Tue.May 31, 2022

article thumbnail

The Limits of Cyber Operations in Wartime

Schneier on Security

Interesting paper by Lennart Maschmeyer: “ The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations “: Abstract: Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition.

Media 348
article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Vulnerability management, or VM, has long been an essential, if decidedly mundane, component of network security. Related: Log4J’s long-run risks. That’s changing — dramatically. Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. I visited with Scott Kuffer, co-founder and chief operating officer of Sarasota, FL-based Nucleus Security , which is in the thick of this development.

Risk 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security and Human Behavior (SHB) 2022

Schneier on Security

Today is the second day of the fifteenth Workshop on Security and Human Behavior , hosted by Ross Anderson and Alice Hutchings at the University of Cambridge. After two years of having this conference remotely on Zoom, it’s nice to be back together in person. SHB is a small, annual, invitational workshop of people studying various aspects of the human side of security, organized each year by Alessandro Acquisti, Ross Anderson, Alice Hutchings, and myself.

250
250
article thumbnail

Compromised academic credentials available on cybercriminal platforms

Tech Republic Security

Academic partners of identified American colleges and universities are being warned that their credentials are being sold or sometimes even provided for free on criminal marketplaces and forums. Read more about how to protect yourself from this threat. The post Compromised academic credentials available on cybercriminal platforms appeared first on TechRepublic.

159
159
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Experts warn of ransomware attacks against government organizations of small states

Security Affairs

Cyber Research Labs reported a rise in ransomware attacks in the second quarter of 2022, small states are more exposed to these attacks. Cyber Research Labs observed a rise in ransomware attacks in the second quarter of 2022, some of them with a severe impact on the victims, such as the attack that hit the Costa Rican government that caused a nationwide crisis.

article thumbnail

Speek! is a new encrypted chat service that uses Tor to offer secure communication

Tech Republic Security

If you're looking for an encrypted chat service for nearly any platform, Jack Wallen believes Speek! might be just what you need. The post Speek! is a new encrypted chat service that uses Tor to offer secure communication appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

Why small businesses may want to pursue virtual CISO

Tech Republic Security

At first glance, a vCISO may seem out of the budget, but SMBs might be missing out on some major benefits. The post Why small businesses may want to pursue virtual CISO appeared first on TechRepublic.

article thumbnail

Malware Targeting Linux Becoming More Prevalent

Heimadal Security

Many people think that because of how it handles user permissions, Linux is built to be safer than Windows. That’s starting to change as more and more Linux systems make things easier by recognizing file extensions, so users now depend on the security of every application. What Happened? You may already be aware that Linux […]. The post Malware Targeting Linux Becoming More Prevalent appeared first on Heimdal Security Blog.

Malware 132
article thumbnail

5 top deception tools and how they ensnare attackers

CSO Magazine

Security-savvy organizations understand that it's best to assume that their systems are breached. It's one reason why zero-trust architectures get so much attention nowadays, and it's why more enterprises have threat hunters who go on the lookout for attackers that are already active on their networks. This practice has grown popular because threats have become so pervasive, and traditional intrusion detection/prevention systems dispatch too many false positives.

article thumbnail

Microsoft shares mitigation for Office zero-day exploited in attacks

Bleeping Computer

Microsoft has shared mitigation measures to block attacks exploiting a newly discovered Microsoft Office zero-day flaw abused in the wild to execute malicious code remotely. [.].

125
125
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

U.S. government proposals spell out 5G security advancements

CSO Magazine

Last week the U.S. federal government introduced a proposed five-step 5G Security Evaluation Process Investigation. “[It] was developed to address gaps in existing security assessment guidance and standards that arise from the new features and services in 5G technologies," Eric Goldstein, executive assistant director for the U.S. Cybersecurity and Infrastructure Security Agency (CISA), said.

article thumbnail

SideWinder Hackers Launched Over a 1,000 Cyber Attacks Over the Past 2 Years

The Hacker News

An "aggressive" advanced persistent threat (APT) group known as SideWinder has been linked to over 1,000 new attacks since April 2020.

article thumbnail

Using Wi-Fi 6 to Power Hyper-Aware Healthcare Facilities

Tech Republic Security

The medical internet of things (IoT) market is expected to reach $158 billion in valuation in 2022, up from its 2017 value of $41 billion. As healthcare facilities continue to add IoT devices, this article discusses the necessity of Wi-Fi 6 for providing contextual health data to improve patient outcomes in modern healthcare facilities. The post Using Wi-Fi 6 to Power Hyper-Aware Healthcare Facilities appeared first on TechRepublic.

article thumbnail

Different Platforms You Can Use to Sell Online

SecureBlitz

This post will show you different platforms you can use to sell online. If you are thinking about selling items. Read more. The post Different Platforms You Can Use to Sell Online appeared first on SecureBlitz Cybersecurity.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Top 5 E-Commerce Cybersecurity Trends For 2022 That You Need To Know

Appknox

Cyberattacks on e-commerce sites are always a frequent phenomenon. Every e-commerce retailer wants to improve the consumer experience, but if they're not careful, their efforts could transform their business website into a playground for cybercriminals. Without a doubt, they are gold mines of personal and financial information for threat actors. And as a result, companies worldwide are losing billions to e-commerce fraud (more than 20$ billion in 2021).

Retail 119
article thumbnail

Microsoft shared workarounds for the Microsoft Office zero-day dubbed Follina

Security Affairs

Microsoft released workarounds for a recently discovered zero-day vulnerability, dubbed Follina, in the Microsoft Office productivity suite. Microsoft has released workarounds for a recently discovered zero-day vulnerability, dubbed Follina and tracked as CVE-2022-30190 (CVSS score 7.8), in the Microsoft Office productivity suite. “On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability.” reads the adviso

article thumbnail

Amazon to mimic Walmart in AI drone delivery

CyberSecurity Insiders

Amazon will soon follow in the footsteps of Walmart and will implement a door step delivery through drones. Provided they are within the vicinity of store and their geographical interface is conducive for drone deliver ecosystem. Walmart, on the other hand, has made an official announcement that it is going to expand its drone delivery services to over 34 sites in the United States reaching 4 million households.

article thumbnail

Hive ransomware gang hit Costa Rica public health service

Security Affairs

Costa Rican Social Security Fund, Costa Rica ‘s public health service, was hit by a Hive ransomware attack. Costa Rican Social Security Fund, Costa Rica ‘s public health service (aka CCCS), was hit today by a Hive ransomware attack, BleepingComputer reported. The attack occurred early this morning, Tuesday, May 31, 2022. The authorities are investigating the security breach, but the public health service confirmed that the attack did not impact the EDUS (Unified Digital Health) and t

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Ransomware news trending on Google

CyberSecurity Insiders

If you thought Windows 11 operating system machines were safe from Ransomware, then you better think twice before concluding. As information is out that those spreading Magniber Ransomware are after Windows 11 Machines and have targeted around a hundred by now. According to a research conducted by 360 Total Security, Magniber ransomware attacks have increased significantly since May 25th of this year.

article thumbnail

uMobix Review: Features, Pricing, Pros And Cons, Alternatives 

SecureBlitz

In this uMobix review, I will talk about its features, pros and cons, and the best uMobix alternatives. Parents cant. Read more. The post uMobix Review: Features, Pricing, Pros And Cons, Alternatives appeared first on SecureBlitz Cybersecurity.

article thumbnail

Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer?

Digital Shadows

In a few previous blogs, we’ve covered how threat actors discuss prison on Russian-language cybercriminal platforms. We’ve touched on high-profile. The post Russian prison culture and slang on cybercriminal forums: Can you cram on the hairdryer? first appeared on Digital Shadows.

article thumbnail

Hackers steal WhatsApp accounts using call forwarding trick

Bleeping Computer

There's a trick that allows attackers to hijack a victim's WhatsApp account and gain access to personal messages and contact list. [.].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Learn Raspberry Pi and Arduino with 9 Online Developer Training Courses

The Hacker News

This is an exciting time for the Internet of Things. According to Deloitte research, the average U.S. household now has 25 connected devices — and new products are being launched every day. This rush of demand means that many tech companies are looking for developers with IoT knowledge. And even if you don’t want to specialize in this field, the programming skills are transferable.

IoT 103
article thumbnail

New Microsoft Zero-Day Attack Underway

Dark Reading

"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.

101
101
article thumbnail

SideWinder carried out over 1,000 attacks since April 2020

Security Affairs

SideWinder, an aggressive APT group, is believed to have carried out over 1,000 attacks since April 2020, Kaspersky reported. Researchers from Kaspersky have analyzed the activity of an aggressive threat actor tracked as SideWinder (aka RattleSnake and T-APT-04). The group stands out for the high frequency and persistence of its attacks, researchers believe that the APT group has carried out over 1,000 attacks since April 2020.

article thumbnail

Windows MSDT zero-day now exploited by Chinese APT hackers

Bleeping Computer

Chinese-linked threat actors are now actively exploiting a Microsoft Office zero-day vulnerability (known as 'Follina') to execute malicious code remotely on Windows systems. [.].

100
100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to Keep Your Enterprise Safe From Digital Supply Chain Attacks

Dark Reading

Digital supply chains are more vulnerable than ever; here's what you need to do to secure them.

99
article thumbnail

Over 3.6 million MySQL servers found exposed on the Internet

Bleeping Computer

?Over 3.6 million MySQL servers are publicly exposed on the Internet and responding to queries, making them an attractive target to hackers and extortionists. [.].

article thumbnail

You Need to Update iOS, Chrome, Windows, and Zoom ASAP

WIRED Threat Level

Plus: Google patches 36 Android vulnerabilities, Cisco fixes three high-severity issues, and VMWare closes two “serious” flaws.

99
article thumbnail

Aligning Your Password Policy enforcement with NIST Guidelines

Bleeping Computer

Although most organizations are not required by law to comply with NIST standards, it is usually in an organization's best interest to follow NIST's cybersecurity standards. This is especially true for NIST's password guidelines. [.].

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!