Mon.May 08, 2023

article thumbnail

AI Hacking Village at DEF CON This Year

Schneier on Security

At DEF CON this year, Anthropic, Google, Hugging Face, Microsoft, NVIDIA, OpenAI and Stability AI will all open up their models for attack. The DEF CON event will rely on an evaluation platform developed by Scale AI, a California company that produces training for AI applications. Participants will be given laptops to use to attack the models. Any bugs discovered will be disclosed using industry-standard responsible disclosure practices.

Hacking 295
article thumbnail

GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent

The Last Watchdog

There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning the hiring of the cybersecurity talent their organizations require to safeguard against cyberattacks. According to Cybersecurity Ventures, by 2025 there will exist a gap of over 3.5 million unfilled cybersecurity positions. Moreover, of the current worldwide workforce, surveys conducted by PwC have shown that there is only a 38 percent ‘availability of key skills ’, considering the new an

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to secure your Mac’s data via Full Disk Access settings

Tech Republic Security

Learn one of the most effective ways to secure your Mac’s data within seconds. The post How to secure your Mac’s data via Full Disk Access settings appeared first on TechRepublic.

Software 179
article thumbnail

Knives Out for TikTok as Journo Reveals her Spy Story

Security Boulevard

Clock Ticking for U.S. Ban: FT’s Cristina Criddle claims ByteDance spied on her—because she wrote damaging stories about TikTok. The post Knives Out for TikTok as Journo Reveals her Spy Story appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Microsoft enforces number matching to fight MFA fatigue attacks

Bleeping Computer

Microsoft has started enforcing number matching in Microsoft Authenticator push notifications to fend off multi-factor authentication (MFA) fatigue attacks. [.

article thumbnail

Firing the Vulnerability Disclosure Fire-Drill Mentality

CyberSecurity Insiders

Omer Carmi, VP of Threat Intelligence, Cybersixgill When I was in elementary school, we had a routine fire drill. The alarm bells would ring, and we were expected to drop everything and run outside as quickly as possible. As a young child, this was frightening, even upsetting, and we initially took it very seriously. The drills continued through our school years, yet we responded in a much different way by the time we reached high school: The alarm bells would ring, we’d shrug, pick up our stuff

CISO 128

LifeWorks

More Trending

article thumbnail

Lessons From the Fortune 100 About Cloud-Native Application Security 

CyberSecurity Insiders

By Ratan Tipirneni, President and CEO, Tigera While cloud-native technologies are relatively new to many businesses, Global 2,000 companies have run containers and distributed applications at scale for over a decade. Although these household-name companies are high-profile targets for hackers, they have avoided devastating security incidents. This is evidence of their holistic security strategies and advanced tactics.

Software 127
article thumbnail

Intel investigating leak of Intel Boot Guard private keys after MSI breach

Bleeping Computer

Intel is investigating the leak of alleged private keys used by the Intel BootGuard security feature, potentially impacting its ability to block the installation of malicious UEFI firmware on MSI devices. [.

Firmware 127
article thumbnail

70% of US IT Leaders Told Not to Disclose Data Breaches

Security Boulevard

Not all cybersecurity breaches get reported. A new report from Bitdefender found that although IT leaders have an obligation to report attacks, over 42% of them have been told to keep quiet when a breach should have been reported. Shockingly, in the U.S., this number rises to 70.7%. IT leaders may have reasons to keep. The post 70% of US IT Leaders Told Not to Disclose Data Breaches appeared first on Security Boulevard.

article thumbnail

FBI seizes 13 more domains linked to DDoS-for-hire services

Bleeping Computer

The U.S. Justice Department announced today the seizure of 13 more domains linked to DDoS-for-hire platforms, also known as 'booter' or 'stressor' services. [.

DDOS 126
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New ransomware group CACTUS abuses remote management tools for persistence

CSO Magazine

A cybercriminal group has been compromising enterprise networks for the past two months and has been deploying a new ransomware program that researchers dubbed CACTUS. In the attacks seen so far the attackers gained access by exploiting known vulnerabilities in VPN appliances, moved laterally to other systems, and deployed legitimate remote monitoring and management (RMM) tools to achieve persistence on the network.

article thumbnail

One Password can cause huge damage to reputation of an Individual and Company

CyberSecurity Insiders

According to an expert from ESET, a single password can cause more damage than expected. Security specialist Jake Moore suggests that cyber criminals can easily steal data if they gain access to a password related to an email account. As a result, there is a high demand for email credentials on the dark web, with a set of just 1000 active email credentials selling for £75 or more if it belongs to an enterprise network.

Passwords 120
article thumbnail

Decentralized Identity: Gaining Security and Trust for Digital Identities

Security Boulevard

Our modern digital world has proven that the current way of managing identity in cyberspace needs to change. If your digital identity is compromised by your activity online, it’s a safe bet that it is already being controlled by conglomerates. With the push of a button or an automated algorithm, digital identities can be compromised. The post Decentralized Identity: Gaining Security and Trust for Digital Identities appeared first on Security Boulevard.

article thumbnail

Jobs that will be lost for sure with adoption of Artificial Intelligence Technology

CyberSecurity Insiders

Tesla CEO Elon Musk has predicted that computers and intelligent machines will eventually replace manual labor, resulting in humans losing their jobs to AI technology. While adopting automation and AI can boost productivity and economic growth, it will also result in job loss for millions who may need to switch occupations or upgrade their skills to make a living.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

BEWARE: Fake Applications are Disguised as Legitimate Ones

Quick Heal Antivirus

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis. The post BEWARE: Fake Applications are Disguised as Legitimate Ones appeared first on Quick Heal Blog.

article thumbnail

GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent

Security Boulevard

There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning the hiring of the cybersecurity talent their organizations require to safeguard against cyberattacks. According to Cybersecurity Ventures, by 2025 there will exist a … (more…) The post GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent appeared first on Security Boulevard.

article thumbnail

Google Launches Entry-Level Cybersecurity Certificate Program

SecureWorld News

Google recently announced the latest addition to its Career Certificates program: an entry-level cybersecurity certificate. The six-month course is designed to teach learners how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them. Google's cybersecurity experts will teach the course, which aims to prepare learners for entry-level jobs in cybersecurity with no prior experience required.

article thumbnail

MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web

The Hacker News

The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked the company's private code signing keys on their dark website. "Confirmed, Intel OEM private key leaked, causing an impact on the entire ecosystem," Alex Matrosov, founder and CEO of firmware security firm Binarly, said in a tweet over the weekend.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Managed XDR Investigation of Ducktail in Trend Micro Vision One™

Trend Micro

The Trend Micro Managed XDR team investigated several Ducktail-related web browser credential dumping incidents involving different customers.

Malware 107
article thumbnail

Review your on-prem ADCS infrastructure before attackers do it for you

CSO Magazine

Attackers love to find weak spots in our domains and networks. Too often, they can enter systems to lie in wait and launch attacks at a later time. A case in point is the infamous SolarWinds software attack , which infected up to nine US agencies and many organizations with backdoors into their infrastructure. Recent investigations show that the Department of Justice may have been aware of the potential for a breach months before it happened.

Software 106
article thumbnail

Microsoft: Iranian hacking groups join Papercut attack spree

Bleeping Computer

Microsoft says Iranian state-backed hackers have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers. [.

Hacking 106
article thumbnail

New Ransomware Strain 'CACTUS' Exploits VPN Flaws to Infiltrate Networks

The Hacker News

Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks.

VPN 103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cyberpress Launches Cybersecurity Press Release Distribution Platform

CyberSecurity Insiders

Dubai / May 1st 2023 / Cyberpress — Cybersecurity gets a new dedicated newswire. Cyberpress , a press release distribution platform for the cybersecurity industry, has opened its doors today. This newswire service provides an effective communications approach for cybersecurity companies, public relations agencies and marketing advisors, investment firms operating in the space and more.

article thumbnail

How To Delete Your Data From ChatGPT

WIRED Threat Level

OpenAI has new tools that give you more control over your information—although they may not go far enough.

article thumbnail

Preventing sophisticated phishing attacks aimed at employees

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As technology advances, phishing attempts are becoming more sophisticated. It can be challenging for employees to recognize an email is malicious when it looks normal, so it’s up to their company to properly train workers in prevention and detection.

article thumbnail

CERT-UA warns of an ongoing SmokeLoader campaign

Security Affairs

Ukraine’s CERT-UA warns of an ongoing phishing campaign aimed at distributing the SmokeLoader malware in the form of a polyglot file. CERT-UA warns of an ongoing phishing campaign that is distributing the SmokeLoader malware in the form of a polyglot file. Threat actors are using emails sent from compromised accounts with the subject “bill/payment” with an attachment in the form of a ZIP archive.

Malware 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cyber Threat Hunting Techniques & Methodologies

Heimadal Security

Even the most inexperienced computer user knows about the dangers that lurk on the Internet – one slip of the click can turn your machine into a (very) expensive paperweight. The only way to stay safe while doing some online surfing is to buy or try out a cybersecurity product: antivirus, antimalware, email security suits, […] The post Cyber Threat Hunting Techniques & Methodologies appeared first on Heimdal Security Blog.

article thumbnail

NextGen Healthcare suffered a data breach that impacted +1 Million individuals

Security Affairs

NextGen Healthcare suffered a data breach, the security incident exposed the personal information of approximately 1 million individuals. Healthcare solutions provider NextGen Healthcare suffered a data breach that exposed the personal information of informing approximately one million individuals. NextGen Healthcare, Inc. is an American software and services company that develops and sells electronic health record (EHR) software and practice management systems to the healthcare industry.

article thumbnail

Ransomware attack on MSI led to compromised Intel Boot Guard private keys

Malwarebytes

On April 7, 2023 MSI (Micro-Star International) released a statement confirming a cyberattack on part of its information systems. While the statement does not reveal a lot of tangible information, this snippet is important: “MSI urges users to obtain firmware/BIOS updates only from its official website, and not to use files from sources other than the official website.” As we mentioned in our May ransomware review , Taiwanese PC parts maker MSI fell victim to ransomware gang Money Me

article thumbnail

Money Message gang leaked private code signing keys from MSI data breach

Security Affairs

The ransomware gang behind the attack on Taiwanese PC maker MSI leaked the company’s private code signing keys on their darkweb leak site. In early April, the ransomware gang Money Message announced to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and internationally.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!