Mon.Jan 23, 2023

article thumbnail

No-Fly List Exposed

Schneier on Security

I can’t remember the last time I thought about the US no-fly list: the list of people so dangerous they should never be allowed to fly on an airplane, yet so innocent that we can’t arrest them. Back when I thought about it a lot, I realized that the TSA’s practice of giving it to every airline meant that it was not well protected, and it certainly ended up in the hands of every major government that wanted it.

article thumbnail

Kaspersky releases 2023 predictions

Tech Republic Security

A new report from Kaspersky details what their digital forensics and incident response teams predict as the main 2023 threats to corporations and government agencies. Learn more about it. The post Kaspersky releases 2023 predictions appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vice Society Ransomware Group Targets Manufacturing Companies

Trend Micro

In this blog entry, we’d like to highlight our findings on Vice Society, which includes an end-to-end infection diagram that we were able to create using Trend Micro internal telemetry.

article thumbnail

Data Privacy Week 2023: Virtual events and webinars to attend

Tech Republic Security

The National Cybersecurity Alliance's second annual Data Privacy Week is January 22-28, 2023. Learn how you can participate in virtual events. The post Data Privacy Week 2023: Virtual events and webinars to attend appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Orgs Must Prepare for SEC Cybersecurity Requirements Aimed at Boards

Security Boulevard

Enterprises might want to spend the next few months checking and bolstering their boards’ cybersecurity chops—because by the end of 2023, the Security and Exchange Commission (SEC) is expected to finalize its proposal requiring them to attest to their boards’ cybersecurity acumen—as well as disclose their cybersecurity oversight efforts and information on attacks.

article thumbnail

Report: Cyberespionage threat actor exploits CVE-2022-42475 FortiOS vulnerability

Tech Republic Security

A possible Chinese cyberespionage actor has exploited a FortiOS vulnerability to successfully compromise companies. The post Report: Cyberespionage threat actor exploits CVE-2022-42475 FortiOS vulnerability appeared first on TechRepublic.

Malware 158

LifeWorks

More Trending

article thumbnail

US No-Fly List Leaked via Airline Dev Server by @_nyancrimew

Security Boulevard

An unsecured Jenkins server contained secret credentials for more than 40 public-cloud storage buckets. In today’s SB Blogwatch, we say hello to our old friend maia arson crimew. The post US No-Fly List Leaked via Airline Dev Server by @_nyancrimew appeared first on Security Boulevard.

Risk 137
article thumbnail

The metaverse brings a new breed of threats to challenge privacy and security gatekeepers

CSO Magazine

The metaverse is coming; businesses and government agencies are already building virtual worlds to support city services, meetings and conferences, community building, and commerce. They’re also rendering spatial apps around travel, car sales, manufacturing, and architecture in what Citi predicts will be a $13-trillion market with 5 billion users by 2030.

article thumbnail

Hybrid play: Leveling the playing field in online video gaming and beyond

We Live Security

Does VALORANT’s approach to cheating signal a turning point in how we deal with the continued hacks afflicting our hybrid world of work and play?

Hacking 129
article thumbnail

Arnold Clark data breach leads to identity theft

CyberSecurity Insiders

A few days ago, the servers of car dealer ‘Arnold Clark’ were breached by hackers and the information of 1000sof motorists was stolen that can lead to identity thefts and online frauds. The threat actors are adamant in their demand for charging cryptocurrency in millions and are not ready to entertain any negotiation of hackers. As the company failed to pay them the demanded ransom, the cyber crooks have leaked addresses, passports, and national insurance numbers and are threatening to leak more

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Hunting Insider Threats on the Dark Web

Dark Reading

Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.

126
126
article thumbnail

What your SOC will be facing in 2023

SecureList

As the role of cybersecurity in large businesses increases remarkably year over year, the importance of Security Operations Centers (SOCs) is becoming paramount. This year’s Kaspersky Security Bulletin ends with tailored predictions for SOCs – from external and internal points of view. The first part of this report is devoted to the most current threats any SOC is likely to face in 2023.

article thumbnail

Serious Security: How dEliBeRaTe tYpOs might imProVe DNS security

Naked Security

It's a really cool and super-simple trick. The question is, "Will it help?

DNS 115
article thumbnail

Kolide – Endpoint security for people, not paper clips

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support!

108
108
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access

Dark Reading

Devices running Android 12 and below are at risk of attackers downloading apps that direct users to a malicious domain.

Mobile 107
article thumbnail

Apple iOS 16.3 arrives with support for hardware security keys

Bleeping Computer

Apple released iOS 16.3 today with long-awaited support for hardware security keys to provide extra protection against phishing attacks and unauthorized access to your devices. [.

Phishing 106
article thumbnail

TSA No-Fly List Snafu Highlights Risk of Keeping Sensitive Data in Dev Environments

Dark Reading

A Swiss hacker poking around in an unprotected Jenkins development server belonging to CommuteAir accessed the names and birthdates of some 1.5 million people on a TSA no-fly list from 2019.

Risk 106
article thumbnail

App Spoofing Ad Fraud Affects 11 Million Devices

Heimadal Security

An “expansive” adware operation that spoofs over 1,700 apps from 120 publishers and affects around 11 million devices has been stopped by researchers. Dubbed VASTFLUX, the malvertising attack injected malicious JavaScript code into digital ad creatives and allowed threat actors to stack invisible ad videos behind one another to register ad revenue.

Adware 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

FanDuel Sportsbook Bettors Exposed in Mailchimp Breach

Dark Reading

Amid all the NFL playoff action, FanDuel has sent an email warning to gamblers that their data was exposed in its third-party breach, putting them at risk for phishing attacks.

Phishing 100
article thumbnail

Facebook Introduces New Features for End-to-End Encrypted Messenger App

The Hacker News

Meta Platforms on Monday announced that it has started to expand global testing of end-to-end encryption (E2EE) in Messenger chats by default. "Over the next few months, more people will continue to see some of their chats gradually being upgraded with an extra layer of protection provided by end-to-end encryption," Meta's Melissa Miranda said.

article thumbnail

Apple backported patches for CVE-2022-42856 zero-day on older iPhones, iPads

Security Affairs

Apple has backported the security updates for the zero-day vulnerability CVE-2022-42856 to older iPhones and iPads. On December 2022, Apple released security updates to address a new zero-day vulnerability, tracked as CVE-2022-42856 , that is actively exploited in attacks against iPhones. The IT giant released security bulletins for iOS/iPadOS 15.7.2 , Safari 16.2 , tvOS 16.2 , and macOS Ventura 13.1.

article thumbnail

Russia-Linked Attackers Target US Nuclear Research Facilities

Security Boulevard

It made the headlines in early January; Russia is targeting U.S. nuclear scientists and research facilities. While certainly not a news flash—given that Russia’s (and the USSR’s) history of targeting U.S. nuclear technologies dates back more than 75 years. But the tools used in the latest foray remind us of the need to pay more. The post Russia-Linked Attackers Target US Nuclear Research Facilities appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Two flaws in Samsung Galaxy Store can allow to install Apps and execute JS code

Security Affairs

Researchers found two flaws in Samsung Galaxy Store that could be exploited to install applications or achieve code execution on the devices. Researchers from cybersecurity firm NCC Group published technical details on two vulnerabilities, tracked as CVE-2023-21433 and CVE-2023-21434, in Samsung Galaxy Store that could be exploited to install applications or execute malicious JavaScript code.

Hacking 98
article thumbnail

NIST Announces Potential Updates to the Cybersecurity Framework

SecureWorld News

The U.S. National Institute of Standards and Technology (NIST) has announced plans to update its Cybersecurity Framework (CSF) to reflect changes in the evolving cybersecurity landscape. The CSF, which was first published in 2014 and last updated in 2018, is widely used by organizations of all shapes and sizes to identify, assess, and manage cybersecurity risks.

article thumbnail

Companies impacted by Mailchimp data breach warn their customers

Security Affairs

The recent Mailchimp data breach has impacted multiple organizations, some of them are already notifying their customers. The popular email marketing and newsletter platform Mailchimp recently disclosed a news data breach , the incident exposed the data of 133 customers. Threat actors targeted the company’s employees and contractors to gain access to an internal support and account admin tool.

article thumbnail

Cryptocurrencies: How have they influenced cybercrime?

Security Boulevard

Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use of cryptocurrencies for cybercrime. Why is that? The post Cryptocurrencies: How have they influenced cybercrime?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Massive Ad fraud scheme VASTFLUX targeted over 11 million devices

Security Affairs

Researchers dismantled a sophisticated ad fraud scheme, dubbed VASTFLUX, that targeted more than 11 million devices. HUMAN’s Satori Threat Intelligence and Research Team dismantled a sophisticated ad fraud operation dubbed VASTFLUX. The name VASTFLUX comes from the evasion technique “ fast flux ” and VAST, the Digital Video Ad Serving Template that was abused by threat actors in this fraudulent scheme.

article thumbnail

The Future of Digital Identities

GlobalSign

Digital identity is a hot topic right now, with the recent changes to Twitters blue tick verification. Enter the discussion on what the future of digital identity will look like!

98
article thumbnail

Why do Hackers Steal? 5 Motives Behind Data Breaches | Eureka Security

Security Boulevard

From financial gain to hacktivism, we examine the top five motives for data breaches and outline ways companies can protect data against them. | Eureka Security The post Why do Hackers Steal? 5 Motives Behind Data Breaches | Eureka Security appeared first on Security Boulevard.

article thumbnail

Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud

The Hacker News

Two security flaws have been disclosed in Samsung's Galaxy Store app for Android that could be exploited by a local attacker to stealthily install arbitrary apps or direct prospective victims to fraudulent landing pages on the web. The issues, tracked as CVE-2023-21433 and CVE-2023-21434, were discovered by NCC Group and notified to the South Korean chaebol in November and December 2022.

98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!