable zeroes in on the regulatory and compliance landscape. Part three of a four-part series In 2024, global pressure on companies to implement advanced data protection measures intensified, with new standards in encryption and software transparency raising the bar. From the push for quantum-resilient cryptography to Software Bill of Material (SBOM ) requirements aimed at bolstering supply chain security, this installment examines the regulatory

article thumbnail

US CISA Endorses Encrypted Apps Amid Chinese Telecom Hack

Data Breach Today

CISA Recommends Strict Mobile Security Measures Following Salt Typhoon Telecom Hack The Cybersecurity and Infrastructure Security Agency's latest guidance calls on top U.S. political and government officials to adopt stricter mobile security measures in response to the Salt Typhoon hacking campaign, a Chinese espionage effort that has infiltrated major telecom systems.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Irish Data Protection Commission (DPC) fined Meta €251 million for a 2018 data breach

Security Affairs

Meta has been fined 251M ($263M) for a 2018 data breach affecting millions in the EU, marking another penalty for violating privacy laws. The Irish Data Protection Commission (DPC) fined Meta 251 million ($263M) for a 2018 data breach impacting 29 million Facebook accounts. “The Irish Data Protection Commission (DPC) has today announced its final decisions following two inquiries into Meta Platforms Ireland Limited (MPIL).

More Trending

article thumbnail

The Mask APT is back after 10 years of silence

Security Affairs

Kaspersky researchers linked a new wave of cyber attacks to the cyber espionage group tracked as The Mask. Kaspersky researchers linked several targeted attacks to a cyber espionage group known as The Mask. The APT group targeted an organization in Latin America in 2019 and 2022. Threat actors accessed an MDaemon email server and used its WorldClient webmail component to maintain persistence within the compromised organization. “The persistence method used by the threat actor was based on

article thumbnail

Proposed UK White Hat Legal Shield Fails in House of Lords

Data Breach Today

Amendment to Computer Misuse Act Fails During Bloc Vote A proposed amendment to British anti-hacking law that would have provided a legal shield to white hat hackers failed Wednesday in the House of Lords. Under the Computer Misuse Act, access to a computer system without adequate consent from the system owner is illegal.

Access 130
article thumbnail

The 4 easiest ways to test Linux on your old PC before Windows 10 support runs out

Collaboration 2.0

If you're considering a migration from the soon sunsetting Windows 10 to Linux and you're looking for a way to test the open-source operating system, here are four options.

111
111
article thumbnail

Critical Flaws Expose 25,000 SonicWall Devices to Hackers

Data Breach Today

Many SonicWall Firewalls Are Unsupported or Lack Patches for Known Vulnerabilities Thousands of SonicWall network security devices remain exposed with critical security flaws, including 20,000 running outdated firmware that no longer receives vendor support. Despite patches available for some of these flaws, many organizations continue to run the outdated firmware.

Security 130
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

This agentic AI platform claims to speed development from 'months to days'

Collaboration 2.0

Blitzy claims its agents can optimize any model for reasoning, all while eliminating errors.

IT 110
article thumbnail

Vulnerabilities in Azure Data Factory Open Door to Attacks

Data Breach Today

Azure Data Factory's Apache Airflow Integration Flaw Can Expose Cloud Environments Security researchers say now-resolved vulnerabilities in a Microsoft Azure integration with the Apache Airflow workflow management platform showcase growing sophistication of attackers. Palo Alto Unit 42 researchers said the flaws could allow hackers to deploy malware and steal data.

Cloud 130
article thumbnail

The open-source tools that could disrupt the entire IT incident management market

Collaboration 2.0

Open-source tools like Grafana Labs and AI-driven AIOps are shaking up incident management, challenging PagerDuty and streamlining IT problem-solving and code fixes. Here's why it matters.

Marketing 107
article thumbnail

Key Raccoon Figure Receives 60 Month U.S. Prison Sentence

Data Breach Today

Ukrainian Mark Sokolovsky Pleaded Guilty in October A Ukrainian national who was a key figure in the Raccoon malware-as-a-service criminal operation received a prison sentence of 60 months. The sentence of Mark Sokolovsky includes credit for time already spent in jails following his March 2022 arrest.

130
130
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Using Windows 11? Change these 4 settings to keep your PC running smoothly

Collaboration 2.0

If you're having trouble with Windows 11, consult this short list of the four best things you can do to enhance your PC's performance.

104
104
article thumbnail

AI-Powered Investment Scams Surge: How 'Nomani' Steals Money and Data

KnowBe4

Cybersecurity researchers are warning about a new breed of investment scam that combines AI-powered video testimonials, social media malvertising, and phishing tactics to steal money and personal data.

Phishing 103
article thumbnail

The top mobile AI features that Apple and Samsung owners actually use

Collaboration 2.0

And why some users are avoiding the latest AI features on their phones.

98
article thumbnail

Phishing Campaign Targets YouTube Creators

KnowBe4

An email phishing campaign is targeting popular YouTube creators with phony collaboration offers, according to researchers at CloudSEK. The emails contain OneDrive links designed to trick users into installing malware.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Russia-linked APT29 group used red team tools in rogue RDP attacks

Security Affairs

Russia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October 2024, the Russia-linked cyber espionage group APT29 (aka Earth Koshchei, SVR group , Cozy Bear , Nobelium , BlueBravo , Midnight Blizzard , and The Dukes ) used rogue RDP attacks via phishing emails targeting governments, think tanks, and Ukrainian entities to steal data and install malware.

Phishing 108
article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. Part four of our four-part series From cybersecurity skills shortages to the pressures of hybrid work, the challenges facing organizations are at an all-time high. Experts here explore the importance of fostering a resilient workforce, backed by AI-enhanced training and layered security strategies.

Analytics 162
article thumbnail

New Advances in the Understanding of Prime Numbers

Schneier on Security

Really interesting research into the structure of prime numbers. Not immediately related to the cryptanalysis of prime-number-based public-key algorithms, but every little bit matters.

88
article thumbnail

AI software startups set to take over $12 trillion US services industry

Collaboration 2.0

Areas resistant to automation - like legal services and healthcare - are attracting novel applications that could even displace human workers, according to a Bank of America report.

85
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

No, KnowBe4 Is Not Being Exploited

KnowBe4

Some of our customers are reporting Threat Alerts from Mimecast stating hackers have exploited KnowBe4 or KnowBe4 domains to send email threats.

article thumbnail

This hidden Apple feature turns your iPhone or iPad into an AI image generator

Collaboration 2.0

With Image Playground, you can generate images based on themes and other concepts, your own descriptions, and photos from your device's library.

article thumbnail

IAM Predictions for 2025: Identity as the Linchpin of Business Resilience

Thales Cloud Protection & Licensing

IAM Predictions for 2025: Identity as the Linchpin of Business Resilience madhav Thu, 12/19/2024 - 05:33 As we look toward 2025, the lessons of 2024 serve as a stark reminder of the rapidly evolving identity and access management (IAM) landscape. The numbers tell the story: The latest Identity Theft Resource Center report indicates that consumers experienced a 21-percentage-point rise in identity crime victimization between July 2023 and June 2024.

B2B 71
article thumbnail

Gemini Advanced users can now access Google's most experimental model

Collaboration 2.0

If you need help with coding, math, and reasoning, Gemini 2.0 Flash is the model for you.

Access 82
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Threat actors are attempting to exploit Apache Struts vulnerability CVE-2024-53677

Security Affairs

Researchers warn that threat actors are attempting to exploit a recently disclosed Apache Struts vulnerability CVE-2024-53677. Researchers warn that threat actors are attempting to exploit the vulnerability CVE-2024-53677 (CVSS score of 9.5) in Apache Struts. A remote attacker could exploit this vulnerability to upload malicious files, potentially leading to arbitrary code execution. “An attacker can manipulate file upload params to enable paths traversal and under some circumstances this

article thumbnail

I test wearable tech for a living. These are my favorite products of 2024

Collaboration 2.0

From sleep earbuds to smart rings, here are the wearables I didn't want to take off after completing my product review.

81
article thumbnail

Apprenticeship stories: Red Tanner

CILIP

Apprenticeship stories: Red Tanner Apprenticeships promote sector and skills development and equity, while offering a range of pathways into and through the profession that appeal to new and broader audiences. Red Tanner decided to take the apprenticeship path after realising that university was not for them, finding that it brought new perspectives and value to their career progression after finishing college.