Sat.Jul 30, 2022

article thumbnail

Weekly Update 306

Troy Hunt

I didn't intend for a bunch of this week's vid to be COVID related, but between the breach of an anti-vaxxer website and the (unrelated) social comments directed at our state premier following some pretty simple advice, well, it just kinda turned out that way. But there's more on other breaches too, in particular the alleged Paytm one and the actual Customer.io one.

article thumbnail

Meta, US hospitals sued for using healthcare data to target ads

Bleeping Computer

A class action lawsuit has been filed in the Northern District of California against Meta (Facebook), the UCSF Medical Center, and the Dignity Health Medical Foundation, alleging that the organizations are unlawfully collecting sensitive healthcare data about patients for targeted advertising. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Staying Ahead of the Distortion of a Cyber Attack?

Security Boulevard

Staying Ahead of the Distortion of a Cyber Attack? One of the most sacred responsibilities of all cybersecurity professionals is protecting information. Corporate financials, client information, sales records, and product designs are all critical to an organization’s success. Each firewall, IDS, MFA, and email security is built to protect and stop cyber attacks.

article thumbnail

Facebook ads push Android adware with 7 million installs on Google Play

Bleeping Computer

Several adware apps promoted aggressively on Facebook as system cleaners and optimizers for Android devices are counting millions of installations on Google Play store. [.].

Adware 106
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report

Security Affairs

I’m proud to announce the release of the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report, Enjoy it! Ransomware has become one of the most dangerous threats for organizations worldwide. Cybercriminal organizations and ransomware gangs have devised new business models that are attracting a broad range of advanced threat actors.

article thumbnail

Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers

The Hacker News

Microsoft on Friday disclosed a potential connection between the Raspberry Robin USB-based worm and an infamous Russian cybercrime group tracked as Evil Corp. The tech giant said it observed the FakeUpdates (aka SocGholish) malware being delivered via existing Raspberry Robin infections on July 26, 2022.

LifeWorks

More Trending

article thumbnail

You Pay More When Companies Get Hacked

WIRED Threat Level

Plus: Google delays the end of cookies (again), EU officials were targeted with Pegasus spyware, and more of the top security news.

Spyware 97
article thumbnail

Scam Robotexts on the Rise, FCC Warns

SecureWorld News

Have you recently noticed an increase in the number of random scam texts being sent your way? It's likely not because you clicked on a malicious link but because threat actors are ramping up their efforts to gain access to your device—and ultimately your money. The U.S. Federal Communications Commission (FCC) Robocall Response Team has issued an alert to consumers, warning of the threat of rising robotexts.

Scams 96
article thumbnail

Stop Putting Your Accounts At Risk, and Start Using a Password Manager

The Hacker News

Image via Keeper Right Now, Get 30% Off Keeper, the Most Trusted Name in Password Management. In one way or another, almost every aspect of our lives is online, so it’s no surprise that hackers target everything from email accounts to banks to smart home devices, looking for vulnerabilities to exploit. One of the easiest exploits is cracking a weak password.

article thumbnail

XKCD ‘Proxy Variable’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Proxy Variable’ appeared first on Security Boulevard.

52
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Aspen Security Forum 2022 – Moderator: Mary Louise Kelly, Co-Host, All Things Considered, NPR – Fireside Chats with General John W. “Jay” Raymond Chief of Space Operations, U.S. Space Force

Security Boulevard

Our thanks to The Aspen Institute for publishing their cogent conference videos on the organization's YouTube channel. Updated with byline of Moderator Mary Louise Kelly, a Co-Host at All Things Considered, NPR. Permalink. The post Aspen Security Forum 2022 – Moderator: Mary Louise Kelly, Co-Host, All Things Considered, NPR – Fireside Chats with General John W. “Jay” Raymond Chief of Space Operations, U.S.

article thumbnail

Aspen Security Forum 2022 – Anja Manuel’s ‘Opens The 22 Aspen Security Forum’

Security Boulevard

Our thanks to The Aspen Institute for publishing their cogent conference videos on the organization's YouTube channel. Permalink. The post Aspen Security Forum 2022 – Anja Manuel’s ‘Opens The 22 Aspen Security Forum’ appeared first on Security Boulevard.