Mon.Oct 03, 2022

article thumbnail

Detecting Deepfake Audio by Modeling the Human Acoustic Tract

Schneier on Security

This is interesting research : In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics. Specifically, we apply fluid dynamics to estimate the arrangement of the human vocal tract during speech generation and show that deepfakes often model impossible or highly-unlikely anatomical arrangements.

article thumbnail

GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes

The Last Watchdog

How did America and Americans regress to being much less secure than before the Internet? Everyone knows the many amazing conveniences, benefits, and advances the Internet has enabled. What everyone doesn’t know is how irrational the Internet’s utopian founding premises have proven to be concerning America’s and Americans’ security over the last quarter century.

Internet 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloudflare shows flair with new products for mobile and IoT security

Tech Republic Security

Cloudflare celebrates its 12th anniversary with the launch of a Zero Trust SIM, an IoT security platform and a Botnet Threat Feed. The post Cloudflare shows flair with new products for mobile and IoT security appeared first on TechRepublic.

IoT 150
article thumbnail

Microsoft Exchange server zero-day mitigation can be bypassed

Bleeping Computer

Microsoft has shared mitigations for two new Microsoft Exchange zero-day vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082, but researchers warn that the mitigation for on-premise servers is far from enough. [.].

143
143
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

LinkedIn being targeted by fake CISO Profile Positions in Large Companies

CyberSecurity Insiders

LinkedIn has publicly announced that for some reasons, its servers are being targeted by fake CISO Profiles that disclose vacant positions at large multinational companies. However, the profiles when probed are found to be fake and being targeted from Asian & African countries that have nothing to do with the company operations or vacancies. Krebs On Security received this update from the professional social media giant and initiated an inquiry along with the public disclosure.

CISO 133
article thumbnail

Finnish intelligence warns of Russia’s cyberespionage activities

Security Affairs

The Finnish Security Intelligence Service ( SUPO ) warns Russia will highly likely intensify its cyber activity over the winter. The Finnish Security Intelligence Service ( Suojelupoliisi or SUPO ) warn of a highly likely intensification of cyberespionage activities conducted by Russia-linked threat actors over the winter. According to the SUPO, future NATO membership will make the country a privileged target for Russian intelligence and influence operations.

More Trending

article thumbnail

Today’s Threats, Tomorrow’s Skill Sets?

Security Boulevard

Being aware of emerging threats and how they impact technologies is key to bolstering defenses. But can this knowledge also prove useful to your career? Today, the top skill sets employers are looking for include cloud computing security skills (40%), followed by risk assessment, analysis and management (26%) and artificial intelligence (AI) and machine learning.

article thumbnail

Ransomware Attack on Ferrari

CyberSecurity Insiders

Ferrari, the luxury car maker, was recently hit by a ransomware attack that apparently led to data leak that is now being posted online on an installment basis. On the other hand, the Italian sports car maker has denied any digital attack on its servers and is still investigating on how the sensitive info leaked online. Corriera Della Sera, an Italian news resource, confirmed the attack and claims to possess evidence that internal data sheets, repair handbooks and some employee data account to 7

article thumbnail

Lazarus Group Uses FudModule Rootkit to Abuse Dell Driver Bug

Heimadal Security

Notorious North Korean hacking group Lazarus was caught installing a Windows rootkit that abuses a Dell hardware driver in a new attack. The spear-phishing campaign, which reportedly had the purpose of espionage and data theft, has been unfolded in the autumn of 2021. The victims of the spear-phishing campaign include an aerospace expert from the […].

Phishing 118
article thumbnail

PRODUCT REVIEW: Nisos OSINT Monitoring and Analysis

CyberSecurity Insiders

Monitoring and tracking potential threats from the dark web, open source, and social media platforms to detect threats that could attack your organization is critical to ensure public and corporate safety and security. Yet many cybersecurity professionals, cybersecurity analysts, and researchers who collect and manage this type of open source intelligence (OSINT) lack the training, tools, and internal oversight needed to effectively thwart an attack.

Risk 123
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

8 questions to ask yourself before getting a home security camera

We Live Security

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home? The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity.

Risk 116
article thumbnail

Vice Society Ransomware Gang Leaks Data Form LAUSD Breach

Heimadal Security

On Sunday morning the Vice Society ransomware gang leaked data stolen in September 2022 from the Los Angeles Unified School District (LAUSD). Alberto M. Carvalho, the LAUSD’s superintendent, confirmed that the published data and documents are from the school system’s breach and launched a hotline for the victims. Parents and students that are affected by […].

article thumbnail

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

ZINC, a sub-group of the notorious North Korean Lazarus hacking group, has implanted malicious payloads in open-source software to infiltrate corporate networks, Microsoft’s threat hunting team has reported. PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and the muPDF/Subliminal Recording software installer have been backdoored to perform a wide range of social engineering campaigns that started in April 2022.

Software 114
article thumbnail

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022

The State of Security

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 26th, 2022. I’ve also included some comments on these stories. Sophos Firewall Zero-Day Exploited in Attacks on South […]… Read More.

InfoSec 113
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Demonstrating Trust and Transparency in Mergers and Acquisitions

Cisco Security

Jason Button is a director at Cisco and leads the company’s Security and Trust Mergers and Acquisitions (M&A) team. He was formerly the director of IT at Duo Security, a company Cisco acquired in 2018, making him uniquely positioned to lend his expertise to the M&A process. This blog is the second in a series focused on M&A cybersecurity, following Jacob Bolotin’s post on Managing Cybersecurity Risk in M&A.

Risk 113
article thumbnail

LiveAction adds new SOC-focused features to ThreatEye NDR platform

CSO Magazine

End-to-end network security and performance visibility vendor LiveAction has announced new security operations center (SOC) focused updates to its Network Detection and Response (NDR) platform, ThreatEye. In a press release, the firm stated that the platform features a new user interface (UI) designed to enhance the ability of SOC analysts to correlate findings and policy violations to track incidents.

article thumbnail

Using Facebook Pixel

Security Boulevard

Facebook Pixel is a helpful retargeting tool, but may be collecting more. information than your business needs. The post Using Facebook Pixel appeared first on Security Boulevard.

108
108
article thumbnail

Water Labbu Abuses Malicious DApps to Steal Cryptocurrency

Trend Micro

The parasitic Water Labbu capitalizes on the social engineering schemes of other scammers, injecting malicious JavaScript code into their malicious decentralized application websites to steal cryptocurrency.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Avoiding Sephora’s Fate: Demonstrating and Sustaining CCPA Compliance

Security Boulevard

When beauty product retailer Sephora was recently slapped with a $1.2 million fine—the first enforcement action under the California Consumer Privacy Act (CCPA)—organizations across the country took note. Or at least, they should have, considering only 11% of companies are currently able to fully meet CCPA requirements, according to CYTRIO’s State of CCPA Compliance: Q1.

Retail 105
article thumbnail

RansomEXX gang claims to have hacked Ferrari and leaked online internal documents

Security Affairs

The Italian luxury sports car manufacturer Ferrari confirmed the availability of internal documents online, but said it has no evidence of cyber attack. Documents belonging to the Italian luxury sports car manufacturer Ferrari are circulating online, the company confirmed their authenticity stating it is not aware of cyber attacks. Ferrari is investigating the leak of the internal documents and announced it will implement all the necessary actions.

Hacking 104
article thumbnail

SEO poisoning: Beware of suspicious links to avoid malware infections

Security Boulevard

Getting infected with malware isn’t just clicking on an errant file, but it usually occurs because an entire ecosystem is created by attackers to fool you into actually doing the click. This is the very technique behind something called SEO poisoning, in which seemingly innocent searches can tempt you with malware-infested links. . The post SEO poisoning: Beware of suspicious links to avoid malware infections appeared first on Security Boulevard.

Malware 102
article thumbnail

DeftTorero: tactics, techniques and procedures of intrusions revealed

SecureList

Earlier this year, we started hunting for possible new DeftTorero (aka Lebanese Cedar, Volatile Cedar) artifacts. This threat actor is believed to originate from the Middle East and was publicly disclosed to the cybersecurity community as early as 2015. Notably, no other intelligence was shared until 2021, which led us to speculate on a possible shift by the threat actor to more fileless/LOLBINS techniques, and the use of known/common offensive tools publicly available on the internet that allow

Backups 102
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Web browser app mode can be abused to make desktop phishing pages

Bleeping Computer

The app mode in Chromium-based browsers like Google Chrome and Microsoft Edge can be abused to create realistic-looking login screens that appear as desktop apps. [.].

Phishing 102
article thumbnail

A Humorous LinkedIn “Celebrate an Occasion” Hack for Cybersecurity Awareness Month

Security Boulevard

For Cybersecurity Awareness Month, Assura wanted to grab the world’s attention and showcase cyber defense in a humorous and disruptive way. Humor is often a very powerful tool for communicating a serious message and we felt it was the way to go for this cybersecurity awareness effort. So very much in the spirit of an… Continue reading A Humorous LinkedIn “Celebrate an Occasion” Hack for Cybersecurity Awareness Month.

Hacking 98
article thumbnail

Why (almost) everything we told you about passwords was wrong

Malwarebytes

I have an embarrassing confession to make: I reuse passwords. I am not proud of it, but honestly it’s a relief to finally get it off my chest. I am not a heavy re-user, nothing crazy, I use a password manager to handle most of my credentials but I still reuse the odd password from time to time. It’s embarrassing to admit because recommending that users use unique passwords for each of their accounts is part of my job, and with good reason: Password reuse leads to credential stuffing,

article thumbnail

Ransomware gang leaks data stolen from LAUSD school system

Bleeping Computer

The Vice Society Ransomware gang published data and documents Sunday morning that were stolen from the Los Angeles Unified School District during a cyberattack earlier this month. [.].

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Hackers Exploiting Dell Driver Vulnerability to Deploy Rootkit on Targeted Computers

The Hacker News

The North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by taking advantage of an exploit in a Dell firmware driver, highlighting new tactics adopted by the state-sponsored adversary.

article thumbnail

Foundational Activities for Secure Software Development

Security Boulevard

Follies The Broadway Tower in Worcestershire, England is a famous structure. It’s inspiring, beautiful, and at 62 feet high, like other similar buildings, it’s a folly. While it looks grand inside and out, it serves no purpose than to be a decoration. It’s all too easy to buy a set of policies and procedures, change […]… Read More. The post Foundational Activities for Secure Software Development appeared first on The State of Security.

article thumbnail

Ex-NSA Employee Arrested for Trying to Sell U.S. Secrets to a Foreign Government

The Hacker News

A former U.S. National Security Agency (NSA) employee has been arrested on charges of attempting to sell classified information to a foreign spy, who was actually an undercover agent working for the Federal Bureau of Investigation (FBI).

article thumbnail

Romance scammer deepfakes Mark Ruffalo to con elderly artist

Malwarebytes

Deepfakes have settled into a groove, as most scam techniques do. It seems most deepfakers have decided to make as much cash as possible from unsuspecting victims instead of doing anything particularly earth-shattering with their technology. One curious twist we may not have seen coming is the mashup of deepfake and romance scam , though this is a natural fit in many ways.

Scams 89
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.