Mon.May 16, 2022

article thumbnail

The NSA Says that There are No Known Flaws in NIST’s Quantum-Resistant Algorithms

Schneier on Security

Rob Joyce, the director of cybersecurity at the NSA, said so in an interview: The NSA already has classified quantum-resistant algorithms of its own that it developed over many years, said Joyce. But it didn’t enter any of its own in the contest. The agency’s mathematicians, however, worked with NIST to support the process, trying to crack the algorithms in order to test their merit. “Those candidate algorithms that NIST is running the competitions on all appear strong, secure,

article thumbnail

Bitdefender vs McAfee: Compare EDR software

Tech Republic Security

When you're choosing EDR software for your business, see how the features of Bitdefender and McAfee compare. The post Bitdefender vs McAfee: Compare EDR software appeared first on TechRepublic.

Software 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond Awareness: How to Cultivate the Human Side of Security

CyberSecurity Insiders

By Amanda Fennell, CSO and CIO, Relativity. Sophisticated security tools and well-constructed processes can help insulate an organization from the relentless cyberattacks that are part of the digital reality businesses face every day and everywhere. But tools and processes alone are two variables in an incomplete equation. People are the linchpin in any organization’s security posture—and the wildcard.

CSO 131
article thumbnail

Microsoft Defender vs CrowdStrike: Compare EDR software

Tech Republic Security

Microsoft Defender and CrowdStrike provide robust endpoint protection software, but one of them comes out consistently superior. See how the features of these EDR tools compare. The post Microsoft Defender vs CrowdStrike: Compare EDR software appeared first on TechRepublic.

Software 148
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CISA warns not to install May Windows updates on domain controllers

Bleeping Computer

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has removed a Windows security flaw from its catalog of known exploited vulnerabilities due to Active Directory (AD) authentication issues caused by the May 2022 updates that patch it. [.].

article thumbnail

Kaspersky report identifies new ransomware trends for 2022

Tech Republic Security

Ransomware is probably the type of cybercrime that has made headlines the most in 2021, and 2022 seems to follow that trend. Yet it is still evolving, and new ransomware seems more adaptive, resilient and more industrialized. The post Kaspersky report identifies new ransomware trends for 2022 appeared first on TechRepublic.

More Trending

article thumbnail

Delve into cybersecurity with this two-part training bundle

Tech Republic Security

You can learn from more than 90 self-paced certification training courses, as well as protect yourself with a lifetime VPN license. . The post Delve into cybersecurity with this two-part training bundle appeared first on TechRepublic.

article thumbnail

Third-party web trackers log what you type before submitting

Bleeping Computer

An extensive study looking into the top 100k ranking websites has revealed that many are leaking information you enter in the site forms to third-party trackers before you even press submit. [.].

118
118
article thumbnail

“Incompetent” council leaks details of students with special educational needs

Graham Cluley

Central Bedfordshire Council failed to properly redact the details of 'dozens and dozens' of pupils with special educational needs when responding to a Freedom of Information request, publishing them on a public website.

Education 117
article thumbnail

12 steps to building a top-notch vulnerability management program

CSO Magazine

Security executives have long known the importance of addressing vulnerabilities within their IT environments. And other executives in the C-suite have also come around to the criticality of this task, given the number of high-profile breaches that happened as a result of an unpatched system. [ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. | Sign up for CSO newsletters. ].

CSO 115
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Serious Flaw in Firewalls and VPNs Manufactured by Zyxel Exploited

Heimadal Security

Zyxel is a trademark name that is used by both Zyxel Communications Corp. and Zyxel Networks, two companies that are involved in the production of networking equipment as well as the provision of services to communications service providers. Zyxel firms have their headquarters in Hsinchu, Taiwan, with branch offices all around the world, including in […].

article thumbnail

Fake reCAPTCHA forms dupe users via compromised WordPress sites

Malwarebytes

Researchers at Sucuri investigated a number of WordPress websites complaining about unwanted redirects and found websites that use fake CAPTCHA forms to get the visitor to accept web push notifications. These websites are a new wave of a campaign that leverages many compromised WordPress sites. CAPTCHA. CAPTCHA (“Completely Automated Public Turing test to tell Computers and Humans Apart”) is one of the annoyances that we have learned to take for granted when we browse the Internet.

Adware 104
article thumbnail

Ukraine supporters in Germany targeted with PowerShell RAT malware

Bleeping Computer

An unknown threat actor is targeting German users interested in the Ukraine crisis, infecting them with a custom PowerShell RAT (remote access trojan) and stealing their data. [.].

Malware 98
article thumbnail

Top 10 Best Apps To Use When Running A Small Business

SecureBlitz

Running a small business can be hard. Here are some apps that can help make running your company easier. Whether you’ve just started your firm or have been running it for a few years, you’re probably always considering ways to enhance and optimize your daily operations. Working from home, the office, or on the road, The post Top 10 Best Apps To Use When Running A Small Business appeared first on SecureBlitz Cybersecurity.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Sophos antivirus driver caused BSODs after Windows KB5013943 update

Bleeping Computer

Sophos has released a fix for a known issue triggering blue screens of death (aka BSODs) on Windows 11 systems running Sophos Home antivirus software after installing the KB5013943 upda [.].

article thumbnail

Researchers Find Potential Way to Run Malware on iPhone Even When it's OFF

The Hacker News

A first-of-its-kind security analysis of iOS Find My function has identified a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that's executed while an iPhone is "off.

Malware 98
article thumbnail

Kali Linux 2022.2 released with 10 new tools, WSL improvements, and more

Bleeping Computer

Offensive Security has released ?Kali Linux 2022.2, the second version in 2022, with desktop enhancements, a fun April Fools screensaver, WSL GUI improvements, terminal tweaks, and best of all, new tools to play with! [.].

98
article thumbnail

The NSA Says that There are No Known Flaws in NIST’s Quantum-Resistant Algorithms

Security Boulevard

Rob Joyce, the director of cybersecurity at the NSA, said so in an interview: The NSA already has classified quantum-resistant algorithms of its own that it developed over many years, said Joyce. But it didn’t enter any of its own in the contest. The agency’s mathematicians, however, worked with NIST to support the process, trying to crack the algorithms in order to test their merit.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

US links Thanos and Jigsaw ransomware to 55-year-old doctor

Bleeping Computer

The US Department of Justice today said that Moises Luis Zagala Gonzalez (Zagala), a 55-year-old cardiologist with French and Venezuelan citizenship residing in Ciudad Bolivar, Venezuela, created and rented Jigsaw and Thanos ransomware to cybercriminals. [.].

article thumbnail

Do You Want Secure Supply Chains? SHOW ME THE MONEY

Security Boulevard

The Open Source Security Foundation and Linux Foundation have a plan to fix our broken software supply chains. 1.5M Benjamins needed. The post Do You Want Secure Supply Chains? SHOW ME THE MONEY appeared first on Security Boulevard.

article thumbnail

Parker Manufacturing Hit with Conti Ransomware

SecureWorld News

United States manufacturing giant Parker Hannifin recently announced the company fell victim to a ransomware attack, resulting in a data breach of employee information. A statement from the Ohio-based corporation says the incident occurred on March 12th and it has begun the process of notifying employees whose personal information was potentially compromised.

article thumbnail

CISA, Int’l Cybersecurity Bodies Issue Advisory to MSPs

Security Boulevard

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with four international security organizations including the United Kingdom’s National Cyber Security Centre (NCSC-UK), issued an advisory to help managed service providers (MSPs) and customers secure sensitive data. The advisory is aimed at raising organizations’ awareness of the growing threat of supply chain attacks and the.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability

The Hacker News

Image source: z3r00t The U.S. Cybersecurity and Infrastructure Security Agency on Monday added two security flaws, including the recently disclosed remote code execution bug affecting Zyxel firewalls, to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. Tracked as CVE-2022-30525, the vulnerability is rated 9.

article thumbnail

How Encryption Helps Restore Cloud Security Integrity

Security Boulevard

Data is everywhere and anywhere and, as a result, data management is out of control. Once a user or customer has signed up for a service or purchased a product, they usually have no idea about where their data is being stored, with whom it is shared or how it is secured. The adoption of. The post How Encryption Helps Restore Cloud Security Integrity appeared first on Security Boulevard.

article thumbnail

HTML attachments remain popular among phishing actors in 2022

Bleeping Computer

HTML files remain one of the most popular attachments used in phishing attacks for the first four months of 2022, showing that the technique remains effective against antispam engines and works well on the victims themselves. [.].

article thumbnail

Where You Can Find the Industry-First Software Supply Chain Security Toolkit

Security Boulevard

Where You Can Find the Industry-First Software Supply Chain Security Toolkit. Scott Carter. Mon, 05/16/2022 - 17:13. The interactive, web-based guide to software supply chain security. Jetstack, a Venafi company, has taken a giant leap forward in providing clarity and direction for teams securing software supply chains. They have announced the availability of an easy-to-use, interactive and comprehensive toolkit for securing modern software supply chains.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

MANA Price Prediction For 2022-2024

SecureBlitz

Here is the MANA price prediction for 2022 to 2024… MANA, or Decentraland game token, is one of the booming play to earn (P2E) games that allow players to get rewards in cryptocurrency by simply playing games. In Decentraland, gamers use MANA token to purchase different game items at the native marketplace. MANA is also. The post MANA Price Prediction For 2022-2024 appeared first on SecureBlitz Cybersecurity.

article thumbnail

The downside of ‘debugging’ ransomware

We Live Security

The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code. The post The downside of ‘debugging’ ransomware appeared first on WeLiveSecurity.

article thumbnail

Privacy As Enabling Technology

Security Boulevard

Recently, Google demonstrated a new smart glasses technology. In the demo, they showed how these smart glasses could “break down communication barriers” by instantaneously translating communications and displaying what the other person is saying in the wearer’s native language. This would allow Mandarin speakers to, for example, communicate effortlessly with English speakers and would allow.

article thumbnail

Engineering firm Parker discloses data breach after ransomware attack

Bleeping Computer

The Parker-Hannifin Corporation announced a data breach exposing employees' personal information after the Conti ransomware gang began publishing allegedly stolen data last month. [.].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.