Tue.Jan 03, 2023

article thumbnail

Breaking RSA with a Quantum Computer

Schneier on Security

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on the orders of millions of qbits, to factor anything resembling the key sizes we use today.

article thumbnail

GUEST ESSAY: These common myths and misconceptions make online browsing very risky

The Last Watchdog

For the average user, the Internet is an increasingly dangerous place to navigate. Related: Third-party snooping is widespread. Consider that any given website experiences approximately 94 malicious attacks a day , and that an estimated 12.8 million websites are infected with malware. So, in response to these numbers, users are seeking ways to implement a more secure approach to web browsing.

Malware 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Cybersecurity Action Team Threat Horizons Report #5 Is Out!

Anton on Security

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our fifth Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blogs for #2 , #3 and #4 ). My favorite quotes from the report follow below: “ Identity and trust relationships in and between cloud environments will continue to get more complex, challenging visibility and enabling threat actors to have wider and deepe

article thumbnail

GUEST ESSAY: A new year, a familiar predicament — consumers face intensifying cybersecurity risks

The Last Watchdog

At the start of 2023, consumers remain out in the cold when it comes to online protection. Related: Leveraging employees as human sensors. Malicious online actors grow ever more sophisticated, making cybersecurity as big a concern for everyday consumers as it ever has been. These days, ordinary people are facing increasing —and more complex—threats than ever before.

Risk 203
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

LostPass: after the LastPass hack, here’s what you need to know

Graham Cluley

Do you use the LastPass password manager? Did you know they suffered a data breach, and that your passwords may be at risk? You do now. Here's what you need to know.

article thumbnail

Gaming: How much is too much for our children?

We Live Security

With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control. The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity.

143
143

LifeWorks

More Trending

article thumbnail

‘We Must Ban TikTok!’ — Senate, House, FCC Agree

Security Boulevard

TikTok’s days are numbered in the U.S.—if the GOP has its way. The post ‘We Must Ban TikTok!’ — Senate, House, FCC Agree appeared first on Security Boulevard.

article thumbnail

Data of over 200 million Deezer users stolen, leaks on hacking forum

Graham Cluley

Music-streaming service Deezer has owned up to a data breach, after hackers managed to steal the data of over 200 million of its users.

article thumbnail

LockBit apologizes for ransomware attack on hospital, offers decryptor

CSO Magazine

LockBit , a prominent ransomware-as-a-service (RaaS) operation, has apologized for an attack on the Toronto-based Hospital for Sick Children, also known as SickKids, and offered a free decryptor. SickKids, a major pediatric teaching hospital, announced on December 19 that it had called a Code Grey system failure, as it was responding to a cybersecurity incident that was affecting several network systems at the hospital.

article thumbnail

The Price Tag for Secure Systems is Way Too High

CyberSecurity Insiders

By Motti Elloul, VP Customer Success and Incident Response, Perception Point. Enterprise security teams are spending astonishing amounts of time and money remediating cybersecurity incidents. A successful email-based cyber-attack can take security staff an average of 86 hours to address, which can cost $6,452 per incident in time alone. Considering the current economic climate, and with the impact of phishing and other serious cyberthreats forecast to intensify, the price for effective cyber-pro

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Inside a scammers’ lair: Ukraine busts 40 in fake bank call-centre raid

Naked Security

When someone calls you up to warn you that your bank account is under attack - it's true, because THAT VERY PERSON is the one attacking you!

Banking 120
article thumbnail

The Guardian Ransomware Attack 2022 intensifies deeply

CyberSecurity Insiders

The ransomware attack that took place on British Daily Newspaper ‘The Guardian’ seems to have intensified deeply as the staff of the media group has been advised to work from home and have been handed over separate email ids for official communication. Guardian’s servers were hacked and a file encrypting malware was introduced into the daily computer network in the first week of December 2022.

article thumbnail

Chinese Students in the U.K. Are Victims of RedZei Scam Calls

Heimadal Security

RedZei (or RedThief) Chinese-speaking hackers are targeting U.K.-based Chinese international students, a wealthy victim group, with scam calls. The campaign is ongoing for more than a year and shows that threat actors have meticulously selected and researched their victims. Details About the Campaign To bypass security measures, like phone number-based blocking, RedZei group takes several […].

Scams 119
article thumbnail

Intel and Check Point Software extend partnership for ransomware protection

CyberSecurity Insiders

Intel, the world-renowned silicon chipmaker, has extended its partnership with Check Point Software technologies to boost its chipsets defense line against ransomware attacks. So, as a part of this collaboration the Harmony Endpoint solution from Check Point will be integrated into Intel vPro’s AI and ML driven threat detection tech allowing CPUs manufactured by the silicon wafer making giant analyze pre-detect data encryption commands in the digital attack flow.

Software 120
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Canadian Mining Company Targeted by Ransomware

Heimadal Security

A cyberattack launched on December 27, 2022, caused the Canadian Copper Mountain Mining Corporation (CMMC) to shut down its operations. The IT team of the company from British Columbia quickly implemented the predefined risk management systems and protocols to contain the incident. What Happened? The incident was made public on the 29th of December via […].

article thumbnail

WordPress Sites Under Attack from Newly Found Linux Trojan

Dark Reading

Researchers who discovered the backdoor Linux malware say it may have been around for more than three years — and it targets 30+ plug-in bugs.

Malware 118
article thumbnail

Adobe accepts AI generated artwork

CyberSecurity Insiders

Adobe, the business owner of PhotoShop, has made it official that it will start accepting AI generated artwork on its Stock Photo platform, provided users follow its revised policies. Therefore, users can submit their finished artwork generated by the technology of Artificial Intelligence, provided they abide by the copyright infringement clauses to the core.

article thumbnail

4 Ways to Build Cybersecurity Best Practices into Your Organizational Culture

Security Boulevard

When people think about business, they often think in terms of products and services offered. When employees think about business, they tend to think of it more in terms of organizational culture and what the organization offers in exchange for joining the team. . The post 4 Ways to Build Cybersecurity Best Practices into Your Organizational Culture appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet

Dark Reading

Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.

Internet 112
article thumbnail

Breaking RSA with a Quantum Computer

Security Boulevard

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on the orders of millions of qbits, to factor anything resembling the key sizes we use today.

111
111
article thumbnail

BrandPost: Overcoming the Barriers to Digital Transformation

CSO Magazine

Many businesses have made rapid advancements in their digital transformation strategy and adoption of cloud/hybrid cloud environments. Although every organization is unique and has its own starting point, successful transformation requires network and security team collaboration and compromise. A recent study by Omdia, “Assessing the Role of Packet Intelligence in Securing the Modern Enterprise Network Environment,” breaks down this journey based on a sample of more than 100 participants from bo

article thumbnail

Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware

The Hacker News

A new malware campaign has been observed using sensitive information stolen from a bank as a lure in phishing emails to drop a remote access trojan called BitRAT. The unknown adversary is believed to have hijacked the IT infrastructure of a Colombian cooperative bank, using the information to craft convincing decoy messages to lure victims into opening suspicious Excel attachments.

Banking 99
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Okta breached last month, no customers compromised

Malwarebytes

Some of Okta’s source code fell into the hands of an unauthorized party. The code was stolen from GitHub in the first part of December, according to a statement issued by the company. In the same statement the company reassured users that there was no impact to any customers. Okta. Okta is an access management company based in San Francisco. According to its own website, Okta serves over 15,000 organizations.

article thumbnail

Raspberry Robin Worm Evolves to Attack Financial and Insurance Sectors in Europe

The Hacker News

Financial and insurance sectors in Europe have been targeted by the Raspberry Robin worm, as the malware continues to evolve its post-exploitation capabilities while remaining under the radar. "What is unique about the malware is that it is heavily obfuscated and highly complex to statically disassemble," Security Joes said in a new report published Monday.

article thumbnail

Synology fixes multiple critical vulnerabilities in its routers

Security Affairs

Synology fixed several critical flaws in its routers, including flaws likely demonstrated at the Pwn2Own 2022 hacking contest. Taiwanese NAS maker Synology published two new critical advisories in December. The first advisory is related to the most severe vulnerability addressed by the company, which is a critical out-of-bounds write issue, tracked as CVE-2022-43931 (CVSS3 Base Score10).

VPN 98
article thumbnail

Cybersecurity Research Center Developer Series: The OWASP Top 10

Security Boulevard

In this new Cybersecurity Research Center series, we analyze the OWASP Top 10, which is a list of the most common vulnerabilities in web applications. The post Cybersecurity Research Center Developer Series: The OWASP Top 10 appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

BitRAT campaign relies on stolen sensitive bank data as a lure

Security Affairs

Experts warn of a new malware campaign using sensitive information stolen from a bank as a lure to spread the remote access trojan BitRAT. Qualys experts spotted a new malware campaign spreading a remote access trojan called BitRAT using sensitive information stolen from a bank as a lure in phishing messages. BitRAT is a relatively new threat advertised on underground marketplaces and forums since Feb 2021, it is offered for $20.

Banking 98
article thumbnail

LastPass updates security notice with information about a recent incident

Malwarebytes

The password management company LastPasss notified customers in late December about a recent security incident. The notice was posted as an update of the security incident previously reported in August of 2022, which also was updated and covered on November 30, 2022. According to LastPass, an unknown threat actor accessed a cloud-based storage environment leveraging information obtained from the August incident.

article thumbnail

Does Volvo Cars suffer a new data breach?

Security Affairs

A post published on a popular hacking forum claims Volvo Cars has suffered a new data breach, alleging stolen data available for sale. French cybersecurity Anis Haboubi yesterday first noticed that a threat actor was attempting to sell data allegedly stolen from Volvo Cars on a popular hacking forum. VOLVO CARS aurait été la victime du #ransomware endurance ; 200gb de données sensibles sont en vente ; pic.twitter.com/VFMdv7IBmr — Anis Haboubi |₿| (@HaboubiAnis) January 2, 2023.

article thumbnail

Best of 2022: Why is everyone getting hacked on Facebook?

Security Boulevard

If your social media networks are anything like mine, you’ve noticed an uptick in people getting “hacked” lately. Maybe you’ve gotten a weird Facebook message from someone you hadn’t spoken with in a while. Maybe your least tech-y friend is suddenly talking about crypto on Instagram. Or maybe you’ve seen post after post on your timeline of someone saying something like, “Sorry everyone, I got hacked!

Hacking 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!