Thu.Oct 27, 2022

article thumbnail

Big Changes are Afoot: Expanding and Enhancing the Have I Been Pwned API

Troy Hunt

Just over 3 years ago now, I sat down at a makeshift desk (ok, so it was a kitchen table) in an Airbnb in Olso and built the authenticated API for Have I Been Pwned (HIBP). As I explained at the time, the primary goal was to combat abuse of the service and by adding the need to supply a credit card, my theory was that the bad guys would be very reluctant to, well, be bad guys.

article thumbnail

What Should CISOs Prioritize In A Volatile Landscape?: A Webinar With Top CyberSecurity Columnist Joseph Steinberg

Joseph Steinberg

Have you been prioritizing Detection and Response over Protection when it comes to your cybersecurity strategy? All three, of course, are key pillars of the NIST cybersecurity framework – so, why are you prioritizing two of them over the third? In fact, in most cases, “Protect” should be the top priority. Join us for an insightful discussion with Joseph Steinberg and Venky Raju, as they discuss all manner of things related to proactive cybersecurity and Zero Trust.

CISO 245
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 cyber threat report details growing trends

Tech Republic Security

SonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more. The post 2022 cyber threat report details growing trends appeared first on TechRepublic.

article thumbnail

Secure Your Hybrid Workforce Using These SOC Best Practices

Cisco Security

Hybrid Workforce is here to stay. Just a few years ago when the topic of supporting offsite workers arose, some of the key conversation topics were related to purchase, logistics, deployment, maintenance and similar issues. The discussions back then were more like “special cases” vs. today’s environment where supporting workers offsite (now known as the hybrid workforce) has become a critical mainstream topic.

Marketing 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to improve security awareness and training for your employees

Tech Republic Security

Just training people periodically using generic content won’t help them or your organization reduce the risk of security threats, says Egress. The post How to improve security awareness and training for your employees appeared first on TechRepublic.

article thumbnail

LOCKING THE BACK DOOR (Pt. 4 of “Why Don’t You Go Dox Yourself?”)

Cisco Security

With passwords and MFA out of the way, let’s next look at connected apps or services that are tied to our priority accounts. When you log into other sites on the web through Facebook, Google, or another social account, as well as when you install social media apps or games, you are sharing information about those accounts with those services. This may be as limited as the email address and username on file, or may include much more information like your friends list, contacts, likes/subscription

LifeWorks

More Trending

article thumbnail

The U.K. Company Interserve Fined for Lack of Cybersecurity Measures

Heimadal Security

Construction group Interserve was fined by the UK’s Information Commissioner’s Office (ICO) after a cyberattack that happened in Mai 2020. The value of the fine is £4,4 million ($4,9 million) and the organization is accused of failing to put in place appropriate cybersecurity measures. Details about the Attack The attack that led to exposing the […].

article thumbnail

New Version of Fodcha DDoS Botnet Adds Extortion

eSecurity Planet

Back in April of this year, 360 Netlab researchers reported on a new DDoS botnet with more than 10,000 daily active bots and over 100 DDoS victims per day, dubbed Fodcha due to its command and control (C2) domain name folded.in and its use of the ChaCha encryption algorithm. In response to 360 Netlab’s report, the author appeared to concede defeat by leaving the phrase “Netlab pls leave me alone I surrender” in a sample.

DDOS 121
article thumbnail

Why your phone is slow – and how to speed it up

We Live Security

You probably don’t have to ditch your phone just yet – try these simple tips and tricks to make any Android device or iPhone run faster. The post Why your phone is slow – and how to speed it up appeared first on WeLiveSecurity.

Mobile 120
article thumbnail

South Korean Android Users Targeted by Three New Malware Strains

Heimadal Security

The North Korean cyberespionage group known as Kimsuky has been observed exploiting three different Android malware targeted specifically at South Korean users. Kimsuky, also known as Velvet Chollima, Thallium, or Black Banshee, is a North Korean-based cybercrime group with operations going back to 2017. Back in August, an infection chain dubbed GoldDragon was deployed through a Windows backdoor […].

Malware 119
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Reviewing the 5 Stages of the Cybersecurity Lifecycle [+ EXAMPLES]

Security Boulevard

Any cybersecurity professional knows your security efforts aren’t “one and done.” Cybersecurity measures are continual, as you must constantly monitor your network for breaches and threats that could harm your data and your organization. . An attacker gains access to your network. You know you need to recover from this breach as quickly as possible, but what steps do you take to detect and rebuff the attacker?

article thumbnail

Massive Freejacking Campaign Abuses Cloud Dev Resources

Heimadal Security

A large-scale freejacking campaign is abusing GitHub, Heroku, and Buddy services to mine cryptocurrency at the expense of the provider. The threat actors target multiple free-tier cloud accounts to generate significant profits. The threat actor behind the campaign, known as “Purpleurchin,” was seen using CI/CD service providers like GitHub (300 accounts), Heroku (2,000 accounts), and […].

article thumbnail

Ransomware: Open Source to the Rescue

The Hacker News

Automobile, Energy, Media, Ransomware?When thinking about verticals, one may not instantly think of cyber-criminality. Yet, every move made by governments, clients, and private contractors screams toward normalizing those menaces as a new vertical. Ransomware has every trait of the classical economical vertical.

article thumbnail

13 Cybersecurity Horror Stories to Give you Sleepless Nights

Security Boulevard

Are we sitting comfortably? Twas a dark and stormy night, and the cybersecurity team stood patiently in their Scrum meeting. “Tell us a tale,” the CISO said, and one of their number raised their hand. They caught the eye of their colleagues, and began… 1. An artists tale Curious reader, gird thy loins. We shall […]. The post 13 Cybersecurity Horror Stories to Give you Sleepless Nights appeared first on Blog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ransomware news headlines trending on Google

CyberSecurity Insiders

Microsoft, the technology giant of America, has linked Clop Ransomware gang’s whereabouts to a corporate network that was previously hit by Raspberry Robin worm. Meaning the said malware is acting as an access point to hackers spreading the said version of file encrypting malware. First spotted in September 2021, Raspberry Robin was found distributing to networks via USB drives loaded with malicious.LNK File that then used to connect itself to C2C servers and started executing extra infection pa

article thumbnail

Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs

Security Affairs

DEV-0950 group used Clop ransomware to encrypt the network of organizations previously infected with the Raspberry Robin worm. Microsoft has discovered recent activity that links the Raspberry Robin worm to human-operated ransomware attacks. . Data collected by Microsoft Defender for Endpoint shows that nearly 3,000 devices in almost 1,000 organizations have seen at least one RaspberryRobin payload-related alert in the last 30 days.

article thumbnail

US Education Sector Attacked by Vice Society Ransomware

Heimadal Security

The US has recently been confronted with a threat actor named ‘Vice Society’, which has been using ransomware and extortion to attack the education sector around the world, with a focus on the United States. Researchers from Microsoft’s security team released an advisory on Vice Society, which the company has been tracking as DEV-0832, on […].

Education 105
article thumbnail

IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals

Security Boulevard

Learn from the 2022 IBM cost of a data breach report how much ransomware, credential and other breaches are impacting the budget. The post IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals appeared first on Ermetic. The post IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Thomson Reuters Leaks at Least 3TB of Personal Data

Heimadal Security

Thomson Reuters, a multinational media conglomerate, left at least three of its databases open which resulted in the leak of at least 3TB of sensitive customer and corporate data, including third-party server passwords. The data could be used by threat actors for a supply-chain attack. One of the databases, the ElasticSearch database, contained at least […].

Media 105
article thumbnail

Manufacturing Cybersecurity: Trends & Survey Response

Trend Micro

Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry's challenges and present Trend Micro's recommendations.

article thumbnail

LinkedIn’s new security features fight scammers, deepfakes, and hackers

Graham Cluley

LinkedIn says it is beefing up its security in an attempt to better protect its userbase from fraudulent activity such as profiles that use AI-generated deepfake photos, and messages that may contain unwanted or harmful content. Read more in my article on the Tripwire State of Security blog.

Scams 102
article thumbnail

SiriSpy flaw allows eavesdropping on users’ conversations with Siri

Security Affairs

SiriSpy is a vulnerability affecting Apple iOS and macOS that allowed apps to eavesdrop on users’ conversations with Siri. SiriSpy is a now-patched vulnerability, tracked as CVE-2022-32946, in Apple’s iOS and macOS that could have potentially allowed any app with access to Bluetooth to eavesdrop on conversations with Siri and audio. “An app may be able to record audio using a pair of connected AirPods.” reads the advisory published by Apple. “This issue was addresse

Hacking 100
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Chrome users, you have 3 months to say goodbye to Windows 7 and 8.1

Malwarebytes

After keeping Chrome running on early Windows versions for two extra years , giving IT administrators time to update, Google has decided it won't delay any further: Unless organizations upgrade to Windows 10 or 11 next year, they won't be able to use Chrome. Browsers based on Chrome, such as Brave, are likely to be similarly affected. Although Microsoft ended mainstream support for Windows 10 almost three years ago , it has maintained a "last resort option" in the form of its Extended Security U

article thumbnail

PayPal Adds Passkeys for Apple Products

SecureWorld News

PayPal announced this week it will be adding passkeys for user accounts, though the feature will only be available to iPhone, iPad, and Mac users at first. Passkeys are a new industry standard created by the Fast IDentity Online (FIDO) Alliance and the World Wide Web Consortium as part of an effort to replace passwords. Apple, Google, and Microsoft announced plans earlier this year to support passkeys on their platforms.

article thumbnail

How to Start Your Passwordless Journey: Get the Applications Ready

Duo's Security Blog

Tell me if this sounds like you - over the last few years, you’ve steadily increased the length and complexity of your password requirements for users. Now, you’re constantly feeling the pain as users grapple with the poor experience of managing passwords. You’ve heard the hype around passwordless and you’re actively exploring how you get your organization from A to B, but you’re wondering where to get started.

article thumbnail

British Hacker Charged for Operating "The Real Deal" Dark Web Marketplace

The Hacker News

A 34-year-old U.K. national has been arraigned in the U.S. for operating a dark web marketplace called The Real Deal that specialized in the sales of hacking tools and stolen login credentials. Daniel Kaye, who went by a litany of pseudonyms Popopret, Bestbuy, UserL0ser, and Spdrman, has been charged with five counts of access device fraud and one count of money laundering conspiracy.

Hacking 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What Is Federated Identity?

Heimadal Security

In information technology, federated identity refers to a method for connecting an individual’s digital identity and characteristics across numerous distinct identity management systems. In other words, when organizations deploy federated identity technologies, authorized users can access multiple domains, web apps, partner websites, Active Directory, and other applications with a single set of login credentials instead […].

article thumbnail

New streaming ad technology plays hide-and-seek with gamers

Malwarebytes

A new form of digital advertising is looking to make its way to you courtesy of video gaming. However, there’s a rather peculiar twist involved. These ads won’t appear in front of you while playing; in fact, they’re designed to trigger when someone else is in-game. The most baffling twist of all? Those people triggering the ads won’t see them either !

article thumbnail

Apple fixes recently disclosed zero-day on older iPhones, iPads

Bleeping Computer

Apple has released new security updates to backport patches released earlier this week to older iPhones and iPads, addressing an actively exploited zero-day bug. [.].

98
article thumbnail

Who DDoS-ed Georgia/Bobbear.co.uk and a Multitude of Russian Homosexual Sites in 2009? – An OSINT Analysis

Security Boulevard

NOTE: I took these screenshots circa 2009. UPDATE: Here are some of the related botnet C&C server domains known to have been involved in the campaign: hxxp://cxim.inattack.ru/www3/www/. hxxp://i.clusteron.ru/bstatus.php. hxxp://203.117.111.52/www7/www/getcfg.php (cxim.inattack.ru). hxxp://cxim.inattack.ru/www2/www/stat.php. hxxp://cxim.inattack.ru/www3/www/stat.php. hxxp://cxim.inattack.ru/www4/www/stat.php. hxxp://cxim.inattack.ru/www5/www/stat.php. hxxp://cxim.inattack.ru/www6/www/stat.php

DDOS 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!