Thu.Mar 16, 2023

article thumbnail

Why We Need To Talk About DigitALL

Jane Frankland

Last week, on March 8, many of us celebrated International Women’s Day (IWD). As many people know, it’s an important day which is used as a focal point in the women’s rights movement, bringing attention to issues such as gender equality, reproductive rights, and violence and abuse against women. All people are encouraged to participate, and in some countries people even celebrate it as a national holiday.

Education 130
article thumbnail

Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast

Security Boulevard

Ben is disappointed: FBI reports huge rise in cryptocurrency investment scams. Why am I not surprised? The post Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast appeared first on Security Boulevard.

Scams 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

Tech Republic Security

While the administration may look to strengthen security against cyberattackers for cloud providers, like Amazon, Microsoft and Google, experts say the onus is on the customer. The post The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself appeared first on TechRepublic.

article thumbnail

BrandPost: 1Password integrates with Okta SSO

CSO Magazine

Single Sign-On (SSO) providers like Okta protect businesses by combining all company-approved sites and services in a single dashboard. Employees can then use a single, strongly vetted identity to log in to those sites and services using a single set of credentials. It's better for security, and easier for employees. Now, 1Password Business customers can access 1Password with their Okta credentials, too.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion

Dark Reading

The ransomware group has already claimed 116 victim organizations so far on its site, and it continues to mature as a thriving cybercriminal business, researchers said.

article thumbnail

Electronic communication policy

Tech Republic Security

This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications.

114
114

More Trending

article thumbnail

Why red team exercises for AI should be on a CISO's radar

CSO Magazine

AI and machine learning (ML) capabilities present a huge opportunity for digital transformation but open yet another threat surface that CISOs and risk professionals will have to keep tabs on. Accordingly, CISOs will need to direct their teams to conduct red team exercises against AI models and AI-enabled applications — just as security teams do with any traditional application, platform, or IT system.

CISO 126
article thumbnail

Microsoft shares script to fix WinRE BitLocker bypass flaw

Bleeping Computer

Microsoft has released a script to make it easier to patch a BitLocker bypass security vulnerability in the Windows Recovery Environment (WinRE). [.

143
143
article thumbnail

When and how to report a breach to the SEC

CSO Magazine

New cybersecurity reporting requirements for publicly traded companies are expected to be enacted in the spring of 2023, with proposed rules from the US Securities and Exchange Commission (SEC) looking for more information and transparency from those hit with security incidents. Under the proposal, the SEC would implement three new rules that public companies will need to follow: A requirement that companies report any cybersecurity event within four business days of determining that it was a ma

article thumbnail

$3B Crypto-Mixer Money Laundering Operation Seized by Cops

Dark Reading

The 'ChipMixer' cryptocurrency service for cybercriminals was shut down by law enforcement, and its alleged operator has been charged.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets

Bleeping Computer

Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung's Exynos chipsets used in mobile devices, wearables, and cars. [.

Mobile 127
article thumbnail

SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 Apps

Heimadal Security

The cyber-research community raises concerns over an unpatched vulnerability that puts the Microsoft 365 suite at risk. Earmarked CVE-2023-23397, the vulnerability allows an unauthenticated threat actor to obtain the user’s credentials by passing along a crafted email package. Research suggests that the bug, which was formally attributed to a Microsoft Outlook component, has a high […] The post SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 Apps a

Risk 109
article thumbnail

Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips

The Hacker News

Google is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of which could be exploited remotely to completely compromise a phone without requiring any user interaction.

106
106
article thumbnail

YouTube becomes a heaven to malware stealers

CyberSecurity Insiders

Whenever we see a YouTube video that is informative, we tend to go through the description or ‘show more’ feature and have a habit of clicking on the links. What if the link leads us to a website that is a malware dropper? A new report by cloud security firm CloudSEK says that there has been a 200% to 300% monthly rise in such attacks, where the videos are filled with info stealing malware.

Malware 105
article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders. When done effectively, it can help interpret complex risk environments for leaders and inform their decision-making.

article thumbnail

Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks

Dark Reading

Attackers are increasingly staying under the radar by using your own tools against you. Only behavioral AI can catch these stealthy attacks.

126
126
article thumbnail

Hackers shifting cybercrime focus towards smart phones and tablets

CyberSecurity Insiders

All these days, we have seen cyber criminals infiltrating networks and taking down computers. But after the spread of the Covid-19 pandemic, the focus of hackers has shifted more towards the smart phones with more phishing and social engineering attacks recorded in a 2nd quarter of 2022. Embedding malicious links in social media, emails, apps and SMS is making hackers target tech savvy individuals, thus taking this crime industry to a multi-billion-dollar business.

article thumbnail

Microsoft support 'cracks' Windows for customer after activation fails

Bleeping Computer

In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine copy of the operating system failed to activate normally. It seems, this isn't the first time either that a Microsoft support professional has employed such workarounds. [.

article thumbnail

How to Protect Your Company in a ChatGPT World

Security Boulevard

With the potential to be as game-changing as the internet, smartphones and cloud computing, the emergence of generative AI tools like ChatGPT and GitHub CoPilot will undoubtedly open up new possibilities and challenges for companies. The swift and sweeping advancement of AI has raised the stakes for those looking to leverage this technology responsibly while.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

Microsoft unveils AI-powered Microsoft 365 Copilot assistant

Bleeping Computer

Microsoft has announced a new assistant powered by artificial intelligence to help boost productivity across Microsoft 365 apps, currently being tested by select commercial customers. [.

article thumbnail

The Importance of Physical Access Endpoint Detection 

Security Boulevard

In our latest blog, Nozomi Networks Labs share insights into host-based threats, highlight the importance of endpoint detection sensors like Arc, and explain how these sensors can be used to protect OT/IoT assets. The post The Importance of Physical Access Endpoint Detection appeared first on Nozomi Networks. The post The Importance of Physical Access Endpoint Detection appeared first on Security Boulevard.

IoT 98
article thumbnail

10 Network Security Threats Everyone Should Know

eSecurity Planet

Network security threats weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. Because businesses face an extensive array of threats, they should carefully monitor and mitigate the most critical threats and vulnerabilities. This guide to major network security threats covers detection methods as well as mitigation strategies for your organization to follow.

article thumbnail

The Top Cybersecurity Grants for Education and How To Apply for Them

Security Boulevard

Cyber safety challenges — and the often-pricey tools designed to overcome them — are a fact of life. Sure, the cheapest cybersecurity solution is to just give up using every piece of technology that poses any sort of risk — but that would leave your school with chalkboards and paper spreadsheets. Suffice it to say […] The post The Top Cybersecurity Grants for Education and How To Apply for Them appeared first on ManagedMethods.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

Cryptocurrency and non-fungible tokens (NFTs) - what are they and why should you care? With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises. Join this exclusive webinar with Ryan McInerny to learn: Cryptocurrency asset market trends How to manage risk and compliance to serve customers safely Best practices for identifying crypto transactions and companies Rev

article thumbnail

CISA adds Adobe ColdFusion bug to Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added an actively exploited vulnerability in Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog. U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Adobe ColdFusion, tracked as CVE-2023-26360 (CVSS score: 8.6), to its Known Exploited Vulnerabilities Catalog. This week Adobe released security updates for ColdFusion versions 2021 and 2018 to resolve the critical flaw CVE-2023-26360 that was exploited in very limited attacks.

Hacking 94
article thumbnail

The Life and Death of Passwords: The History of Encryption with Simon Singh

Duo's Security Blog

Our documentary, “ The Life and Death of Passwords ,” explores with industry experts the history of passwords, why passwords have become less effective over time, and how trust is established in a passwordless future. With this interview series , we take a deeper dive into their insights and share bonus footage. Today: Simon Sing – a science author and journalist who explores mathematics, cryptography, and cosmology – digs into the pre-computing history of passwords, the evolution of cryptogra

article thumbnail

Polish intelligence dismantled a network of Russian spies

Security Affairs

Polish intelligence dismantled a cell of Russian spies that gathered info on military equipment deliveries to Ukraine via the EU member. Polish counter-intelligence has dismantled a cell of Russian spies that gathered information on the provisioning of military equipment to Ukraine via the EU member. “The ABW counter-intelligence agency has arrested nine people suspected of working for the Russian secret service,” Poland’s Interior Minister Mariusz Kaminski told reporters.

Hacking 94
article thumbnail

UK bans TikTok on government devices over data security fears

CSO Magazine

Social media app TikTok has been banned on UK government electronic devices, the Cabinet Office has announced. The ban, announced by the chancellor of the Duchy of Lancaster, Oliver Dowden, comes in the wake of a security review into the risks posed to government data by social media apps on devices along with the potential for sensitive information to be accessed and used by some platforms.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Did you know that 2021 was a record-breaking year for ransomware? The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue. With 495.1 million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.

article thumbnail

Baseband RCE flaws in Samsung’s Exynos chipsets expose devices to remote hack

Security Affairs

Google’s Project Zero hackers found multiple flaws in Samsung ’s Exynos chipsets that expose devices to remote hack with no user interaction. White hat hackers at Google’s Project Zero unit discovered multiple vulnerabilities Samsung ’s Exynos chipsets that can be exploited by remote attackers to compromise phones without user interaction. The researchers discovered a total of eighteen vulnerabilities, the four most severe of these flaws (CVE-2023-24033 and three other vulnerabilities that

Hacking 92
article thumbnail

SASE 101: Understanding the Fundamentals of Secure Access Service Edge

Heimadal Security

In today’s digital age, businesses are increasingly moving their operations to the cloud. However, with this shift comes numerous security risks that can compromise sensitive data and confidential information. That’s where Secure Access Service Edge (SASE) comes in: a cutting-edge technology that promises to revolutionize cybersecurity by providing secure access to any application, anytime and […] The post SASE 101: Understanding the Fundamentals of Secure Access Service Edge a

article thumbnail

Rapid7 Acquires Minerva Labs to Extend Leading Managed Detection and Response Service

Dark Reading

Minerva's robust technology and talented engineering team extend Rapid7's end-to-end managed threat detection and orchestration capabilities from the endpoint to the cloud.

article thumbnail

CISA Warns of Adobe ColdFusion Vulnerability Exploited in the Wild

Heimadal Security

On March 15, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a new vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The said vulnerability impacts Adobe ColdFusion and is actively exploited by threat actors. Details on the Vulnerability The flaw in question is CVE-2023-26360, with a CVSS score of 8.6. The vulnerability can be […] The post CISA Warns of Adobe ColdFusion Vulnerability Exploited in the Wild appeared first on Heimdal Security Blog.

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

Global economic conditions are soft at best. From a budget standpoint, US banks are feeling the pinch. Many US banks are bracing for increased defaults and lower demand for mortgages and other loans as interest rates have increased. The largest banks have increased reserves to protect against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions?