Fri.Jul 07, 2023

article thumbnail

The AI Dividend

Schneier on Security

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent Fund, funded by the state’s oil revenues and paid to every Alaskan each year. We’re now in a different sort of resource rush, with companies peddling bits instead of oil: generative AI.

article thumbnail

Weekly Update 355

Troy Hunt

Alrighty, "The Social Media" Without adding too much here as I think it's adequately covered in the video, since last week we've had another change at Twitter that has gotten some people cranky (rate limits) and another social media platform to jump onto (Threads). I do wonder how impactful the 1k tweet view limit per day is for most people (I have no idea how many I usually see, I just know I've never hit the limit yet), and as I say in the video, I find it increasingly h

Media 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Importance of Penetration Testing in Cloud Security

Tech Republic Security

Read about penetration testing in cloud security and its importance, details about how it's done and the most common threats to cloud security. The post The Importance of Penetration Testing in Cloud Security appeared first on TechRepublic.

article thumbnail

News Alert: Silent Signal discovers a critical vulnerability in IBM i System – CVE-2023-30990

The Last Watchdog

Budapest, Hungary, July 07, 2023 — Silent Signal, a leading technology provider of state-of-the-art ethical hacking services and solutions, discovered and reported a vulnerability to IBM, that has been confirmed and identified under CVE-2023-30990. The Remote Code Execution vulnerability permits unauthorized attackers to access the server, enabling perpetrators to infiltrate sensitive corporate assets and block ongoing business-critical services including the central server, database serve

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Microsoft Edge cheat sheet

Tech Republic Security

Microsoft Edge is the default browser for Windows 10. This cheat sheet covers the basics of Microsoft Edge, including how to set up the browser and optimize and use key features. The post Microsoft Edge cheat sheet appeared first on TechRepublic.

article thumbnail

Critical TootRoot bug lets attackers hijack Mastodon servers

Bleeping Computer

Mastodon, the free and open-source decentralized social networking platform, has patched four vulnerabilities, including a critical one that allows hackers to create arbitrary files on instance-hosting servers using specially crafted media files. [.

Media 138

LifeWorks

More Trending

article thumbnail

How to Strengthen Cybersecurity in the Age of AI

Security Boulevard

To get ahead of the adversaries in this new AI age, cybersecurity research into new generative AI attacks and defenses must be further along. The post How to Strengthen Cybersecurity in the Age of AI appeared first on Security Boulevard.

article thumbnail

EDM Council Survey: Management of Cloud Data Deployment is Lacking

Tech Republic Security

The Council’s first benchmark found that 84% of companies have not implemented ethical access, use and outcome policies and procedures per their cloud agendas. The post EDM Council Survey: Management of Cloud Data Deployment is Lacking appeared first on TechRepublic.

179
179
article thumbnail

CISA warns govt agencies to patch actively exploited Android driver

Bleeping Computer

CISA ordered federal agencies today to patch a high-severity Arm Mali GPU kernel driver privilege escalation flaw added to its list of actively exploited vulnerabilities and addressed with this month's Android security updates. [.

125
125
article thumbnail

Can Generative AI Be Trusted to Fix Your Code?

Dark Reading

Not yet — but it can help make incremental progress in reducing vulnerability backlogs.

115
115
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

MOVEit Transfer customers warned to patch new critical flaw

Bleeping Computer

MOVEit Transfer, the software at the center of the recent massive spree of Clop ransomware breaches, has received an update that fixes a critical-severity SQL injection bug and two other less severe vulnerabilities. [.

article thumbnail

Top Data Breaches in 2023: Alarming Incidents Impacting Companies

Heimadal Security

The year 2023 has witnessed a surge in data breaches and cyberattacks, posing significant challenges for organizations striving to safeguard sensitive information. Recent high-profile attacks targeting various industries, including healthcare, finance, retail, government, manufacturing, and energy, highlight the evolving threat landscape. With cybersecurity incidents becoming increasingly sophisticated, organizations must recognize the need for robust security […] The post Top Data Breache

article thumbnail

Contec SolarView: Critical Bug Unpatched After 14 MONTHS

Security Boulevard

PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems. The post Contec SolarView: Critical Bug Unpatched After 14 MONTHS appeared first on Security Boulevard.

VPN 105
article thumbnail

StackRot: A New Linux Kernel Flaw Allows Privilege Escalation

Heimadal Security

A new vulnerability has been found by security researchers. Dubbed StackRot, the Linux Kernel flaw is impacting versions 6.1 through 6.4. The flaw is tracked as CVE-2023-3269 and is a privilege escalation issue. An unprivileged local user can trigger the flaw to compromise the kernel and escalate privileges. As reported by BleepingComputer, responsible for discovering […] The post StackRot: A New Linux Kernel Flaw Allows Privilege Escalation appeared first on Heimdal Security Blog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

MalCare Releases Plugin Update with Improved Authentication Systems

Security Boulevard

Recently, a vulnerability in the MalCare plugin was disclosed to our team by a security researcher. We responded to the security researcher, after conducting our due diligence. In the rare situation, where a site has a pre-existing, high severity SQL injection vulnerability, an attacker might be able to read the MalCare key. To address such. The post MalCare Releases Plugin Update with Improved Authentication Systems appeared first on MalCare.

article thumbnail

Spyware Gamed 1.5M Users of Google Play Store

Dark Reading

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find.

Spyware 103
article thumbnail

Discover Sift’s latest fraud data, insights from Money20/20, and G2 awards

Security Boulevard

Stay up to date with the latest news from Sift, including key insights from its Q2 2023 Digital Trust & Safety Index. Read the blog to learn more. The post Discover Sift’s latest fraud data, insights from Money20/20, and G2 awards appeared first on Sift Blog. The post Discover Sift’s latest fraud data, insights from Money20/20, and G2 awards appeared first on Security Boulevard.

Risk 105
article thumbnail

Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic Routing

The Hacker News

Researchers have issued a warning about an emerging and advanced form of voice phishing (vishing) known as "Letscall." This technique is currently targeting individuals in South Korea. The criminals behind "Letscall" employ a multi-step attack to deceive victims into downloading malicious apps from a counterfeit Google Play Store website.

Malware 102
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

Security Boulevard

Summary Discover the intricate layers of a new sophisticated and persistent malware campaign targeting businesses in the LATAM region delivering the TOITOIN Trojan. Delve into the multi-stage attack methodology, from deceptive phishing emails to custom-built modules, as we dissect its techniques and shed light on its impact. Gain valuable insights into the evolving threat landscape and learn how organizations can fortify their defenses against this emerging Latin American cyber threat.

Malware 105
article thumbnail

Mastodon Social Network Patches Critical Flaws Allowing Server Takeover

The Hacker News

Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions of users to potential attacks. Mastodon is known for its federated model, consisting of thousands of separate servers called "instances," and it has over 14 million users across more than 20,000 instances.

101
101
article thumbnail

Why SOC 2 is an Industry Standard

Security Boulevard

What is SOC 2? SOC 2 (Service Organization Control 2) provides a framework for assessing and reporting on the security, availability, processing integrity, confidentiality, and privacy of systems and data of service organizations. It was developed by the American Institute of Certified Public Accountants (AICPA) to address the need for consistent and comprehensive security and […] The post Why SOC 2 is an Industry Standard first appeared on TrustCloud.

article thumbnail

Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities

The Hacker News

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three vulnerabilities have been identified as actively exploited in targeted attacks. One of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Unmasking CL0P Ransomware: Understanding the Threat Shaking Up Global Security

Security Boulevard

Threat Overview – CL0P Ransomware First emerging in 2019, CL0P Ransomware, often simply referred to as “clop,” has since steadily established its infamy across the globe. Allegedly originating in Russia, CL0P poses a substantial threat to organizations by encrypting victims’ files, crippling security measures, and demanding a ransom for decryption. CL0P’s “double extortion” strategy heightens […] The post Unmasking CL0P Ransomware: Understanding the Threat Shaking Up Global Security appeared fir

article thumbnail

BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days

The Hacker News

Ransomware attacks are a major problem for organizations everywhere, and the severity of this problem continues to intensify. Recently, Microsoft's Incident Response team investigated the BlackByte 2.0 ransomware attacks and exposed these cyber strikes' terrifying velocity and damaging nature.

article thumbnail

Digital ‘Birth Certificates’ for Vehicular Cybersecurity

Security Boulevard

There's a growing likelihood for catastrophic cyberattacks on vehicles that could disable brakes, take over steering and even steal personal information. The post Digital ‘Birth Certificates’ for Vehicular Cybersecurity appeared first on Security Boulevard.

article thumbnail

Another Critical Unauthenticated SQLi Flaw Discovered in MOVEit Transfer Software

The Hacker News

Progress Software has announced the discovery and patching of a critical SQL injection vulnerability in MOVEit Transfer, popular software used for secure file transfer. In addition, Progress Software has patched two other high-severity vulnerabilities.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What is the Difference Between FIPS 140-2 and FIPS 197 Certification

Security Boulevard

FIPS 140-2 vs. FIPS 197 Certification: Learn the Differences &… Continue reading What is the Difference Between FIPS 140-2 and FIPS 197 Certification The post What is the Difference Between FIPS 140-2 and FIPS 197 Certification appeared first on SSLWiki. The post What is the Difference Between FIPS 140-2 and FIPS 197 Certification appeared first on Security Boulevard.

105
105
article thumbnail

Bangladesh government website leaked data of millions of citizens

Security Affairs

A researcher recently discovered that a Bangladesh government website leaks the personal data of citizens. The researcher Viktor Markopoulos discovered a Bangladeshi government website that was leaking the personal information of millions of Bangladesh citizens. According to TechCrunch, which first reported the news, the leaked data included full names, phone numbers, email addresses, and national ID numbers.

article thumbnail

Year in Review: GitGuardian’s Own Security Team

Security Boulevard

Join security engineer Kayssar on a captivating journey as he delves into the achievements and challenges encountered by GitGuardian's security team throughout the year. And distills invaluable insights on fostering a culture of security awareness and openness within a rapidly expanding scale-up. The post Year in Review: GitGuardian’s Own Security Team appeared first on Security Boulevard.

article thumbnail

Progress warns customers of a new critical flaw in MOVEit Transfer software

Security Affairs

Progress released security patches for a new critical SQL injection vulnerability affecting its MOVEit Transfer software. Progress is informing customers of a new critical SQL injection vulnerability, tracked as CVE-2023-36934, in its MOVEit Transfer software. MOVEit Transfer software recently made the headlines due to the massive Clop ransomware hacking campaign exploiting a vulnerability in the product. “a SQL injection vulnerability has been identified in the MOVEit Transfer web applica

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!