Sun.Dec 04, 2022

article thumbnail

Weekly Update 324

Troy Hunt

We're in Copenhagen! Scott and family joined us in Oslo for round 2 of wedding celebrations this week before jumping on the ferry to Copenhagen and seeing the sights here. There's lots of cyber things in this week's vid relating to HIBP's birthday, Medibank and financial penalties for breaches, but I'm just going to leave you with one of the most amazing moments of my life captured in pics: 🇳🇴 ❤️ 👰‍♀️ 🤵 p

article thumbnail

Winning Teams Part 1: Learning from Basketball and Cybersecurity

Lohrman on Security

Tech leaders keep talking about building cyber talent, so what can we learn from looking back at talented teams from the past in cybersecurity and basketball.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Number Nine! Chrome fixes another 2022 zero-day, Edge not patched yet

Naked Security

Ninth more unto the breach, dear friends, ninth more.

135
135
article thumbnail

Data Breaches in Australia Will Now Result in Fines of Up to AU$50 Million

Heimadal Security

The Australian Parliament approved Government’s privacy penalty bill: the maximum fine for companies and data controllers who are responsible for serious data breaches will rise to AU$50 million. Companies and data controllers that suffer severe data breaches will now be liable for fines of up to AU$50 million, according to a new privacy penalty bill […].

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Google transits to Memory Safety Languages for added Mobile Security

CyberSecurity Insiders

Google’s transition to more safe memory languages has brought down the security vulnerability count on Android from 223 in 2019 to just 83 in the current year. And the business unit of Alphabet Inc’s subsidiary last week made the announcement, as it achieved 65% success in surpassing memory safety flaws. As the drop in vulnerabilities is going in parallel with a shift in programming language, security analysts from the internet juggernaut are proactively corelating it to the language shift.

Mobile 128
article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment systems in modern vehicles are a valuable source of information for the investigation of law enforcement agencies. Modern vehicles come with sophisticated infotainment systems that are connected online and that could represent an entry point for attackers, as demonstrated by many security experts over the years.

LifeWorks

More Trending

article thumbnail

Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots

Security Boulevard

A recent data breach of 5.4 million Twitter users and Meta being fined $265 million dollars from a 2021 data leak, and people are fleeing Twitter because of Elon Musk. Are we finally seeing a tipping point in social media? What is the TikTok “Invisible Challenge” and how links to fake “unfilter” software is being […]. The post Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots appeared first on The Shared Security Show.

Media 104
article thumbnail

Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware

Security Affairs

The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity researchers warn of a new malware campaign conducted by the North Korea-linked Lazarus APT against cryptocurrency users. The threat actors were observed spreading fake cryptocurrency apps under the fake brand BloxHolder to deliver the AppleJeus malware for initial access to networks and steal crypto assets.

article thumbnail

Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems

The Hacker News

The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be potentially exploited to crash the program or trigger remote code execution. The issue, assigned the identifier CVE-2022-23093, impacts all supported versions of FreeBSD and concerns a stack-based buffer overflow vulnerability in the ping service.

99
article thumbnail

European Regulator Fines Facebook Parent Meta $276 Million for Data-Scraping Breach

Appknox

A leading European regulator fined Meta Platforms Inc., the company that owns Facebook, 265 million euros, or around $276 million , for failing to better protect the phone numbers and other personal information of more than half a billion users from so-called data scrapers.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Skills Shortage and Integration Challenges Halt Cybersecurity Adoption

Security Boulevard

BlackFog research highlights that a skills shortage is halting cybersecurity adoption and the practical challenges of managing a complex threat landscape. The post Skills Shortage and Integration Challenges Halt Cybersecurity Adoption appeared first on Security Boulevard.

article thumbnail

Android malware apps with 2 million installs spotted on Google Play

Bleeping Computer

A new set of Android malware, phishing, and adware apps have infiltrated the Google Play store, tricking over two million people into installing them. [.].

Adware 98
article thumbnail

Themes from Bosch Connected World 2022: The Role of Cybersecurity in Software-Defined Vehicles and the IIoT

Security Boulevard

In today’s digital world, the Internet of Things (IoT) is everywhere. From smart watches and televisions to connected vehicles and medical devices, it’s hard to find an aspect of our lives that’s not impacted by the IoT. The post Themes from Bosch Connected World 2022: The Role of Cybersecurity in Software-Defined Vehicles and the IIoT appeared first on Keyfactor.

article thumbnail

Android is slowly mastering memory management vulnerabilities

Malwarebytes

Recently we wrote about why the NSA wants you to shift to memory safe programming languages. The short version is: If you ever read our posts describing security vulnerabilities, you will see a lot of phrases like "buffer overflow", "failure to release memory", "use after free", "memory corruption", and "memory leak". These are all memory management issues.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Winning Teams Part 1: Learning from Basketball and Cybersecurity

Security Boulevard

Tech leaders keep talking about building cyber talent, so what can we learn from looking back at talented teams from the past in cybersecurity and basketball. The post Winning Teams Part 1: Learning from Basketball and Cybersecurity appeared first on Security Boulevard.

article thumbnail

US DHS Cyber Safety Board will review Lapsus$ gang’s operations

Security Affairs

US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies. The Department of Homeland Security (DHS) Cyber Safety Review Board announced that it will review cyberattacks linked to the extortion gang Lapsus$ , the gang breached multiple high-profile companies in recent years. “Today, the U.S.

article thumbnail

OT Security Challenges and Solutions

Security Boulevard

OT Security – Though the term sounds familiar, global SRM leaders are yet to develop robust OT security solutions for protecting OT networks. Sectrio’s The IoT and OT CISO Peer Survey 2022 highlights that close to 90% CISOs reported one major cyber incident in the last 12 months. Most respondents stated that operations were halted for over four days, […].

CISO 52
article thumbnail

Why you should customize roles for Oracle ERP

Security Boulevard

Why you should customize roles in Oracle ERPThe dangers of seeded rolesIn Oracle Cloud ERP, or any other ERP application, you have "seeded roles." Seeded roles are the preconfigured roles delivered with your application, and they are designed to get you up and running. Seeded roles are widely used during […]. The post Why you should customize roles for Oracle ERP appeared first on SafePaaS.

52
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Examples of custom roles in Oracle ERP Cloud

Security Boulevard

Example custom roles Oracle ERP cloudOracle ERP Cloud security is based on role-based access controls. The role-based security model, also called RBAC, restricts system access to the users. However, out-of-the-box or seeded roles come with inherent risks. Using out-of-the-box roles has advantages, such as faster time to value. However, from a […]. The post Examples of custom roles in Oracle ERP Cloud appeared first on SafePaaS.

Risk 52
article thumbnail

USENIX Security ’22 – Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner ‘Like Lesbians Walking the Perimeter’

Security Boulevard

Complete Title: USENIX Security '22 - Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner ‘Like Lesbians Walking the Perimeter’: Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice’. Our thanks to USENIX for publishing their Presenter’s USENIX Security ’22 Conference tremendous content on the organization’s’ YouTube channel.