Mon.Oct 03, 2022

Detecting Deepfake Audio by Modeling the Human Acoustic Tract

Schneier on Security

This is interesting research : In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics.

GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes

The Last Watchdog

How did America and Americans regress to being much less secure than before the Internet? Everyone knows the many amazing conveniences, benefits, and advances the Internet has enabled. What everyone doesn’t know is how irrational the Internet’s utopian founding premises have proven to be concerning America’s and Americans’ security over the last quarter century. The first irrational security-related premise is that U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The High Cost of Living Your Life Online

WIRED Threat Level

Constantly posting content on social media can erode your privacy—and sense of self. Security Security / Privacy

Media 112

RansomEXX gang claims to have hacked Ferrari and leaked online internal documents

Security Affairs

The Italian luxury sports car manufacturer Ferrari confirmed the availability of internal documents online, but said it has no evidence of cyber attack.

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

The Upcoming UK Telecoms (Security) Act Part One: What, Why, Who, When and How

Cisco CSR

In November 2020, the Telecommunications (Security) Bill was formally introduced to the UK’s House of Commons by the department for Digital, Culture, Media & Sport.

Finnish intelligence warns of Russia’s cyberespionage activities

Security Affairs

The Finnish Security Intelligence Service ( SUPO ) warns Russia will highly likely intensify its cyber activity over the winter.

More Trending

LinkedIn being targeted by fake CISO Profile Positions in Large Companies

CyberSecurity Insiders

LinkedIn has publicly announced that for some reasons, its servers are being targeted by fake CISO Profiles that disclose vacant positions at large multinational companies.

Using Facebook Pixel

Security Boulevard

Facebook Pixel is a helpful retargeting tool, but may be collecting more. information than your business needs. The post Using Facebook Pixel appeared first on Security Boulevard. Security Bloggers Network

91

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

The Hacker News

The recently discovered Linux-Based ransomware strain known as Cheerscrypt has been attributed to a Chinese cyber espionage group known for operating short-lived ransomware schemes.

Demonstrating Trust and Transparency in Mergers and Acquisitions

Cisco CSR

Jason Button is a director at Cisco and leads the company’s Security and Trust Mergers and Acquisitions (M&A) team. He was formerly the director of IT at Duo Security, a company Cisco acquired in 2018, making him uniquely positioned to lend his expertise to the M&A process.

Risk 85

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

Hackers Exploiting Dell Driver Vulnerability to Deploy Rootkit on Targeted Computers

The Hacker News

The North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by taking advantage of an exploit in a Dell firmware driver, highlighting new tactics adopted by the state-sponsored adversary.

Difference between Information Security and Cybersecurity

CyberSecurity Insiders

There is a confusion among a few that the terms Information Security and Cybersecurity are the same as the two areas take the same strides to a large extent. But technically in practical, both are different, and here’s a brief explanation to prove.

Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain Attack

The Hacker News

A threat actor likely with associations to China has been attributed to a new supply chain attack that involves the use of a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor.

Avoiding Sephora’s Fate: Demonstrating and Sustaining CCPA Compliance

Security Boulevard

When beauty product retailer Sephora was recently slapped with a $1.2 million fine—the first enforcement action under the California Consumer Privacy Act (CCPA)—organizations across the country took note.

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

Ex-NSA Employee Arrested for Trying to Sell U.S. Secrets to a Foreign Government

The Hacker News

A former U.S. National Security Agency (NSA) employee has been arrested on charges of attempting to sell classified information to a foreign spy, who was actually an undercover agent working for the Federal Bureau of Investigation (FBI).

Ransomware Attack on Ferrari

CyberSecurity Insiders

Ferrari, the luxury car maker, was recently hit by a ransomware attack that apparently led to data leak that is now being posted online on an installment basis.

Cloudflare shows flair with new products for mobile and IoT security

Tech Republic Security

Cloudflare celebrates its 12th anniversary with the launch of a Zero Trust SIM, an IoT security platform and a Botnet Threat Feed. The post Cloudflare shows flair with new products for mobile and IoT security appeared first on TechRepublic.

Mobile 113

A Humorous LinkedIn “Celebrate an Occasion” Hack for Cybersecurity Awareness Month

Security Boulevard

For Cybersecurity Awareness Month, Assura wanted to grab the world’s attention and showcase cyber defense in a humorous and disruptive way. Humor is often a very powerful tool for communicating a serious message and we felt it was the way to go for this cybersecurity awareness effort.

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

Reflected XSS bugs in Canon Medical ’s Vitrea View could expose patient info

Security Affairs

Trustwave researchers discovered two XSS flaws in Canon Medical ’s Vitrea View tool that could expose patient information.

Foundational Activities for Secure Software Development

Security Boulevard

Follies The Broadway Tower in Worcestershire, England is a famous structure. It’s inspiring, beautiful, and at 62 feet high, like other similar buildings, it’s a folly. While it looks grand inside and out, it serves no purpose than to be a decoration.

Microsoft Exchange server zero-day mitigation can be bypassed

Bleeping Computer

Microsoft has shared mitigations for two new Microsoft Exchange zero-day vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082, but researchers warn that the mitigation for on-premise servers is far from enough. [.]. Security

106
106

Optus Data Breach – Why Vulnerable APIs are to Blame

Security Boulevard

For those that haven't heard, Optus, the second largest telecom company in Australia, exposed over 11.2 million customer records including names, physical and email addresses, birth dates and, for some, government issued id numbers such as drivers license or passport numbers.

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

ZINC, a sub-group of the notorious North Korean Lazarus hacking group, has implanted malicious payloads in open-source software to infiltrate corporate networks, Microsoft’s threat hunting team has reported.

How AWS, Cisco, Netflix & SAP Are Approaching Cybersecurity Awareness Month

Dark Reading

This year's theme is "See Yourself in Cyber," and these security folks are using the month to reflect on the personal factor in cybersecurity

Fake LinkedIn CISO Profiles Target Top Companies

SecureWorld News

It feels like pretty much everyday there is some kind of new cybersecurity threat looming on the horizon. Malicious cyber actors are, after all, some of the more innovative individuals in the world.

CISO 68

Lessons from the cyber front line

IT Security Guru

Very few weeks go by without news of another cyber attack or data breach and a quick scan of the BBC news website shows that in most months, there is at least one story that makes the national news headlines.

Name That Edge Toon: Mumbo Dumbo

Dark Reading

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card

66

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of September 26, 2022

The State of Security

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of September 26th, 2022. I’ve also included some comments on these stories.

AWS Permission Boundaries for Dummies

Security Boulevard

AWS permission boundaries are confusing. I know they are confusing because they confused me, and it took me a couple years to figure them out. I also know they are confusing because Corey Quinn said so, and asked for someone to make them less confusing.

65

Web browser app mode can be abused to make desktop phishing pages

Bleeping Computer

The app mode in Chromium-based browsers like Google Chrome and Microsoft Edge can be abused to create realistic-looking login screens that appear as desktop apps. [.]. Security

Canada’s Largest Retail Pizza Chain Moves from Reactive to Proactive API Protection with Cequence

Security Boulevard

Pizza as a Target for Cyber-attacks? Most people could or would not imagine pizza as a target for cybercrime but remarkably Canada’s largest retail pizza chain had been experiencing just that, a set of ongoing cyberattacks and retail API protection challenges that were disrupting their business.

8 questions to ask yourself before getting a home security camera

We Live Security

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home? The post 8 questions to ask yourself before getting a home security camera appeared first on WeLiveSecurity. Internet of Things

Risk 64