Sun.Dec 04, 2022

article thumbnail

Weekly Update 324

Troy Hunt

We're in Copenhagen! Scott and family joined us in Oslo for round 2 of wedding celebrations this week before jumping on the ferry to Copenhagen and seeing the sights here. There's lots of cyber things in this week's vid relating to HIBP's birthday, Medibank and financial penalties for breaches, but I'm just going to leave you with one of the most amazing moments of my life captured in pics: 🇳🇴 ❤️ 👰‍♀️ 🤵 p

article thumbnail

Winning Teams Part 1: Learning from Basketball and Cybersecurity

Lohrman on Security

Tech leaders keep talking about building cyber talent, so what can we learn from looking back at talented teams from the past in cybersecurity and basketball.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google transits to Memory Safety Languages for added Mobile Security

CyberSecurity Insiders

Google’s transition to more safe memory languages has brought down the security vulnerability count on Android from 223 in 2019 to just 83 in the current year. And the business unit of Alphabet Inc’s subsidiary last week made the announcement, as it achieved 65% success in surpassing memory safety flaws. As the drop in vulnerabilities is going in parallel with a shift in programming language, security analysts from the internet juggernaut are proactively corelating it to the language shift.

Mobile 128
article thumbnail

Data Breaches in Australia Will Now Result in Fines of Up to AU$50 Million

Heimadal Security

The Australian Parliament approved Government’s privacy penalty bill: the maximum fine for companies and data controllers who are responsible for serious data breaches will rise to AU$50 million. Companies and data controllers that suffer severe data breaches will now be liable for fines of up to AU$50 million, according to a new privacy penalty bill […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Cyber Attacks on AIIMS India state Chinese Involvement

CyberSecurity Insiders

A few days ago, the All-India Institute of Medical Sciences (AIIMS) based in Delhi was hit by a cyber attack of ransomware variant and sources report that the hackers are demanding Rs 200 Crores to return the stolen information belonging to millions of patients that would be otherwise sold on the dark web. According to a probe conducted by CERT-IN, Chinese involvement is suspected behind the incident and reports are in that the hackers targeted a few of the other government agencies whose attack

article thumbnail

Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots

Security Boulevard

A recent data breach of 5.4 million Twitter users and Meta being fined $265 million dollars from a 2021 data leak, and people are fleeing Twitter because of Elon Musk. Are we finally seeing a tipping point in social media? What is the TikTok “Invisible Challenge” and how links to fake “unfilter” software is being […]. The post Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots appeared first on The Shared Security Show.

Media 102

More Trending

article thumbnail

European Regulator Fines Facebook Parent Meta $276 Million for Data-Scraping Breach

Appknox

A leading European regulator fined Meta Platforms Inc., the company that owns Facebook, 265 million euros, or around $276 million , for failing to better protect the phone numbers and other personal information of more than half a billion users from so-called data scrapers.

article thumbnail

Skills Shortage and Integration Challenges Halt Cybersecurity Adoption

Security Boulevard

BlackFog research highlights that a skills shortage is halting cybersecurity adoption and the practical challenges of managing a complex threat landscape. The post Skills Shortage and Integration Challenges Halt Cybersecurity Adoption appeared first on Security Boulevard.

article thumbnail

Android malware apps with 2 million installs spotted on Google Play

Bleeping Computer

A new set of Android malware, phishing, and adware apps have infiltrated the Google Play store, tricking over two million people into installing them. [.].

Adware 100
article thumbnail

Themes from Bosch Connected World 2022: The Role of Cybersecurity in Software-Defined Vehicles and the IIoT

Security Boulevard

In today’s digital world, the Internet of Things (IoT) is everywhere. From smart watches and televisions to connected vehicles and medical devices, it’s hard to find an aspect of our lives that’s not impacted by the IoT. The post Themes from Bosch Connected World 2022: The Role of Cybersecurity in Software-Defined Vehicles and the IIoT appeared first on Keyfactor.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Android is slowly mastering memory management vulnerabilities

Malwarebytes

Recently we wrote about why the NSA wants you to shift to memory safe programming languages. The short version is: If you ever read our posts describing security vulnerabilities, you will see a lot of phrases like "buffer overflow", "failure to release memory", "use after free", "memory corruption", and "memory leak". These are all memory management issues.

article thumbnail

Winning Teams Part 1: Learning from Basketball and Cybersecurity

Security Boulevard

Tech leaders keep talking about building cyber talent, so what can we learn from looking back at talented teams from the past in cybersecurity and basketball. The post Winning Teams Part 1: Learning from Basketball and Cybersecurity appeared first on Security Boulevard.

article thumbnail

Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware

Security Affairs

The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity researchers warn of a new malware campaign conducted by the North Korea-linked Lazarus APT against cryptocurrency users. The threat actors were observed spreading fake cryptocurrency apps under the fake brand BloxHolder to deliver the AppleJeus malware for initial access to networks and steal crypto assets.

article thumbnail

Number Nine! Chrome fixes another 2022 zero-day, Edge not patched yet

Naked Security

Ninth more unto the breach, dear friends, ninth more.

135
135
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

USENIX Security ’22 – Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner ‘Like Lesbians Walking the Perimeter’

Security Boulevard

Complete Title: USENIX Security '22 - Christine Geeng, Mike Harris, Elissa Redmiles, Franziska Roesner ‘Like Lesbians Walking the Perimeter’: Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice’. Our thanks to USENIX for publishing their Presenter’s USENIX Security ’22 Conference tremendous content on the organization’s’ YouTube channel.

article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment systems in modern vehicles are a valuable source of information for the investigation of law enforcement agencies. Modern vehicles come with sophisticated infotainment systems that are connected online and that could represent an entry point for attackers, as demonstrated by many security experts over the years.

article thumbnail

OT Security Challenges and Solutions

Security Boulevard

OT Security – Though the term sounds familiar, global SRM leaders are yet to develop robust OT security solutions for protecting OT networks. Sectrio’s The IoT and OT CISO Peer Survey 2022 highlights that close to 90% CISOs reported one major cyber incident in the last 12 months. Most respondents stated that operations were halted for over four days, […].

CISO 52
article thumbnail

US DHS Cyber Safety Board will review Lapsus$ gang’s operations

Security Affairs

US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies. The Department of Homeland Security (DHS) Cyber Safety Review Board announced that it will review cyberattacks linked to the extortion gang Lapsus$ , the gang breached multiple high-profile companies in recent years. “Today, the U.S.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Why you should customize roles for Oracle ERP

Security Boulevard

Why you should customize roles in Oracle ERPThe dangers of seeded rolesIn Oracle Cloud ERP, or any other ERP application, you have "seeded roles." Seeded roles are the preconfigured roles delivered with your application, and they are designed to get you up and running. Seeded roles are widely used during […]. The post Why you should customize roles for Oracle ERP appeared first on SafePaaS.

52
article thumbnail

Examples of custom roles in Oracle ERP Cloud

Security Boulevard

Example custom roles Oracle ERP cloudOracle ERP Cloud security is based on role-based access controls. The role-based security model, also called RBAC, restricts system access to the users. However, out-of-the-box or seeded roles come with inherent risks. Using out-of-the-box roles has advantages, such as faster time to value. However, from a […]. The post Examples of custom roles in Oracle ERP Cloud appeared first on SafePaaS.

Risk 52