Mon.Oct 03, 2022

article thumbnail

Detecting Deepfake Audio by Modeling the Human Acoustic Tract

Schneier on Security

This is interesting research : In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics. Specifically, we apply fluid dynamics to estimate the arrangement of the human vocal tract during speech generation and show that deepfakes often model impossible or highly-unlikely anatomical arrangements.

article thumbnail

GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes

The Last Watchdog

How did America and Americans regress to being much less secure than before the Internet? Everyone knows the many amazing conveniences, benefits, and advances the Internet has enabled. What everyone doesn’t know is how irrational the Internet’s utopian founding premises have proven to be concerning America’s and Americans’ security over the last quarter century.

Internet 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloudflare shows flair with new products for mobile and IoT security

Tech Republic Security

Cloudflare celebrates its 12th anniversary with the launch of a Zero Trust SIM, an IoT security platform and a Botnet Threat Feed. The post Cloudflare shows flair with new products for mobile and IoT security appeared first on TechRepublic.

IoT 158
article thumbnail

Demonstrating Trust and Transparency in Mergers and Acquisitions

Cisco Security

Jason Button is a director at Cisco and leads the company’s Security and Trust Mergers and Acquisitions (M&A) team. He was formerly the director of IT at Duo Security, a company Cisco acquired in 2018, making him uniquely positioned to lend his expertise to the M&A process. This blog is the second in a series focused on M&A cybersecurity, following Jacob Bolotin’s post on Managing Cybersecurity Risk in M&A.

Risk 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Finnish intelligence warns of Russia’s cyberespionage activities

Security Affairs

The Finnish Security Intelligence Service ( SUPO ) warns Russia will highly likely intensify its cyber activity over the winter. The Finnish Security Intelligence Service ( Suojelupoliisi or SUPO ) warn of a highly likely intensification of cyberespionage activities conducted by Russia-linked threat actors over the winter. According to the SUPO, future NATO membership will make the country a privileged target for Russian intelligence and influence operations.

article thumbnail

The Upcoming UK Telecoms (Security) Act Part One: What, Why, Who, When and How

Cisco Security

In November 2020, the Telecommunications (Security) Bill was formally introduced to the UK’s House of Commons by the department for Digital, Culture, Media & Sport. Now, after several readings, debates, committee hearings, and periods of consultation, the Telecommunications (Security) Act is quickly becoming reality for providers of public telecoms networks and services in the UK, going live on 1 October 2022.

LifeWorks

More Trending

article thumbnail

Lazarus Group Uses FudModule Rootkit to Abuse Dell Driver Bug

Heimadal Security

Notorious North Korean hacking group Lazarus was caught installing a Windows rootkit that abuses a Dell hardware driver in a new attack. The spear-phishing campaign, which reportedly had the purpose of espionage and data theft, has been unfolded in the autumn of 2021. The victims of the spear-phishing campaign include an aerospace expert from the […].

Phishing 134
article thumbnail

LinkedIn being targeted by fake CISO Profile Positions in Large Companies

CyberSecurity Insiders

LinkedIn has publicly announced that for some reasons, its servers are being targeted by fake CISO Profiles that disclose vacant positions at large multinational companies. However, the profiles when probed are found to be fake and being targeted from Asian & African countries that have nothing to do with the company operations or vacancies. Krebs On Security received this update from the professional social media giant and initiated an inquiry along with the public disclosure.

CISO 133
article thumbnail

Vice Society Ransomware Gang Leaks Data Form LAUSD Breach

Heimadal Security

On Sunday morning the Vice Society ransomware gang leaked data stolen in September 2022 from the Los Angeles Unified School District (LAUSD). Alberto M. Carvalho, the LAUSD’s superintendent, confirmed that the published data and documents are from the school system’s breach and launched a hotline for the victims. Parents and students that are affected by […].

article thumbnail

RansomEXX gang claims to have hacked Ferrari and leaked online internal documents

Security Affairs

The Italian luxury sports car manufacturer Ferrari confirmed the availability of internal documents online, but said it has no evidence of cyber attack. Documents belonging to the Italian luxury sports car manufacturer Ferrari are circulating online, the company confirmed their authenticity stating it is not aware of cyber attacks. Ferrari is investigating the leak of the internal documents and announced it will implement all the necessary actions.

Hacking 132
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Microsoft Exchange server zero-day mitigation can be bypassed

Bleeping Computer

Microsoft has shared mitigations for two new Microsoft Exchange zero-day vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082, but researchers warn that the mitigation for on-premise servers is far from enough. [.].

131
131
article thumbnail

The High Cost of Living Your Life Online

WIRED Threat Level

Constantly posting content on social media can erode your privacy—and sense of self.

Media 129
article thumbnail

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

ZINC, a sub-group of the notorious North Korean Lazarus hacking group, has implanted malicious payloads in open-source software to infiltrate corporate networks, Microsoft’s threat hunting team has reported. PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and the muPDF/Subliminal Recording software installer have been backdoored to perform a wide range of social engineering campaigns that started in April 2022.

Software 128
article thumbnail

Difference between Information Security and Cybersecurity

CyberSecurity Insiders

There is a confusion among a few that the terms Information Security and Cybersecurity are the same as the two areas take the same strides to a large extent. But technically in practical, both are different, and here’s a brief explanation to prove. Information Security- Protection of information and the information storing systems from unauthorized access accounts to Information Security.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

DeftTorero: tactics, techniques and procedures of intrusions revealed

SecureList

Earlier this year, we started hunting for possible new DeftTorero (aka Lebanese Cedar, Volatile Cedar) artifacts. This threat actor is believed to originate from the Middle East and was publicly disclosed to the cybersecurity community as early as 2015. Notably, no other intelligence was shared until 2021, which led us to speculate on a possible shift by the threat actor to more fileless/LOLBINS techniques, and the use of known/common offensive tools publicly available on the internet that allow

Backups 127
article thumbnail

Ransomware Attack on Ferrari

CyberSecurity Insiders

Ferrari, the luxury car maker, was recently hit by a ransomware attack that apparently led to data leak that is now being posted online on an installment basis. On the other hand, the Italian sports car maker has denied any digital attack on its servers and is still investigating on how the sensitive info leaked online. Corriera Della Sera, an Italian news resource, confirmed the attack and claims to possess evidence that internal data sheets, repair handbooks and some employee data account to 7

article thumbnail

8 questions to ask yourself before getting a home security camera

We Live Security

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home? The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity.

Risk 124
article thumbnail

PRODUCT REVIEW: Nisos OSINT Monitoring and Analysis

CyberSecurity Insiders

Monitoring and tracking potential threats from the dark web, open source, and social media platforms to detect threats that could attack your organization is critical to ensure public and corporate safety and security. Yet many cybersecurity professionals, cybersecurity analysts, and researchers who collect and manage this type of open source intelligence (OSINT) lack the training, tools, and internal oversight needed to effectively thwart an attack.

Risk 123
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Today’s Threats, Tomorrow’s Skill Sets?

Security Boulevard

Being aware of emerging threats and how they impact technologies is key to bolstering defenses. But can this knowledge also prove useful to your career? Today, the top skill sets employers are looking for include cloud computing security skills (40%), followed by risk assessment, analysis and management (26%) and artificial intelligence (AI) and machine learning.

article thumbnail

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022

The State of Security

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 26th, 2022. I’ve also included some comments on these stories. Sophos Firewall Zero-Day Exploited in Attacks on South […]… Read More.

InfoSec 113
article thumbnail

LiveAction adds new SOC-focused features to ThreatEye NDR platform

CSO Magazine

End-to-end network security and performance visibility vendor LiveAction has announced new security operations center (SOC) focused updates to its Network Detection and Response (NDR) platform, ThreatEye. In a press release, the firm stated that the platform features a new user interface (UI) designed to enhance the ability of SOC analysts to correlate findings and policy violations to track incidents.

article thumbnail

Using Facebook Pixel

Security Boulevard

Facebook Pixel is a helpful retargeting tool, but may be collecting more. information than your business needs. The post Using Facebook Pixel appeared first on Security Boulevard.

110
110
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Reflected XSS bugs in Canon Medical ’s Vitrea View could expose patient info

Security Affairs

Trustwave researchers discovered two XSS flaws in Canon Medical ’s Vitrea View tool that could expose patient information. During a penetration test, Trustwave Spiderlabs’ researchers discovered two reflected cross-site scripting (XSS) vulnerabilities, collectively as CVE-2022-37461, in third-party software for Canon Medical’s Vitrea View. The Vitrea View tool allows viewing and securely share medical images through the DICOM standard.

article thumbnail

Avoiding Sephora’s Fate: Demonstrating and Sustaining CCPA Compliance

Security Boulevard

When beauty product retailer Sephora was recently slapped with a $1.2 million fine—the first enforcement action under the California Consumer Privacy Act (CCPA)—organizations across the country took note. Or at least, they should have, considering only 11% of companies are currently able to fully meet CCPA requirements, according to CYTRIO’s State of CCPA Compliance: Q1.

Retail 107
article thumbnail

Hacker Detained in Germany After Phishing Attacks Led to the Theft of €4 Million

Heimadal Security

Following a home raid by Germany’s federal criminal police (BKA), a 24-year-old man has been arrested and charged for orchestrating a large-scale phishing operation that scammed online users of €4,000,000. A second one was also charged with 124 acts of computer fraud, while the third suspect is still the subject of investigations. The phishing attacks […].

Phishing 102
article thumbnail

SEO poisoning: Beware of suspicious links to avoid malware infections

Security Boulevard

Getting infected with malware isn’t just clicking on an errant file, but it usually occurs because an entire ecosystem is created by attackers to fool you into actually doing the click. This is the very technique behind something called SEO poisoning, in which seemingly innocent searches can tempt you with malware-infested links. . The post SEO poisoning: Beware of suspicious links to avoid malware infections appeared first on Security Boulevard.

Malware 104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

The Hacker News

The recently discovered Linux-Based ransomware strain known as Cheerscrypt has been attributed to a Chinese cyber espionage group known for operating short-lived ransomware schemes. Cybersecurity firm Sygnia attributed the attacks to a threat actor it tracks under the name Emperor Dragonfly, which is also known as Bronze Starlight (Secureworks) and DEV-0401 (Microsoft).

article thumbnail

A Humorous LinkedIn “Celebrate an Occasion” Hack for Cybersecurity Awareness Month

Security Boulevard

For Cybersecurity Awareness Month, Assura wanted to grab the world’s attention and showcase cyber defense in a humorous and disruptive way. Humor is often a very powerful tool for communicating a serious message and we felt it was the way to go for this cybersecurity awareness effort. So very much in the spirit of an… Continue reading A Humorous LinkedIn “Celebrate an Occasion” Hack for Cybersecurity Awareness Month.

Hacking 98
article thumbnail

Hackers Exploiting Dell Driver Vulnerability to Deploy Rootkit on Targeted Computers

The Hacker News

The North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by taking advantage of an exploit in a Dell firmware driver, highlighting new tactics adopted by the state-sponsored adversary.

Firmware 100
article thumbnail

Fake LinkedIn CISO Profiles Target Top Companies

SecureWorld News

It feels like pretty much everyday there is some kind of new cybersecurity threat looming on the horizon. Malicious cyber actors are, after all, some of the more innovative individuals in the world. As those of us working to better protect our organizations implement new security measures, threat actors are already creating new tactics to counter those measures.

CISO 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!