Wed.Jul 05, 2023

article thumbnail

Class-Action Lawsuit for Scraping Data without Permission

Schneier on Security

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either registering as a data broker or obtaining consent. On the one hand, I want this to be a protected fair use of public data. On the other hand, I want us all to be compensated for our uniquely human ability to generate language.

Internet 231
article thumbnail

Is Quantum Computing Right for Your Business?

Tech Republic Security

Learn about the benefits and use cases of quantum computing. Also, get details about quantum cryptography from an expert. The post Is Quantum Computing Right for Your Business? appeared first on TechRepublic.

Software 173
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New tool exploits Microsoft Teams bug to send malware to users

Bleeping Computer

A member of U.S. Navy's red team has published a tool called TeamsPhisher that leverages an unresolved security issue in Microsoft Teams to bypass restrictions for incoming files from users outside of a targeted organization, the so-called external tenants. [.

Malware 143
article thumbnail

Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache

Tech Republic Security

Thales cloud security study shows that 79% of organizations have more than one cloud provider and 75% of companies said they store at least 40% of their sensitive data in the cloud. The post Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache appeared first on TechRepublic.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft Teams Exploit Tool Auto-Delivers Malware

Dark Reading

The "TeamsPhisher" cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.

Malware 145
article thumbnail

Japan’s largest port stops operations after ransomware attack

Bleeping Computer

The Port of Nagoya, the largest and busiest port in Japan, has been targeted in a ransomware attack that currently impacts the operation of container terminals. [.

More Trending

article thumbnail

Microsoft Can Fix Ransomware Tomorrow

Dark Reading

You can't encrypt a file you can't open — Microsoft could dramatically impact ransomware by slowing it down.

article thumbnail

How to Secure Your Container Registries With GitGuardian’s Honeytoken

Security Boulevard

Discover how to enhance the security of your container registries using honeytokens. Learn the steps to secure Docker Registry, GitHub Container Registry, and GitLab Container Registry with honeytokens. Strengthen your DevOps pipeline and protect your valuable assets. The post How to Secure Your Container Registries With GitGuardian’s Honeytoken appeared first on Security Boulevard.

104
104
article thumbnail

Malicious ad for USPS fishes for banking credentials

Malwarebytes

We often think of malvertising as being malicious ads that push malware or scams, and quite rightly so these are probably the most common payloads. However, malvertising is also a great vehicle for phishing attacks which we usually see more often via spam emails. Threat actors continue to abuse and impersonate brands, posing as verified advertisers whose only purpose is to smuggle rogue ads via popular search engines.

Banking 98
article thumbnail

Data Breaches in June 2023 – Infographic

Security Boulevard

A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, or human error. Data breaches can have serious […] The post Data Breaches in June 2023 – Infographic appeared first on WeSecureApp :: Simplifying Enterprise Security.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

What Is a Pentest Framework? Top 7 Frameworks Explained

eSecurity Planet

A pentest framework, or penetration testing framework, is a standardized set of guidelines and suggested tools for structuring and conducting effective pentests across different networks and security environments. While it’s certainly possible to construct your own pentest framework that meets the specific security and compliance requirements of your organization, a number of existing methodologies and frameworks can be built upon to make the job easier for you.

article thumbnail

Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve

Security Boulevard

The post Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve appeared first on Anitian. The post Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve appeared first on Security Boulevard.

Risk 100
article thumbnail

Update Android now! Google patches three actively exploited zero-days

Malwarebytes

In July’s update for the Android operating system (OS), Google has patched 43 vulnerabilities, three of which are actively exploited zero-day vulnerabilities. The security bulletin notes that there are indications that these three vulnerabilities may be under limited, targeted exploitation. If your Android phone is at patch level 2023-07-05 or later then the issues discussed below have been fixed.

article thumbnail

Challenges of interoperability in fuzz testing

Security Boulevard

Understanding how to overcome the challenges of interoperability in fuzz testing helps ensure efficient and comprehensive testing results. The post Challenges of interoperability in fuzz testing appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Node.js Users Beware: Manifest Confusion Attack Opens Door to Malware

The Hacker News

The npm registry for the Node.js JavaScript runtime environment is susceptible to what's called a manifest confusion attack that could potentially allow threat actors to conceal malware in project dependencies or perform arbitrary script execution during installation.

Malware 95
article thumbnail

Navigating Kubernetes and Cloud-Native Security

Security Boulevard

The era of cloud-native applications has arrived, and new security challenges have emerged for those developing cloud-native applications. Many modern business applications live in cloud native computing environments today because the cloud offers scalability, speed, and flexibility that are difficult or impossible to deliver in purely on-premises data centers.

article thumbnail

Firefox 115 is out, says farewell to older Windows and Mac users

Naked Security

No zero-days this month, so you’re patching to stay ahead, not merely to catch up!

135
135
article thumbnail

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #249 — How to Become a Speaker at Conferences

Security Boulevard

via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnara v at Comic Agilé ! Permalink The post Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #249 — How to Become a Speaker at Conferences appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Email crypto phishing scams: stealing from hot and cold crypto wallets

SecureList

The higher the global popularity of cryptocurrencies and the more new ways of storing them, the wider the arsenal of tools used by malicious actors who are after digital money. Scammers tailor the complexity of technology they use and the thoroughness of their efforts to imitate legitimate websites to how well the target is protected and how large the amount is that they can steal if successful.

Scams 94
article thumbnail

BSidesSF 2023 – Alex Toombs – WebAuthn, Yubikeys, And You: What We Wish We Knew Before Rolling Out WebAuthn For Internal Use

Security Boulevard

Our thanks to BSidesSF for publishing their presenter’s superlative BSidesSF 2023 content on the organizations’ YouTube channel. Permalink The post BSidesSF 2023 – Alex Toombs – WebAuthn, Yubikeys, And You: What We Wish We Knew Before Rolling Out WebAuthn For Internal Use appeared first on Security Boulevard.

article thumbnail

US Spies Are Buying Americans' Private Data. Congress Has a Chance to Stop It

WIRED Threat Level

The National Defense Authorization Act may include new language forbidding government entities from buying Americans' search histories, location data, and more.

article thumbnail

Adventures in Software Audits, Part Three: The Paradigm Battle

Security Boulevard

In the third of this three-part series, we discuss how the 'sales transaction paradigm' can impact a software audit. The post Adventures in Software Audits, Part Three: The Paradigm Battle appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Ransomware accounts for 54% of cyber threats in the health sector

Security Affairs

The European Union Agency for Cybersecurity (ENISA) releases its first cyber threat landscape report for the health sector. The European Union Agency for Cybersecurity (ENISA) releases today its first cyber threat landscape report for the health sector. The report identifies prime threats, threat actors, and trends and covers a period of over 2 years.

article thumbnail

How Audits + Testing = Long-Term Savings

Security Boulevard

Compliance audits and penetration testing play an important role in assessing, correcting and strengthening an organization’s security configuration. The post How Audits + Testing = Long-Term Savings appeared first on Security Boulevard.

article thumbnail

Startup Spotlight: Gomboc.ai Balances Cloud Infrastructure Security

Dark Reading

The startup, one of four finalists in Black Hat USA's 2023 startup competition, uses deterministic AI to optimize cloud security.

105
105
article thumbnail

Class-Action Lawsuit for Scraping Data without Permission

Security Boulevard

I have mixed feelings about this class-action lawsuit against OpenAI and Microsoft, claiming that it “scraped 300 billion words from the internet” without either registering as a data broker or obtaining consent. On the one hand, I want this to be a protected fair use of public data. On the other hand, I want us all to be compensated for our uniquely human ability to generate language.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

CISA Warning! 8 Actively Exploited Flaws in Samsung and D-Link Devices

Heimadal Security

The US Cybersecurity and Infrastructure Security Agency (CISA) added 6 flaws affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog. On the same day, CISA also added 2 other vulnerabilities impacting D-Link devices. Although security specialists released patches for all 8 CVEs back in 2021, researchers currently found evidence of active exploitation.

article thumbnail

RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom Sectors

The Hacker News

A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild targeting energy utilities, oil, gas, telecom, and machinery sectors in Brazil and the Philippines through their LinkedIn pages.

article thumbnail

RedEnergy Stealer-as-a-Ransomware employed in attacks in the wild

Security Affairs

RedEnergy is a sophisticated stealer-as-a-ransomware that was employed in attacks targeting energy utilities, oil, gas, telecom, and machinery sectors. Zscaler ThreatLabz researchers discovered a new Stealer-as-a-Ransomware named RedEnergy used in attacks against energy utilities, oil, gas, telecom, and machinery sectors. The malware allows operators to steal information from various browsers, it also supports ransomware capabilities.

article thumbnail

3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems

Dark Reading

Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.

101
101
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.