Thu.Apr 21, 2022

article thumbnail

Don’t Let Encryption Become A Double-Edged Sword That Undermines Zero Trust CyberSecurity

Joseph Steinberg

It is no secret that cybersecurity professionals universally recommend that people, businesses, and governments employ strong encryption as one of several methods of protecting sensitive information. Data that must remain private simply cannot be readable by unauthorized parties – and that rule applies both when the relevant information is at rest on an internal server, in the cloud, or on some backup media, as well as when it is in transit over any form of network or other means of communicatio

article thumbnail

Long Article on NSO Group

Schneier on Security

Ronan Farrow has a long article in The New Yorker on NSO Group, which includes the news that someone — probably Spain — used the software to spy on domestic Catalonian sepratists.

Software 329
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The wisdom of taking a risk-based approach to security compliance

The Last Watchdog

Today, all organizations are required or encouraged to meet certain standards and regulations to protect their data against cybersecurity threats. The regulations vary across countries and industries, but they are designed to protect customers from the threat of posed data breaches. . Related: The value of sharing third-party risk assessments. With estimates suggesting there are currently over 15 billion user credentials scattered across the dark web, the importance of compliance is clear to se

Risk 235
article thumbnail

How phishing attacks are spoofing credit unions to steal money and account credentials

Tech Republic Security

Attackers are impersonating local credit unions to capture personal information and extract money, says Avanan. The post How phishing attacks are spoofing credit unions to steal money and account credentials appeared first on TechRepublic.

Phishing 197
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Beware of fake Twitter philanthropists offering to put $750 into your Cash App account

Malwarebytes

Twitter philanthropists are a controversial emergence on the social media platform. In essence, Twitter-based philanthropy is about incredibly rich people helping out those who need it. The help is random, and often focused around performing a task like listening to a podcast or simply retweeting something. Of course, not everyone can “win” and many, many people miss out.

article thumbnail

How to lock an iPad or iPhone into Single App Mode with Guided Access

Tech Republic Security

Set your device into kiosk mode and pass it around without worrying about someone opening other apps or accessing unwanted content through an accessibility feature called Guided Access. The post How to lock an iPad or iPhone into Single App Mode with Guided Access appeared first on TechRepublic.

Mobile 185

LifeWorks

More Trending

article thumbnail

Cybersecurity Advisory warns of Russian-backed cyber threats to infrastructure

Tech Republic Security

A release from the Cybersecurity Advisory outlines what organizations should be on the lookout for when it comes to a Russian cybersecurity attack. The post Cybersecurity Advisory warns of Russian-backed cyber threats to infrastructure appeared first on TechRepublic.

article thumbnail

It’s legal to scrape public data—US appeals court

Malwarebytes

Web scraping—the automated extraction of data from websites—has been around for a long time. Simultaneously cursed and praised, with nobody being able to quite land the decisive blow about whether it should be allowed, one way or another. This may have changed, thanks to a recent US appeals court ruling. A tangled web of scraped content. LinkedIn (and, by extension, Microsoft ) is not impressed with people or organisations scraping publicly available data from its site.

Phishing 144
article thumbnail

North Korea targeting blockchain, cryptocurrency companies

Tech Republic Security

An infamous North Korean state-sponsored threat actor is hitting several organizations in the blockchain and cryptocurrencies industries. Learn how to protect yourself. The post North Korea targeting blockchain, cryptocurrency companies appeared first on TechRepublic.

article thumbnail

CVE-2022-20685 flaw in the Modbus preprocessor of the Snort makes it unusable

Security Affairs

CVE-2022-20685 flaw in the Modbus preprocessor of the Snort detection engine could trigger a DoS condition and make it ineffective against malicious traffic. Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) which is currently developed by Cisco. The software performs real-time traffic analysis and packet logging on Internet Protocol (IP) networks, protocol analysis, content searching and matching.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Zero-Day Exploit Use Exploded in 2021

Dark Reading

Ransomware and other financially motivated threat actors joined nation-state-backed groups in leveraging unpatched flaws in attack campaigns, new data shows.

article thumbnail

Critical bug in decoder used by popular chipsets exposes 2/3 of Android devices to hack

Security Affairs

A critical RCE flaw in Android devices running on Qualcomm and MediaTek chipsets could allow access to users’ media files. Security researchers at Check Point Research have discovered a critical remote code execution that affects the implementation of the Apple Lossless Audio Codec (ALAC) in Android devices running on Qualcomm and MediaTek chipsets.

Hacking 141
article thumbnail

Pegasus spyware found on UK government office phone

Malwarebytes

“When we found the No. 10 case, my jaw dropped.” John Scott-Railton recalled after finding out on July 7, 2020 that Pegasus, the highly sophisticated flagship spyware of Israel’s NSO Group, was used to infect a phone linked to the network at 10 Downing Street, the UK Prime Minister’s home and office. For years, the Citizen Lab, a specialized research group based at the University of Toronto where Scott-Railton works as a senior researcher, has been investigating Pegasus and its

Spyware 134
article thumbnail

A formula for measuring real-world email security efficacy

CSO Magazine

The skeptic in my head has been saying for years, “How can I measure security efficacy in the real world?” Here’s how. First, it is important to know that efficacy is measured by calculating the “proportionate reduction in risk.” In the case of COVID-19 vaccines , for example, that occurs when assessing the outcome of applying treatment to one population as compared to an untreated population.

Risk 130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybercriminals Deliver IRS Tax Scams & Phishing Campaigns By Mimicking Government Vendors

Security Affairs

Threat intelligence firm Resecurity details how crooks are delivering IRS tax scams and phishing attacks posing as government vendors. Cybercriminals are leveraging advanced tactics in their phishing-kits granting them a high delivery success rate of spoofed e-mails which contain malicious attachments right before the end of the 2021 IRS income tax return deadline in the U.S.

Scams 130
article thumbnail

Docker servers hacked in ongoing cryptomining malware campaign

Bleeping Computer

Docker APIs on Linux servers are being targeted by a large-scale Monero crypto-mining campaign from the operators of the Lemon_Duck botnet. [.].

Hacking 129
article thumbnail

Static SSH host key in Cisco Umbrella allows stealing admin credentials

Security Affairs

Cisco addressed a high severity vulnerability in the Cisco Umbrella Virtual Appliance (VA) that could allow stealing admin credentials. Cisco addressed a high severity vulnerability in the Cisco Umbrella Virtual Appliance (VA) , tracked as CVE-2022-20773, that could be exploited by an unauthenticated attacker to steal admin credentials remotely. Umbrella is Cisco’s cloud-based Secure Internet Gateway (SIG) platform that provides users with multiple levels of defense against internet-based

DNS 127
article thumbnail

New Arkose Labs Survey Reveals the True Impact of Bot Attacks

Security Boulevard

The survey findings show the impact bot attacks have on businesses, the difficulty in detecting modern, intelligent bots and the impact it has on their customers. How prepared are you to fight the intelligent bot revolution? Owing to their evolving capabilities and growing digital presence, bots are becoming a headache for businesses. Proliferation in the […].

124
124
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

A Guide to The Metaverse and Cybersecurity: Addressing Threats in the Future of Internet

CyberSecurity Insiders

by Grace Lau – Director of Growth Content, Dialpad. As we write this, large companies are investing heavily in Metaverse real estate – and for very good reason. However, some are also concerned that the Metaverse is developing in a dangerously uncontrolled way. As such, Metaverse cybersecurity is a big topic at the moment. Here, we’ll take you through the situation as it stands for businesses, and predict some of the most important measures you can take to protect your business in the Metaverse.

Internet 124
article thumbnail

REvil reborn? Notorious gang’s dark web site redirects to new ransomware operation

The State of Security

Researchers have spotted that the TOR address used by the notorious REvil ransomware gang is now redirecting to a new website, with information about seemingly new attacks. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Hackers earn $400K for zero-day ICS exploits demoed at Pwn2Own

Bleeping Computer

Pwn2Own Miami 2022 has ended with competitors earning $400,000 for 26 zero-day exploits (and several bug collisions) targeting ICS and SCADA products demoed during the contest between April 19 and April 21. [.].

122
122
article thumbnail

Five Eyes issues Russian Cyber Threat warning

CyberSecurity Insiders

All the countries that are against Russia’s war on Ukraine, mainly the UK, US, Australia, Canada and New Zealand and collectively called as Five Eyes- have been warned about a major possible cyber attack from Russian Federation. So, all the national leaders from the above stated five countries are being urged to bolster the security of the IT infrastructure in their respective nations.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New Incident Report Reveals How Hive Ransomware Targets Organizations

The Hacker News

A recent Hive ransomware attack carried out by an affiliate involved the exploitation of "ProxyShell" vulnerabilities in the Microsoft Exchange Server that were disclosed last year to encrypt an unnamed customer's network.

article thumbnail

BrandPost: Securing the 5G Future

CSO Magazine

CISOs throughout the telecommunications industry are preparing their data protection programs for a 5G future that will fully arrive in three to five years. Today, consumers have noticed their cellular devices begin to market and show the 5G label. But the not-too-distant future brings 5G in a wide range of areas such as artificial/augmented reality, production monitoring and delivery via 5G drones, on-demand private 5G networks, and a wide variety of use cases.

article thumbnail

S3 Ep79: Chrome hole, a bad place for a cybersecurity holiday, and crypto-dodginess [Podcast]

Naked Security

Do you know your Adam Osborne from your John Osbourne? Your Z80 from your 6502? Latest episode - listen now!

article thumbnail

Unpatched Bug in RainLoop Webmail Could Give Hackers Access to all Emails

The Hacker News

An unpatched high-severity security flaw has been disclosed in the open-source RainLoop web-based email client that could be weaponized to siphon emails from victims' inboxes. "The code vulnerability [.

121
121
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Critical infrastructure: Under cyberattack for longer than you might think

We Live Security

Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services. The post Critical infrastructure: Under cyberattack for longer than you might think appeared first on WeLiveSecurity.

120
120
article thumbnail

Microsoft Exchange Servers Targeted by Hive Ransomware

Heimadal Security

A Hive ransomware affiliate has been deploying multiple backdoors, including the Cobalt Strike beacon, on Microsoft Exchange servers that are vulnerable to ProxyShell security issues. As explained by my colleague, Cobalt Strike is a threat emulation software released in 2012 which can be used to deploy beacons on systems to simulate cyberattacks and test network […].

article thumbnail

Too Many Cooks in the Kitchen: Why You Need to Consolidate Your Cybersecurity Approach

Security Boulevard

When it comes to cybersecurity, more is not always better. As new solutions have emerged in response to rapidly evolving technology and increasingly sophisticated cyber attacks, SOCs have added tool after tool to their arsenals. The post Too Many Cooks in the Kitchen: Why You Need to Consolidate Your Cybersecurity Approach appeared first on Security Boulevard.

article thumbnail

Critical Chipset Bugs Open Millions of Android Devices to Remote Spying

The Hacker News

Three security vulnerabilities have been disclosed in the audio decoders of Qualcomm and MediaTek chips that, if left unresolved, could allow an adversary to remotely gain access to media and audio conversations from affected mobile devices.

Mobile 118
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!