FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ The Hacker News

Apple Drops iCloud's Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands

By: Ravie Lakshmanan — February 21st 2025 at 16:15
Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users' trusted devices retain sole access to the encryption keys used to unlock data stored in its
☐ ☆ ✇ ZDNet | security RSS

American Airlines now lets you track your luggage with AirTags - here's how

— February 21st 2025 at 16:10
A mishandled bag might make its way back to you quicker than ever.
☐ ☆ ✇ The Hacker News

Data Leak Exposes TopSec's Role in China’s Censorship-as-a-Service Operations

By: Ravie Lakshmanan — February 21st 2025 at 16:06
An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country. Founded in 1995, TopSec ostensibly offers services such as Endpoint Detection and Response (EDR) and vulnerability scanning. But it's also providing "boutique" solutions in order
☐ ☆ ✇ WeLiveSecurity

Fake job offers target software developers with infostealers

— February 20th 2025 at 14:11
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers
☐ ☆ ✇ WeLiveSecurity

DeceptiveDevelopment targets freelance developers

— February 20th 2025 at 10:00
ESET researchers analyzed a campaign delivering malware bundled with job interview challenges
☐ ☆ ✇ ZDNet | security RSS

Is your phone truly waterproof? Here's what the IP rating tells you

— February 21st 2025 at 14:39
IP ratings measure water and dust resistance, but what do the numbers mean, and how do they apply to real-world scenarios?
☐ ☆ ✇ WIRED

The US Is Considering a TP-Link Router Ban—Should You Worry?

By: Simon Hill — February 21st 2025 at 13:30
Several government departments are investigating TP-Link routers over Chinese cyberattack fears, but the company denies links.
☐ ☆ ✇ The Hacker News

Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3

By: Ravie Lakshmanan — February 21st 2025 at 13:03
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand's legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale. The latest iteration of the phishing suite "represents a significant
☐ ☆ ✇ The Register - Security

Experts race to extract intel from Black Basta internal chat leaks

— February 21st 2025 at 12:56

Researchers say there's dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data

Hundreds of thousands of internal messages from the Black Basta ransomware gang were leaked by a Telegram user, prompting security researchers to bust out their best Russian translations post haste.…

☐ ☆ ✇ The Hacker News

Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025

By: Unknown — February 21st 2025 at 11:40
In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed by an excess of user identities and aging systems, making them vulnerable to attacks. Without a strategic plan, these security gaps can quickly turn into expensive liabilities. Join us for "
☐ ☆ ✇ The Hacker News

AI-Powered Deception is a Menace to Our Societies

By: Unknown — February 21st 2025 at 11:00
Wherever there’s been conflict in the world, propaganda has never been far away. Travel back in time to 515 BC and read the Behistun Inscription, an autobiography by Persian King Darius that discusses his rise to power. More recently, see how different newspapers report on wars, where it’s said, ‘The first casualty is the truth.’  While these forms of communication
☐ ☆ ✇ The Hacker News

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

By: Ravie Lakshmanan — February 21st 2025 at 07:38
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. "The threat actor then demonstrated their ability to persist in target environments across equipment from multiple
☐ ☆ ✇ The Hacker News

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks

By: Ravie Lakshmanan — February 21st 2025 at 07:26
A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the
☐ ☆ ✇ The Register - Security

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

— February 21st 2025 at 06:51

PoC exploit code shows why this is a patch priority

Security engineers have released a proof-of-concept exploit for four critical Ivanti Endpoint Manager bugs, giving those who haven't already installed patches released in January extra incentive to revisit their to-do lists.…

☐ ☆ ✇ The Register - Security

Thailand ready to welcome 7,000 trafficked scam call center victims back from Myanmar

— February 21st 2025 at 03:30

It comes amid a major crackdown on the abusive industry that started during COVID

Thailand is preparing to receive thousands of people rescued from scam call centers in Myanmar as the country launches a major crackdown on the pervasive criminal activity across its border.…

☐ ☆ ✇ The Register - Security

Linux royalty backs adoption of Rust for kernel code, says its rise is inevitable

— February 21st 2025 at 00:38

Nobody wants memory bugs. Penguinistas continue debate on how to squish 'em

Updated Some Linux kernel maintainers remain unconvinced that adding Rust code to the open source project is a good idea, but its VIPs are coming out in support of the language's integration.…

☐ ☆ ✇ The Register - Security

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

— February 20th 2025 at 23:55

Said bugs 'can have significant implications' – glad to hear that from Redmond

Microsoft is so concerned about security in its Copilot products for folks that it’s lifted bug bounty payments for moderate-severity vulnerabilities from nothing to a maximum of $5,000, and expanded the range of vulnerabilities it will pay people to find and report.…

☐ ☆ ✇ The Register - Security

Oops, some of our customers' Power Pages-hosted sites were exploited, says Microsoft

— February 20th 2025 at 23:17

Don't think this is SaaS and you can relax: Redmond wants a few of you to check your websites

Microsoft has fixed a security flaw in its Power Pages website-building SaaS, after criminals got there first – and urged users to check their sites for signs of exploitation.…

☐ ☆ ✇ WIRED

The National Institute of Standards and Technology Braces for Mass Firings

By: Will Knight, Paresh Dave, Leah Feiger — February 20th 2025 at 20:19
Approximately 500 NIST staffers, including at least three lab directors, are expected to lose their jobs at the standards agency as part of the ongoing DOGE purge, sources tell WIRED.
☐ ☆ ✇ ZDNet | security RSS

9 ways to delete yourself from the internet (and hide your identity online)

— February 20th 2025 at 18:30
If you need to lock down data or reduce your digital footprint, follow our step-by-step guide.
☐ ☆ ✇ Security – Cisco Blog

Your Endpoint Is Secure Against AI Supply Chain Attacks

By: Hyrum Anderson — February 20th 2025 at 13:00
Beginning immediately, all existing users of Cisco Secure Endpoint and Email Threat Protection are protected against malicious AI Supply Chain artifacts.
☐ ☆ ✇ The Register - Security

US minerals company says crooks broke into email and helped themselves to $500K

— February 20th 2025 at 16:44

A painful loss for young company that's yet to generate revenue

A NASDAQ-listed US minerals company says cybercriminals broke into its systems on Valentine's Day and paid themselves around $500,000 – money earmarked for a vendor.…

☐ ☆ ✇ McAfee Blogs

Avoid Being Scammed: How to Identify Fake Emails and Suspicious Links

By: Brooke Seipel — February 20th 2025 at 16:10

Typos. Exciting surprises. Urgent Threats.  

These are just a few of the tactics scammers use to prey on your emotions and slyly deceive you into clicking links that install malware or steal your personal information. 

According to McAfee’s State of the Scamiverse report, a whopping 59% surveyed said they or someone they know has fallen victim to a scam. Here’s how to make sure you don’t join that statistic: 

How to Spot a Phishing Email 

Red Flags in Emails 

  • Poor Grammar and Spelling Errors: Legitimate companies proofread their communications. If an email has glaring typos or odd phrasing, it could be a phishing attempt. 
  • Generic or Strange Greetings: Emails that start with “Dear Customer” instead of your name can be a red flag. 
  • Urgency or Threats: Scammers create panic, warning that your account will be locked or hacked unless you act fast. 
  • Suspicious Attachments: Never open unexpected attachments—they may contain malware designed to steal your data. 
  • Mismatched or Fake Email Addresses: Hover over the sender’s email to check if it’s from the company it claims to be. Be wary of small changes, like “support@paypa1.com” instead of “support@paypal.com.” 

How to Identify a Suspicious Link 

Simple Steps to Check a Link Before Clicking 

  • Hover Before You Click: On a computer, hover your mouse over the link to see its actual URL. On mobile, press and hold the link to reveal the full web address. 
  • Look for HTTPS Encryption: Secure sites use https://—though scammers can still use HTTPS, so don’t rely on this alone. 
  • Watch for URL Tricks: Scammers tweak domain names slightly to fool you (e.g., “amaz0n.com” instead of “amazon.com”). Be cautious with link shorteners (e.g., bit.ly), which can obscure a scam URL—use a tool like CheckShortURL to reveal the true address. 
  • Verify with the Company: If an email claims to be from a bank or business, visit their official website by typing the address into your browser rather than clicking the link. Contact their support team if you’re unsure. 

How to Protect Yourself from Phishing Attacks 

Preventative Measures 

  • Check Email Headers: In Gmail, click the three dots in the upper-right corner and select ‘Show original’ to inspect sender details. 
  • Use Security Tools:  
  • Enable spam filters in your email settings. 
  • Enable two-factor authentication (2FA) for extra security. 

What to Do if You Clicked a Suspicious Link 

  1. Disconnect from the internet to prevent malware from spreading. 
  2. Run a virus scan using security software like McAfee+. 
  3. Change your passwords for any potentially compromised accounts. 
  4. Enable 2FA to strengthen your account security. 
  5. Monitor your bank statements for unusual transactions. 

Phishing attacks are becoming more deceptive, but staying informed and cautious can protect you. Always verify links and emails before clicking, and use trusted cybersecurity tools like McAfee+ to keep your accounts and data safe. 

Stay vigilant—don’t let scammers catch you off guard! 

The post Avoid Being Scammed: How to Identify Fake Emails and Suspicious Links appeared first on McAfee Blog.

☐ ☆ ✇ The Register - Security

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

— February 20th 2025 at 14:45

Bugs fixed, updating to the latest version is advisable

Security sleuths found two critical vulnerabilities in a third-party library that MongoDB relies on, which means bad guys can potentially steal data and run code.…

☐ ☆ ✇ The Hacker News

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

By: Ravie Lakshmanan — February 20th 2025 at 13:37
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,
☐ ☆ ✇ WIRED

Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases

By: Dell Cameron, Dhruv Mehrotra — February 20th 2025 at 12:21
Google enables marketers to target people with serious illnesses and crushing debt—against its policies—as well as the makers of classified defense technology, a WIRED investigation has found.
☐ ☆ ✇ The Register - Security

Two arrested after pensioner scammed out of six-figure crypto nest egg

— February 20th 2025 at 11:35

The latest in a long line of fraud stings worth billions each year

Two men are in police custody after being arrested in connection with a July cryptocurrency fraud involving a man in his seventies.…

☐ ☆ ✇ The Hacker News

China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

By: Ravie Lakshmanan — February 20th 2025 at 11:21
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a now-patched security flaw
☐ ☆ ✇ The Hacker News

PCI DSS 4.0 Mandates DMARC By 31st March 2025

By: Unknown — February 20th 2025 at 11:21
The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result in monetary
☐ ☆ ✇ The Hacker News

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

By: Ravie Lakshmanan — February 20th 2025 at 11:12
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. "The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation," the AhnLab SEcurity Intelligence Center (ASEC)
☐ ☆ ✇ WIRED

Microsoft Hosted Explicit Videos of This Startup Founder for Years. Here's How She Got Them Taken Down

By: Paresh Dave, Matt Burgess — February 20th 2025 at 10:30
Breeze Liu has been a prominent advocate for victims. But even she struggled to scrub nonconsensual intimate images and videos of herself from the web.
☐ ☆ ✇ The Hacker News

Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now

By: Unknown — February 20th 2025 at 10:00
For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks
☐ ☆ ✇ The Register - Security

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

— February 20th 2025 at 08:41

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

The operators of Ghost ransomware continue to claim victims and score payments, but keeping the crooks at bay is possible by patching known vulnerabilities and some basic infosec actions, according to a joint advisory issued Wednesday by the FBI and US Cybersecurity and Infrastructure Security Agency.…

☐ ☆ ✇ ZDNet | security RSS

Aqara's first outdoor camera is this smart home enthusiast's dream device - here's why

— February 20th 2025 at 08:00
Combining home security with hub capability, the Aqara Camera Hub G5 Pro also delivers AI-powered visual recognition features - all without a subscription.
☐ ☆ ✇ The Register - Security

Medusa ransomware gang demands $2M from UK private health services provider

— February 20th 2025 at 07:34

2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident'

Exclusive HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what's claimed to be stolen internal records unless a substantial ransom is paid.…

☐ ☆ ✇ The Hacker News

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

By: Ravie Lakshmanan — February 20th 2025 at 04:36
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0. It has been described as a case of improper privilege management that could
☐ ☆ ✇ The Hacker News

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

By: Ravie Lakshmanan — February 20th 2025 at 04:29
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below - CVE-2025-21355 (CVSS score: 8.6) - Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) - Microsoft Power Pages Elevation of Privilege Vulnerability "
☐ ☆ ✇ The Register - Security

US Army soldier linked to Snowflake extortion rampage admits breaking the law

— February 20th 2025 at 03:01

That's the way the cookie melts

A US Army soldier suspected of hacking AT&T and Verizon has admitted leaking online people's private call records.…

☐ ☆ ✇ WeLiveSecurity

No, you’re not fired – but beware of job termination scams

— February 18th 2025 at 10:00
Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff
☐ ☆ ✇ WIRED

DOGE Now Has Access to the Top US Cybersecurity Agency

By: Kim Zetter — February 20th 2025 at 01:59
DOGE technologists Edward Coristine—the 19-year-old known online as “Big Balls”—and Kyle Schutt are now listed as staff at the Cybersecurity and Infrastructure Security Agency.
☐ ☆ ✇ The Register - Security

Trump’s DoD CISO pick previously faced security clearance suspension

— February 19th 2025 at 22:00

Hey, at least Katie Arrington brings a solid resume

Donald Trump's nominee for a critical DoD cybersecurity role sports a resume that outshines many of his past picks, despite previously suspended security clearance.…

☐ ☆ ✇ The Register - Security

Check out this free automated tool that hunts for exposed AWS secrets in public repos

— February 19th 2025 at 20:45

You can find out if your GitHub codebase is leaking keys ... but so can miscreants

A free automated tool that lets anyone scan public GitHub repositories for exposed AWS credentials has been released.…

☐ ☆ ✇ ZDNet | security RSS

The head of US AI safety has stepped down. What now?

— February 19th 2025 at 19:52
Large-scale shifts at US government agencies that monitor AI development are underway. Where does that leave AI regulation?
☐ ☆ ✇ ZDNet | security RSS

US AI Safety Institute will be 'gutted,' Axios reports

— February 19th 2025 at 19:04
Sources at NIST are preparing for mass firings that would severely undermine the AI regulator. Here's what that means.
☐ ☆ ✇ ZDNet | security RSS

Yikes: Jailbroken Grok 3 can be made to say and reveal just about anything

— February 19th 2025 at 17:32
A red team got xAI's latest model to reveal its system prompt, provide instructions for making a bomb, and worse. Much worse.
☐ ☆ ✇ ZDNet | security RSS

I tried Norton Private Browser to see how it compares to Tor - here's what I found

— February 19th 2025 at 17:06
If you're looking to enhance the security and privacy of your web browsing, and you don't want to bother with extensions and add-ons, Norton Private Browser might be just the solution you're looking for.
☐ ☆ ✇ The Hacker News

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes

By: Ravie Lakshmanan — February 19th 2025 at 16:59
Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. "The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate 'linked devices' feature that enables Signal to be used on multiple
☐ ☆ ✇ The Register - Security

Hundreds of Dutch medical records bought for pocket change at flea market

— February 19th 2025 at 13:01

15GB of sensitive files traced back to former software biz

Typically shoppers can expect to find tie-dye t-shirts, broken lamps and old disco records at flea markets, now it seems storage drives filled with huge volumes of sensitive data can be added to that list.…

☐ ☆ ✇ The Hacker News

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection

By: Unknown — February 19th 2025 at 12:45
A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain. Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year. "Typically delivered through phishing emails containing malicious attachments or links,
❌