Wed.Jul 05, 2023

article thumbnail

Class-Action Lawsuit for Scraping Data without Permission

Schneier on Security

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either registering as a data broker or obtaining consent. On the one hand, I want this to be a protected fair use of public data. On the other hand, I want us all to be compensated for our uniquely human ability to generate language.

Internet 286
article thumbnail

Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache

Tech Republic Security

Thales cloud security study shows that 79% of organizations have more than one cloud provider and 75% of companies said they store at least 40% of their sensitive data in the cloud. The post Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Teams Exploit Tool Auto-Delivers Malware

Dark Reading

The "TeamsPhisher" cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.

Malware 145
article thumbnail

Is Quantum Computing Right for Your Business?

Tech Republic Security

Learn about the benefits and use cases of quantum computing. Also, get details about quantum cryptography from an expert. The post Is Quantum Computing Right for Your Business? appeared first on TechRepublic.

Software 200
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

New tool exploits Microsoft Teams bug to send malware to users

Bleeping Computer

A member of U.S. Navy's red team has published a tool called TeamsPhisher that leverages an unresolved security issue in Microsoft Teams to bypass restrictions for incoming files from users outside of a targeted organization, the so-called external tenants. [.

Malware 137
article thumbnail

Firefox 115 is out, says farewell to older Windows and Mac users

Naked Security

No zero-days this month, so you’re patching to stay ahead, not merely to catch up!

135
135

LifeWorks

More Trending

article thumbnail

Email crypto phishing scams: stealing from hot and cold crypto wallets

SecureList

The higher the global popularity of cryptocurrencies and the more new ways of storing them, the wider the arsenal of tools used by malicious actors who are after digital money. Scammers tailor the complexity of technology they use and the thoroughness of their efforts to imitate legitimate websites to how well the target is protected and how large the amount is that they can steal if successful.

Scams 129
article thumbnail

Microsoft Can Fix Ransomware Tomorrow

Dark Reading

You can't encrypt a file you can't open — Microsoft could dramatically impact ransomware by slowing it down.

article thumbnail

CISA Warning! 8 Actively Exploited Flaws in Samsung and D-Link Devices

Heimadal Security

The US Cybersecurity and Infrastructure Security Agency (CISA) added 6 flaws affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog. On the same day, CISA also added 2 other vulnerabilities impacting D-Link devices. Although security specialists released patches for all 8 CVEs back in 2021, researchers currently found evidence of active exploitation.

article thumbnail

AppSec and Software Supply Chain Security: How Do They Go Together?

Security Boulevard

AppSec and Software Supply Chain Security are two terms more frequently used as part of DevOps, as well as when considering how to develop a security strategy. Software supply chain attacks are on the rise and organizations must brace for the strong possibility that their software supply chain will be a target–so much so that Gartner. AppSec and Software Supply Chain Security: How Do They Go Together?

Software 108
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

What Is Passwordless Authentication?

Heimadal Security

In today’s interconnected world, where cyber threats loom large, the traditional password-based authentication method has shown its limitations and ceased to provide adequate security. Passwords pose serious challenges as they are difficult to remember, often reused across different apps, and are prone to be easily misplaced, putting sensitive information at risk.

article thumbnail

How to Secure Your Container Registries With GitGuardian’s Honeytoken

Security Boulevard

Discover how to enhance the security of your container registries using honeytokens. Learn the steps to secure Docker Registry, GitHub Container Registry, and GitLab Container Registry with honeytokens. Strengthen your DevOps pipeline and protect your valuable assets. The post How to Secure Your Container Registries With GitGuardian’s Honeytoken appeared first on Security Boulevard.

105
105
article thumbnail

Startup Spotlight: Gomboc.ai Balances Cloud Infrastructure Security

Dark Reading

The startup, one of four finalists in Black Hat USA's 2023 startup competition, uses deterministic AI to optimize cloud security.

105
105
article thumbnail

Four Must-haves to Strengthen Your Endpoint Security

Trend Micro

To combat complexity and achieve optimal security outcomes, there are four key factors an organization should consider when evaluating their endpoint security.

Risk 104
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Data Breaches in June 2023 – Infographic

Security Boulevard

A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, or human error. Data breaches can have serious […] The post Data Breaches in June 2023 – Infographic appeared first on WeSecureApp :: Simplifying Enterprise Security.

article thumbnail

3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems

Dark Reading

Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.

101
101
article thumbnail

Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve

Security Boulevard

The post Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve appeared first on Anitian. The post Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve appeared first on Security Boulevard.

Risk 101
article thumbnail

EV Charger Hacking Poses a ‘Catastrophic’ Risk

WIRED Threat Level

Vulnerabilities in electric vehicle charging stations and a lack of broad standards threaten drivers—and the power grid.

Hacking 101
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom Sectors

The Hacker News

A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines through their LinkedIn pages.

article thumbnail

Mitigating Risk With Threat Intelligence

Dark Reading

Dark Reading's latest publication looks at a missing, but necessary, ingredient to effective third-party risk management.

Risk 99
article thumbnail

Node.js Users Beware: Manifest Confusion Attack Opens Door to Malware

The Hacker News

The npm registry for the Node.js JavaScript runtime environment is susceptible to what's called a manifest confusion attack that could potentially allow threat actors to conceal malware in project dependencies or perform arbitrary script execution during installation.

Malware 99
article thumbnail

US Spies Are Buying Americans' Private Data. Congress Has a Chance to Stop It

WIRED Threat Level

The National Defense Authorization Act may include new language forbidding government entities from buying Americans' search histories, location data, and more.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Instagram's Twitter Alternative 'Threads' Launch Halted in Europe Over Privacy Concerns

The Hacker News

Instagram Threads, the upcoming Twitter competitor from Meta, will not be launched in the European Union due to privacy concerns, according to Ireland's Data Protection Commission (DPC). The development was reported by the Irish Independent, which said the watchdog has been in contact with the social media giant about the new product and confirmed the release won't extend to the E.U.

Media 98
article thumbnail

Malicious ad for USPS fishes for banking credentials

Malwarebytes

We often think of malvertising as being malicious ads that push malware or scams, and quite rightly so these are probably the most common payloads. However, malvertising is also a great vehicle for phishing attacks which we usually see more often via spam emails. Threat actors continue to abuse and impersonate brands, posing as verified advertisers whose only purpose is to smuggle rogue ads via popular search engines.

Banking 98
article thumbnail

Ransomware accounts for 54% of cyber threats in the health sector

Security Affairs

The European Union Agency for Cybersecurity (ENISA) releases its first cyber threat landscape report for the health sector. The European Union Agency for Cybersecurity (ENISA) releases today its first cyber threat landscape report for the health sector. The report identifies prime threats, threat actors, and trends and covers a period of over 2 years.

article thumbnail

Microsoft Teams Exploitable by New Phishing Tool

SecureWorld News

A tool labeled TeamsPhisher was published recently on GitHub by a member of the U.S. Navy red team in an attempt to highlight and resolve a security issue within the business communication platform Microsoft Teams. The tool works to bypass and exploit Microsoft Teams to allow unsolicited external files to be sent, allowing hackers to send messages to anyone despite not being a part of the recipient's organization.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Update Android now! Google patches three actively exploited zero-days

Malwarebytes

In July’s update for the Android operating system (OS), Google has patched 43 vulnerabilities, three of which are actively exploited zero-day vulnerabilities. The security bulletin notes that there are indications that these three vulnerabilities may be under limited, targeted exploitation. If your Android phone is at patch level 2023-07-05 or later then the issues discussed below have been fixed.

article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

RedEnergy is a sophisticated stealer-as-a-ransomware that was employed in attacks targeting energy utilities, oil, gas, telecom, and machinery sectors. Zscaler ThreatLabz researchers discovered a new Stealer-as-a-Ransomware named RedEnergy used in attacks against energy utilities, oil, gas, telecom, and machinery sectors. The malware allows operators to steal information from various browsers, it also supports ransomware capabilities.

article thumbnail

What Is a Pentest Framework? Top 7 Frameworks Explained

eSecurity Planet

A pentest framework, or penetration testing framework, is a standardized set of guidelines and suggested tools for structuring and conducting effective pentests across different networks and security environments. While it’s certainly possible to construct your own pentest framework that meets the specific security and compliance requirements of your organization, a number of existing methodologies and frameworks can be built upon to make the job easier for you.

article thumbnail

CVE-2022-29303 flaw in SolarView product can be exploited in attacks against the energy sector

Security Affairs

A vulnerability in SolarView product can be exploited in attacks targeting organizations in the energy sector. Researchers from the cybersecurity firm VulnCheck reported that the vulnerability CVE-2022-29303 in the solar power monitoring Contec SolarView product can be exploited in attacks targeting organizations in the energy sector. CVE-2022-29303 is an unauthenticated and remote command injection vulnerability impacting the Contec SolarView Series.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!