Thu.Nov 03, 2022

article thumbnail

Better Supporting the Have I Been Pwned API with Zendesk

Troy Hunt

I've been investing a heap of time into Have I Been Pwned (HIBP) lately, ranging from all the usual stuff (namely trawling through masses of data breaches) to all new stuff, in particular expanding and enhancing the public API. The API is actually pretty simple: plug in an email address, get a result, and that's a very clearly documented process.

article thumbnail

Hacker Charged With Extorting Online Psychotherapy Service

Krebs on Security

A 25-year-old Finnish man has been charged with extorting a once popular and now-bankrupt online psychotherapy company and its patients. Finnish authorities rarely name suspects in an investigation, but they were willing to make an exception for Julius “Zeekill” Kivimaki , a notorious hacker who — at the tender age of 17 — had been convicted of more than 50,000 cybercrimes , including data breaches, payment fraud, operating botnets, and calling in bomb threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 320

Troy Hunt

I feel like life is finally complete: I have beaches, sunshine and fast internet! (Yes, and of course an amazing wife, but that goes without saying 😊) For the folks asking via various channels, the speed is not exactly symmetrical at 1000/400 and I'm honestly not sure why that's the case here in Australia. I also had to shell out quite a bit extra to go from 50 up to a "business" plan of 400 up, but with the volumes of data I ship around it'll make a pretty big dif

Internet 298
article thumbnail

Tech news you may have missed Oct. 28–Nov. 3

Tech Republic Security

New Microsoft 365 deployment tools, making OneDrive work on your iPhone, and a new Cranefly backdoor lead the top news for this week. The post Tech news you may have missed Oct. 28–Nov. 3 appeared first on TechRepublic.

Big data 183
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cisco addressed several high-severity flaws in its products

Security Affairs

Cisco addressed multiple flaws impacting its products, including high-severity issues in identity, email, and web security solutions. Cisco addressed multiple vulnerabilities impacting some of its products, including high-severity flaws in identity, email, and web security products. The most severe vulnerability addressed by the IT giant is a cross-site request forgery (CSRF) flaw, tracked as CVE-2022-20961 (CVSS score of 8.8), that impacts the Identity Services Engine (ISE).

article thumbnail

Dispelling Body Language Myths

Security Boulevard

Written by Christopher Hadnagy and Dr. Abbie Marono There is no denying the appeal of body-language focused blogs, particularly those […]. The post Dispelling Body Language Myths appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Vodafone Italy Confirms September Data Breach

Heimadal Security

Vodafone Italia is notifying its customers of a data breach, stating that a reseller of its telecommunications services in Italy, FourB S.p.A, was the victim of a cyberattack. The notice warns that important subscriber credentials were compromised in a cyberattack during the first week of September, possibly exposing subscriber data, IDs, and contact information.

article thumbnail

Espionage campaign loads VPN spyware on Android devices via social media

CSO Magazine

A new espionage campaign, dubbed SandStrike, has been detected using malicious VPN apps to load spyware on Android devices, cybersecurity company Kaspersky reports. It's an example of how APT (advanced persistent threat) actors are constantly updating old attack tools and creating new ones to launch new malicious campaigns, particularly against mobile devices.

Spyware 117
article thumbnail

LockBit ransomware gang claims the hack of Continental automotive group

Security Affairs

The LockBit ransomware group claimed to have hacked the multinational automotive group Continental and threatens to leak stolen data. LockBit ransomware gang announced to have hacked the German multinational automotive parts manufacturing company Continental. The group added the name of the company to its Tor leak site and is threatening to publish alleged stolen data if the victim will not pay the ransom.

Hacking 116
article thumbnail

Multicloud Application Security: Trends, Considerations and Best Practices

Tech Republic Security

The suitability of the cloud for most workloads is no longer in question. On the contrary, most organizations use multiple cloud providers to reduce risk, maximize agility, and control costs. Realizing the full benefit of a multicloud approach takes planning, however. Join Pavel Despot, Senior Product Marketing Manager, at Akamai and Mike Maney, Corporate Communications.

Marketing 113
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Cyber Attack disrupts operations of world’s advanced radio telescope

CyberSecurity Insiders

A highly sophisticated cyber attack has taken down the world’s advanced radio telescope, halting the scientific experiments from the past few days. The Atacama Large Millimeter/sub-millimeter Array Laboratory in Chile was digitally brought down by a cyber attack on October 29th of this year, making it unavailable for the scientists observing the space.

article thumbnail

Experts link the Black Basta ransomware operation to FIN7 cybercrime gang

Security Affairs

Sentinel Labs found evidence that links the Black Basta ransomware gang to the financially motivated hacking group FIN7. Security researchers at Sentinel Labs shared details about Black Basta ‘s TTPs and assess it is highly likely the ransomware operation has ties with FIN7. The experts analyzed tools used by the ransomware gang in attacks, some of them are custom tools, including EDR evasion tools.

article thumbnail

No time to dwell

IT Security Guru

Whether it is a burglar in your home or a hacker in your network, if you can limit the time before they are spotted and stopped in their tracks, you might prevent them from achieving their goal. So, if we can lower cyber dwell times, also known as meantime-to-detect (MTTD), mean-time-to-respond (MTTR), or a combination of both, it should help in reducing the impact of cyber crime.

article thumbnail

Cybersecurity Trends To Guide Your Organizational Defence

SecureBlitz

Here, I will show you cybersecurity trends to guide your organizational defence. The increased shocking sophistication of cyberattacks is pushing organizations to the edge. Everyone is vulnerable—from multinational corporations to government agencies and private individuals—the risk of data loss or damage excuses no one. The drastic shortage of cybersecurity professionals these days makes the matter […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Royal Mail’s Website Suspended Due to a Data Breach

Heimadal Security

The British postal service company, Royal Mail, temporarily suspended its Click and Drop website on Tuesday, November 1, 2022, due to a data breach. The security incident gave users access to other customers’ information. Royal Mail suspended the website as a precautionary measure while the problem was investigated by security experts. Details About the Incident […].

article thumbnail

The future starts now: 10 major challenges facing cybersecurity

We Live Security

To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future. The post The future starts now: 10 major challenges facing cybersecurity appeared first on WeLiveSecurity.

article thumbnail

250+ U.S. news sites spotted spreading FakeUpdates malware in a supply-chain attack

Security Affairs

Threat actors compromised a media company to deliver FakeUpdates malware through the websites of hundreds of newspapers in the US. Researchers at Proofpoint Threat Research observed threat actor TA569 intermittently injecting malicious code on a media company that serves many major news outlets. The media company serves The media company provides video content and advertising via Javascript to its partners.

Malware 102
article thumbnail

Hackers Using Rogue Versions of KeePass and SolarWinds Software to Distribute RomCom RAT

The Hacker News

The operators of RomCom RAT are continuing to evolve their campaigns with rogue versions of software such as SolarWinds Network Performance Monitor, KeePass password manager, and PDF Reader Pro. Targets of the operation consist of victims in Ukraine and select English-speaking countries like the U.K.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Fortinet fixed 16 vulnerabilities, 6 rated as high severity

Security Affairs

Fortinet addressed 16 vulnerabilities in some of the company’s products, six flaws received a ‘high’ severity rate. One of the high-severity issues is a persistent XSS, tracked as CVE-2022-38374 , in Log pages of FortiADC. The root cause of the issue is an improper neutralization of input during web page generation vulnerability [CWE-79] in FortiADC.

Firewall 102
article thumbnail

RSA Conference® 2022 Security Operations Center Findings Report

Cisco Security

NetWitness and Cisco released the third annual Findings Report from the RSA Conference® 2022 Security Operations Center (SOC). The RSA Conference® SOC analyzes the Moscone Center wireless traffic, which is an open network during the week of the Conference. The role of the SOC at RSA Conference is an educational exhibit sponsored by NetWitness and Cisco.

article thumbnail

Report: SMEs Are Prime Targets and Must Plan for Disaster Recovery

SecureWorld News

Here's an alarming stat from Accenture: more than one-third of cyberattacks are aimed at small businesses, but only 14% of them are prepared to defend themselves. Small and midsize enterprises (SMEs) often do not have the resources to protect themselves from cybercriminals with bad intentions, leaving them vulnerable to financial and productivity losses, operation disruptions, extortion payments, settlement costs, and regulatory fines.

Backups 98
article thumbnail

Malware, Ransomware, IoT Pose Major IT Security Challenges

Security Boulevard

More than 4 billion malware attempts were recorded globally so far in 2022, while year-to-date ransomware attempts have already exceeded full-year totals from four of the last five years. These were among the findings of a recent SonicWall threat report that also found ransomware tactics are shifting and diversifying, adding more pressure to already overloaded.

IoT 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Dropbox Discloses Phishing Incident, 130 GitHub Repositories Stolen

SecureWorld News

Dropbox recently announced it had been the target of a phishing attack that resulted in the threat actor(s) accessing some code the company had stored on GitHub. The file hosting service was alerted by GitHub of some suspicious activity on October 14th and immediately began an investigation into the incident. Dropbox learned that a threat actor impersonating CircleCI, a code integration and delivery platform, had accessed one of its GitHub accounts.

article thumbnail

Microsoft Teams now boasts 30% faster chat, channel switches

Bleeping Computer

Microsoft has significantly reduced latency for Windows and Mac users of the Teams desktop client in some critical scenarios when interacting with the application. [.].

98
article thumbnail

What You Need to Know About SBOM Generation Tools

Security Boulevard

When it comes to tools for generating a software bill of materials (SBOM), organizations basically have three options: use a software composition analysis (SCA) product, deploy an open source command-line interface (CLI) tool, or embrace new technology to find an altogether new solution. Whichever option an organization chooses can have a significant impact for its.

article thumbnail

How Safe Are Online Casinos? What Security Protocols Are In Place?

SecureBlitz

Are online casinos safe? What security protocols are in place? Read on to find out… With the popularity of online gambling, you may be wondering just how safe online casinos really are. After all, putting your hard-earned money into an account with an online casino is a big decision! Thankfully, with technology continuing to improve […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cyber Security and Segregation of Duties

Security Boulevard

What Cybersecurity Needs To Know About Segregation Of DutiesCybersecurity has moved to the top of the list of priorities of CISOs and not just because of the astronomical cost of cyber insurance. According to Gartner organizations will spend a collective $188.3 billion on information security and risk management products and […]. The post Cyber Security and Segregation of Duties appeared first on SafePaaS.

article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

Telefonica, the company that offers internet related services in Spain, was hit by a cyber attack almost two weeks ago. Out of caution, the mobile and landline services provider is urging its users to change their wi-fi passwords as quickly as possible. It is unclear on how many of the users were exactly affected by the digital assault. However, the company has assured that no personal info or bank details were leaked in the attack.

article thumbnail

How To Implement Assume-Breach Security?

Security Boulevard

Our greatest asset and weakest link are our employees. Unfortunately, data breaches caused by human error account for up to 90% of all incidents. For instance, an employee might accidentally click a phishing link. By encouraging ongoing education, awareness, and […]. The post How To Implement Assume-Breach Security? appeared first on WeSecureApp :: Simplifying Enterprise Security!

article thumbnail

OPERA1ER APT Hackers Targeted Dozens of Financial Organizations in Africa

The Hacker News

A French-speaking threat actor dubbed OPERA1ER has been linked to a series of more than 30 successful cyber attacks aimed at banks, financial services, and telecom companies across Africa, Asia, and Latin America between 2018 and 2022.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!