Thu.Jun 16, 2022

article thumbnail

Attacking the Performance of Machine Learning Systems

Schneier on Security

Interesting research: “ Sponge Examples: Energy-Latency Attacks on Neural Networks “: Abstract: The high energy costs of neural network training and inference led to the use of acceleration hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural networks in datacenters and deploy them on edge devices, their designers’ focus so far is on average-case performance.

355
355
article thumbnail

GUEST ESSAY: Five steps to improving identity management — and reinforcing network security

The Last Watchdog

The identity management market has grown to $13 billion and counting. While intuition would tell you enterprises have identity under control, that is far from reality. Related: Taking a zero-trust approach to access management. Current events, such as the global pandemic and ‘ The Great Resignation, ’ which have accelerated cloud adoption, remote working environments, and the number of business applications and systems in use has complicated matters.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Potentially dangerous’ Office 365 flaw discovered

Tech Republic Security

Proofpoint says the piece of functionality allows ransomware to encrypt files stored on Microsoft SharePoint and OneDrive. The post ‘Potentially dangerous’ Office 365 flaw discovered appeared first on TechRepublic.

article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

A cyberattack is any action taken by a cyber criminal in an attempt to illegally gain control of a computer, device, network, or system with malicious intent. Cyber criminals may damage, destroy, steal, encrypt, expose, or leak data as well as cause harm to a system. Cyberattacks are on the rise, with cyber criminal trends and techniques becoming increasingly sophisticated and creative.

Backups 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Multi-data center clustering: The evolution of web hosting

Tech Republic Security

ScalaHosting offers a data center service you can depend on. The post Multi-data center clustering: The evolution of web hosting appeared first on TechRepublic.

article thumbnail

Radware Survey Reveals API Security Weaknesses

Security Boulevard

A survey published today suggests there is a disconnect between the perceived and actual level of security being applied to application programming interfaces (APIs). The survey polled 203 IT professionals in Europe, Asia and North America from organizations with more than 1,000 employees and was conducted by Enterprise Management Associates (EMA) on behalf of Radware, The post Radware Survey Reveals API Security Weaknesses appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

We Live Security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents? The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity.

Malware 144
article thumbnail

Hiring entry-level and junior candidates can alleviate the cybersecurity skills shortage

Tech Republic Security

Hiring managers must avoid unrealistic job descriptions and placing too much emphasis on experience alone, according to a new report from (ISC)². The post Hiring entry-level and junior candidates can alleviate the cybersecurity skills shortage appeared first on TechRepublic.

article thumbnail

Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning

The Hacker News

For years, the two most popular methods for internal scanning: agent-based and network-based were considered to be about equal in value, each bringing its own strengths to bear. However, with remote working now the norm in most if not all workplaces, it feels a lot more like agent-based scanning is a must, while network-based scanning is an optional extra.

142
142
article thumbnail

How to Build Cybersecurity Resilience

Security Boulevard

Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity shortfalls. Here are four trends that, in addition to the anticipated rise in ransomware, should affect how.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Hertzbleed exposes computers’ secret whispers

Malwarebytes

Hertzbleed is the name for a vulnerability that can be used to obtain cryptographic keys and other secret data from Intel and AMD CPUs, remotely. It works by monitoring changes in power consumption, which can be deduced by the careful timing of known workloads, thanks to a processor power saving feature called dynamic voltage and frequency scaling (DVFS).

article thumbnail

Police Linked to Hacking Campaign to Frame Indian Activists

WIRED Threat Level

New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.

Hacking 138
article thumbnail

What are the Consequences of a Data Breach?

Security Boulevard

2022 has proved to be the year where it’s impossible to negate the consequences of a data breach. Data breaches have the potential to destroy businesses. A small company can shut down all operations within six months of a breach. Larger companies can withstand the pinch, but not without a hefty cost. Even multinationals can […]. The post What are the Consequences of a Data Breach?

article thumbnail

Interpol arrests thousands of scammers in operation “First Light 2022”

The State of Security

Law enforcement agencies around the world appear to have scored a major victory in the fight against fraudsters, in an operation which has seized tens of millions of dollars and seen more than 2000 people arrested. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybercriminals Target Companies with Outdated Cybersecurity Procedures

Heimadal Security

Research conducted by Cymulate, a cybersecurity intelligence platform, found that 39 % of businesses were victims of cybercrime during the course of the preceding year; of those, two-thirds were victimized more than once. One in ten of the people who were struck more than once became prey to further cyberattacks of 10 or more instances It […].

article thumbnail

BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers

Security Affairs

The BlackCat ransomware gang is targeting unpatched Exchange servers to compromise target networks, Microsoft warns. Microsoft researchers have observed BlackCat ransomware gang targeting unpatched Exchange servers to compromise organizations worldwide. The compromise of Exchange servers allows threat actors to access the target networks, perform internal reconnaissance and lateral movement activities, and steal sensitive documents before encrypting them. “For example, while the common ent

article thumbnail

BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers

The Hacker News

Microsoft is warning that the BlackCat ransomware crew is leveraging exploits for unpatched Exchange server vulnerabilities to gain access to targeted networks.

article thumbnail

People: A cornerstone for fostering security resilience

Cisco Security

Security resilience isn’t something that happens overnight. It’s something that grows with every challenge, pivot and plot change. While organizations can invest in solid technology and efficient processes, one thing is critical in making sure it translates into effective security: people. What impact do people have on security resilience? Does the number of security employees in an organization affect its ability to foster resilience?

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Ireland is now a part of the Microsoft Government Security Program (GSP)

CyberSecurity Insiders

Ireland government has proclaimed that it is joining Microsoft Government Security Program (GSP) and so will be getting needed help in defending its country’s critical infrastructure from cyber attacks. Thus the country will now on be able to access source code, much needed information on threats and early alerts on vulnerabilities on all Microsoft (MS) products and services.

article thumbnail

Facebook Messenger Scam Duped Millions

Threatpost

One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.

Scams 116
article thumbnail

Top 10 Security Issues in Mobile App Development

Appknox

As a mobile app developer, you must develop and release fully functional and safe applications. While you can manage the functionality quite comfortably, making the application secure and resilient to cyber-attacks is hard. So, what should you do? Well, we got you covered.

Mobile 116
article thumbnail

Location data poses risks to individuals, organizations

CSO Magazine

The market for you and your device’s location is enormous and growing. That data is collected by your network provider, by apps on your smart devices, and by the websites with which you engage. It is the holy grail of marketing, and infosec’s nightmare. Companies that produce location-tracking algorithms and technological magic are riding the hyper-personalized marketing rocket, which continues to expand at breathtaking speed.

Risk 115
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

S3 Ep87: Follina, AirTags, ID theft and the Law of Big Numbers [Podcast]

Naked Security

Lastest epsiode - listen now!

Phishing 113
article thumbnail

Photos of kids taken from spyware-ridden phones found exposed on the internet

Malwarebytes

A stalkerware -type app that boasts “the best free phone spying software on the market,” has exposed the data it snooped on from the phones it was installed in. The data exposed by TheTruthSpy included GPS locations and photos on victims’ phones, and images of children and babies. This news, first reported by Motherboard , is the latest in a lengthening list of spyware brands breached due to their poor cybersecurity hygiene.

Spyware 113
article thumbnail

UK ICO to retain millions in fines to meet legal expenses

CyberSecurity Insiders

Britain’s Information Commissioner Office (ICO) will from now on retain the accumulated sum as penalties to meet legal expenses. All these days, the estimated income per annum as GDPR fines were hitting £17 million or 4% of annual turnover and were being diverted into the government’s consolidated fund. But from now, as per the new agreement made with the Treasury and the Department for Digital, Culture, Media & Sport (the ICO will keep DCMS), an amount of £8 million to meet the litigation c

Mobile 112
article thumbnail

Microsoft Office 365 feature can help cloud ransomware attacks

Bleeping Computer

Security researchers are warning that threat actors could hijack Office 365 accounts to encrypt for a ransom the files stored in SharePoint and OneDrive services that companies use for cloud-based collaboration, document management and storage. [.].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Okta’s Matt Raible: How I became a Java hipster

InfoWorld on Security

Matt Raible is a well-known Java and JavaScript educator with several books to his credit and broad experience in the industry. He is currently developer advocate at Okta , where he focuses on security, and a member of the technology advisory board of JHipster , a leading hybrid Java and JavaScript development platform.

Education 110
article thumbnail

Cyber Jagrukta Divas: A Ministry of Home Affairs Initiative

Security Boulevard

Cyber Jagrukta Divas is an initiative launched by the Ministry of Home Affairs to raise cybersecurity awareness in PSUs, especially banks and the government's critical infrastructure. The post Cyber Jagrukta Divas: A Ministry of Home Affairs Initiative appeared first on Kratikal Blogs. The post Cyber Jagrukta Divas: A Ministry of Home Affairs Initiative appeared first on Security Boulevard.

Banking 105
article thumbnail

We don’t need another infosec hero

CSO Magazine

There’s this belief among a lot of security professionals that we are special, in that we are the defenders of our companies. We like to think we hold ourselves to a higher standard of care than our coworkers. If not for us, the thinking goes, our companies would crash and burn in horrible ways. Breaches would run rampant. Data would be stolen left and right.

InfoSec 103
article thumbnail

RSAC Startup Competition Focuses on Post-Cloud IT Infrastructure

Dark Reading

A secure Web browser takes the top prize, and for the second year in a row malware detection is an afterthought.

Malware 103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!