Fri.Jul 07, 2023

article thumbnail

The AI Dividend

Schneier on Security

For four decades, Alaskans have opened their mailboxes to find checks waiting for them, their cut of the black gold beneath their feet. This is Alaska’s Permanent Fund, funded by the state’s oil revenues and paid to every Alaskan each year. We’re now in a different sort of resource rush, with companies peddling bits instead of oil: generative AI.

article thumbnail

Weekly Update 355

Troy Hunt

Alrighty, "The Social Media" Without adding too much here as I think it's adequately covered in the video, since last week we've had another change at Twitter that has gotten some people cranky (rate limits) and another social media platform to jump onto (Threads). I do wonder how impactful the 1k tweet view limit per day is for most people (I have no idea how many I usually see, I just know I've never hit the limit yet), and as I say in the video, I find it increasingly h

Media 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Importance of Penetration Testing in Cloud Security

Tech Republic Security

Read about penetration testing in cloud security and its importance, details about how it's done and the most common threats to cloud security. The post The Importance of Penetration Testing in Cloud Security appeared first on TechRepublic.

article thumbnail

Critical TootRoot bug lets attackers hijack Mastodon servers

Bleeping Computer

Mastodon, the free and open-source decentralized social networking platform, has patched four vulnerabilities, including a critical one that allows hackers to create arbitrary files on instance-hosting servers using specially crafted media files. [.

Media 143
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft Edge cheat sheet

Tech Republic Security

Microsoft Edge is the default browser for Windows 10. This cheat sheet covers the basics of Microsoft Edge, including how to set up the browser and optimize and use key features. The post Microsoft Edge cheat sheet appeared first on TechRepublic.

article thumbnail

CISA warns govt agencies to patch actively exploited Android driver

Bleeping Computer

CISA ordered federal agencies today to patch a high-severity Arm Mali GPU kernel driver privilege escalation flaw added to its list of actively exploited vulnerabilities and addressed with this month's Android security updates. [.

134
134

More Trending

article thumbnail

How to Strengthen Cybersecurity in the Age of AI

Security Boulevard

To get ahead of the adversaries in this new AI age, cybersecurity research into new generative AI attacks and defenses must be further along. The post How to Strengthen Cybersecurity in the Age of AI appeared first on Security Boulevard.

article thumbnail

EDM Council Survey: Management of Cloud Data Deployment is Lacking

Tech Republic Security

The Council’s first benchmark found that 84% of companies have not implemented ethical access, use and outcome policies and procedures per their cloud agendas. The post EDM Council Survey: Management of Cloud Data Deployment is Lacking appeared first on TechRepublic.

143
143
article thumbnail

MOVEit Transfer customers warned to patch new critical flaw

Bleeping Computer

MOVEit Transfer, the software at the center of the recent massive spree of Clop ransomware breaches, has received an update that fixes a critical-severity SQL injection bug and two other less severe vulnerabilities. [.

article thumbnail

Contec SolarView: Critical Bug Unpatched After 14 MONTHS

Security Boulevard

PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems. The post Contec SolarView: Critical Bug Unpatched After 14 MONTHS appeared first on Security Boulevard.

VPN 104
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Top Data Breaches in 2023: Alarming Incidents Impacting Companies

Heimadal Security

The year 2023 has witnessed a surge in data breaches and cyberattacks, posing significant challenges for organizations striving to safeguard sensitive information. Recent high-profile attacks targeting various industries, including healthcare, finance, retail, government, manufacturing, and energy, highlight the evolving threat landscape. With cybersecurity incidents becoming increasingly sophisticated, organizations must recognize the need for robust security […] The post Top Data Breache

article thumbnail

MalCare Releases Plugin Update with Improved Authentication Systems

Security Boulevard

Recently, a vulnerability in the MalCare plugin was disclosed to our team by a security researcher. We responded to the security researcher, after conducting our due diligence. In the rare situation, where a site has a pre-existing, high severity SQL injection vulnerability, an attacker might be able to read the MalCare key. To address such. The post MalCare Releases Plugin Update with Improved Authentication Systems appeared first on MalCare.

article thumbnail

How To Tell If You’ve Been DDoSed: 5 Signs of a DDoS Attack

eSecurity Planet

Mention the acronym DDoS to a web admin and they’ll likely break out in a cold sweat. DDoS, or Distributed Denial of Service attacks, are some of the most malicious and difficult-to-stop network attacks that can be launched against a website or any other DDoS-susceptible service, such as a SaaS platform. These attacks occur when multiple compromised systems send a flood of requests to targeted servers to overwhelm and crash it.

DDOS 98
article thumbnail

Discover Sift’s latest fraud data, insights from Money20/20, and G2 awards

Security Boulevard

Stay up to date with the latest news from Sift, including key insights from its Q2 2023 Digital Trust & Safety Index. Read the blog to learn more. The post Discover Sift’s latest fraud data, insights from Money20/20, and G2 awards appeared first on Sift Blog. The post Discover Sift’s latest fraud data, insights from Money20/20, and G2 awards appeared first on Security Boulevard.

Risk 104
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Spyware Gamed 1.5M Users of Google Play Store

Dark Reading

Malware spoofed file management applications thanks to elevated permissions, enabling exfiltration of sensitive data with no user interaction, researchers find.

Spyware 103
article thumbnail

The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region

Security Boulevard

Summary Discover the intricate layers of a new sophisticated and persistent malware campaign targeting businesses in the LATAM region delivering the TOITOIN Trojan. Delve into the multi-stage attack methodology, from deceptive phishing emails to custom-built modules, as we dissect its techniques and shed light on its impact. Gain valuable insights into the evolving threat landscape and learn how organizations can fortify their defenses against this emerging Latin American cyber threat.

Malware 104
article thumbnail

Bangladesh government website leaked data of millions of citizens

Security Affairs

A researcher recently discovered that a Bangladesh government website leaks the personal data of citizens. The researcher Viktor Markopoulos discovered a Bangladeshi government website that was leaking the personal information of millions of Bangladesh citizens. According to TechCrunch, which first reported the news, the leaked data included full names, phone numbers, email addresses, and national ID numbers.

article thumbnail

Why SOC 2 is an Industry Standard

Security Boulevard

What is SOC 2? SOC 2 (Service Organization Control 2) provides a framework for assessing and reporting on the security, availability, processing integrity, confidentiality, and privacy of systems and data of service organizations. It was developed by the American Institute of Certified Public Accountants (AICPA) to address the need for consistent and comprehensive security and […] The post Why SOC 2 is an Industry Standard first appeared on TrustCloud.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

12 Types of Vulnerability Scans & When to Run Each

eSecurity Planet

Vulnerability scanning is critically important for identifying security flaws in hardware and software, but vulnerability scanning types are as varied as the IT environments they’re designed to protect. In this article, we’ll delve into various types of vulnerability scans, explore their benefits, outline the ideal scenarios for running each type, and list the best vulnerability scanning tool to use for each type of scan.

article thumbnail

Unmasking CL0P Ransomware: Understanding the Threat Shaking Up Global Security

Security Boulevard

Threat Overview – CL0P Ransomware First emerging in 2019, CL0P Ransomware, often simply referred to as “clop,” has since steadily established its infamy across the globe. Allegedly originating in Russia, CL0P poses a substantial threat to organizations by encrypting victims’ files, crippling security measures, and demanding a ransom for decryption. CL0P’s “double extortion” strategy heightens […] The post Unmasking CL0P Ransomware: Understanding the Threat Shaking Up Global Security appeared fir

article thumbnail

Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities

The Hacker News

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Among these, three vulnerabilities have been identified as actively exploited in targeted attacks. One of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips.

article thumbnail

Digital ‘Birth Certificates’ for Vehicular Cybersecurity

Security Boulevard

There's a growing likelihood for catastrophic cyberattacks on vehicles that could disable brakes, take over steering and even steal personal information. The post Digital ‘Birth Certificates’ for Vehicular Cybersecurity appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days

The Hacker News

Ransomware attacks are a major problem for organizations everywhere, and the severity of this problem continues to intensify. Recently, Microsoft's Incident Response team investigated the BlackByte 2.0 ransomware attacks and exposed these cyber strikes' terrifying velocity and damaging nature.

article thumbnail

What is the Difference Between FIPS 140-2 and FIPS 197 Certification

Security Boulevard

FIPS 140-2 vs. FIPS 197 Certification: Learn the Differences &… Continue reading What is the Difference Between FIPS 140-2 and FIPS 197 Certification The post What is the Difference Between FIPS 140-2 and FIPS 197 Certification appeared first on SSLWiki. The post What is the Difference Between FIPS 140-2 and FIPS 197 Certification appeared first on Security Boulevard.

104
104
article thumbnail

Meta's Rush to Topple Twitter Sets Up Looming Privacy Debate

Dark Reading

GDPR is halting Meta's new Threads app from entering EU markets, portending a broader struggle over the right ways to collect user data on social apps.

article thumbnail

Year in Review: GitGuardian’s Own Security Team

Security Boulevard

Join security engineer Kayssar on a captivating journey as he delves into the achievements and challenges encountered by GitGuardian's security team throughout the year. And distills invaluable insights on fostering a culture of security awareness and openness within a rapidly expanding scale-up. The post Year in Review: GitGuardian’s Own Security Team appeared first on Security Boulevard.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Global Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses

Dark Reading

Hack The Box launches Capture The Flag competition, including offensive and defensive challenges, to unite teams as cyberattacks increase in 2023 to unprecedented levels.

Hacking 90
article thumbnail

CommitStrip ‘Only The Penitent Coder Will Pass’

Security Boulevard

via the textual amusements of Thomas Gx, along with the Illustration talents of Etienne Issartia and superb translation skillset of Mark Nightingale - the creators of CommitStrip ! Permalink The post CommitStrip ‘Only The Penitent Coder Will Pass’ appeared first on Security Boulevard.

103
103
article thumbnail

Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic Routing

The Hacker News

Researchers have issued a warning about an emerging and advanced form of voice phishing (vishing) known as "Letscall." This technique is currently targeting individuals in South Korea. The criminals behind "Letscall" employ a multi-step attack to deceive victims into downloading malicious apps from a counterfeit Google Play Store website.

Malware 86
article thumbnail

BSides Knoxville 2023 – Travis Goodspeed – Writing a Mask ROM Tool

Security Boulevard

Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel. Permalink The post BSides Knoxville 2023 – Travis Goodspeed – Writing a Mask ROM Tool appeared first on Security Boulevard.

CISO 103
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.