Tue.Jul 11, 2023

article thumbnail

Apple & Microsoft Patch Tuesday, July 2023 Edition

Krebs on Security

Microsoft Corp. today released software updates to quash 130 security bugs in its Windows operating systems and related software, including at least five flaws that are already seeing active exploitation. Meanwhile, Apple customers have their own zero-day woes again this month: On Monday, Apple issued (and then quickly pulled) an emergency update to fix a zero-day vulnerability that is being exploited on MacOS and iOS devices.

Software 254
article thumbnail

GUEST ESSAY: 7 tips for protecting investor data when it comes to alternative asset trading

The Last Watchdog

When it comes to alternative asset trading, protecting investor data is of critical importance. Related: Preserving the privacy of the elderly As more traders and investors engage in these investment avenues, it is crucial to adopt robust security measures to safeguard sensitive and regulated information. Here are seven tips to protect investor data in alternative asset trading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy of Printing Services

Schneier on Security

The Washington Post has an article about popular printing services, and whether or not they read your documents and mine the data when you use them for printing: Ideally, printing services should avoid storing the content of your files, or at least delete daily. Print services should also communicate clearly upfront what information they’re collecting and why.

188
188
article thumbnail

News Alert: CybSafe CEO Oz Alashe MBE recognized as “Security Industry Innovator” for 2023

The Last Watchdog

Boston, July 7, 2023 — CybSafe, the human risk management platform, has today announced CEO Oz Alashe MBE has been named as a SecurityInfoWatch.com , Security Business and Security Technology Executive magazines’ 2023 Security Industry Innovator Award winner. CybSafe’s human-centric, behavioral approach to cyber security and risk mitigation has positioned Alashe and his team as security leaders to watch through 2023 and into 2024.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor

Tech Republic Security

Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level.

article thumbnail

ESET Threat Report H1 2023

We Live Security

A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report H1 2023 appeared first on WeLiveSecurity

LifeWorks

More Trending

article thumbnail

Zero-Day Exploits: A Cheat Sheet for Professionals

Tech Republic Security

This guide covers everything you need to know about zero-day security exploits, which are secret vulnerabilities used by hackers to infiltrate PCs, networks, mobile phones and IoT devices. The post Zero-Day Exploits: A Cheat Sheet for Professionals appeared first on TechRepublic.

IoT 114
article thumbnail

Microsoft rebrands Azure Active Directory to Microsoft Entra ID

Bleeping Computer

Microsoft announced today that it would change the name of its Azure Active Directory (Azure AD) enterprise identity service to Microsoft Entra ID by the end of the year. [.

111
111
article thumbnail

How to Apply MITRE ATT&CK to Your Organization

The Hacker News

Discover all the ways MITRE ATT&CK can help you defend your organization. Build your security strategy and policies by making the most of this important framework. What is the MITRE ATT&CK Framework?

106
106
article thumbnail

Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws

Bleeping Computer

Today is Microsoft's July 2023 Patch Tuesday, with security updates for 132 flaws, including six actively exploited and thirty-seven remote code execution vulnerabilities. [.

111
111
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Performance, Diagnostics, and WMI

Security Boulevard

Windows offers tons of useful tools that administrators can leverage to perform their daily jobs. A lot of times, those tools are looked at from an offensive standpoint and use cases for them are discovered. Earlier this year I read a message from a co-worker Lee Christensen ( @tifkin_ ) about Service Performance DLLs and upon further review, it seemed like there was potential for new opportunities to come from it.

DNS 105
article thumbnail

Microsoft: Unpatched Office zero-day exploited in NATO summit attacks

Bleeping Computer

Microsoft disclosed today an unpatched zero-day security bug in multiple Windows and Office products exploited in the wild to gain remote code execution via malicious Office documents. [.

106
106
article thumbnail

Takeaways from the 2023 Verizon DBIR: 9 Ways Hackers Can Use Files to Attack Your Organization

Security Boulevard

The annual Verizon Data Breach Investigations Report (DBIR) is an essential resource used by enterprise security leaders to understand the latest trends in cybersecurity and learn lessons on improving organizational defenses. Let’s review some of the key highlights and see how Votiro Cloud can address and mitigate many of the most pressing security issues resulting.

article thumbnail

What's new in the Windows 11 22H2 Moment 3 update, now available

Bleeping Computer

Microsoft has begun the forced rollout of its Windows 11 22H2 'Moment 3' update, which introduces several new features and improvements to the operating system [.

Software 103
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

BSides Knoxville 2023 – Jared Winn – Best Practices Crosswalks

Security Boulevard

Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel. Permalink The post BSides Knoxville 2023 – Jared Winn – Best Practices Crosswalks appeared first on Security Boulevard.

CISO 105
article thumbnail

News Alert: AcuityTec welcomes Alfredo Solis as their new Senior Director and Business Strategist

The Last Watchdog

Montreal, Canada, July 11, 2023 — AcuityTec, a leading provider of Global KYC, KYT, compliance, and multi-layered fraud prevention solutions, is thrilled to announce a significant addition to their leadership team. With its relentless pursuit of excellence and commitment to secure global online businesses, AcuityTec proudly welcomes Alfredo Solis as their new Senior Director and Business Strategist.

Risk 100
article thumbnail

Silk Road’s Second-in-Command, Variety Jones, Gets 20 Years in Prison

WIRED Threat Level

Roger Thomas Clark, also known as Variety Jones, will spend much of the rest of his life in prison for his key role in building the world’s first dark-web drug market.

article thumbnail

Update now! Microsoft patches a whopping 130 vulnerabilities

Malwarebytes

It’s that time of the month again. For the July 2023 Patch Tuesday, Microsoft has issued security updates for 130 vulnerabilities. Nine of the vulnerabilities are rated as critical and four of them are known to be actively exploited. The Cybersecurity & Infrastructure Security Agency (CISA) has already added these four vulnerabilities to the catalog of known to be exploited vulnerabilities.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Software Licensing: Subscription vs. Perpetual

Security Boulevard

Software licensing is a critical aspect of every software purchase decision. The license stipulates the terms and conditions for using the software and outlines the rights and responsibilities of both the software publisher and the user. Two popular models in the world of software licensing are the subscription license and the perpetual license. This.

article thumbnail

Microsoft Releases Patches for 132 Vulnerabilities, Including 6 Under Active Attack

The Hacker News

Microsoft on Tuesday released updates to address a total of 132 new security flaws spanning its software, including six zero-day flaws that it said have been actively exploited in the wild. Of the 132 vulnerabilities, nine are rated Critical, 122 are rated Important in severity, and one has been assigned a severity rating of "None.

article thumbnail

Owning the customer experience from start to finish: Results, revenue, and ROI

Security Boulevard

Choosing the right tools for your business is crucial for delivering a seamless customer experience and driving growth. It can mean the difference between faulty, inefficient operations and a well-oiled machine that delivers rising revenue. But identifying a worthwhile tool before purchasing it isn’t always easy. There have never been more options than there are […] The post Owning the customer experience from start to finish: Results, revenue, and ROI appeared first on Sift Blog.

98
article thumbnail

Hackers exploit Windows policy to load malicious kernel drivers

Bleeping Computer

Microsoft blocked code signing certificates predominantly used by Chinese hackers and developers to sign and load malicious kernel mode drivers on breached systems by exploiting a Windows policy loophole. [.

98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Return of the ICMAD: Critical Vulnerabilities Affecting ICM over HTTP/2

Security Boulevard

Return of the ICMAD: Critical Vulnerabilities Affecting ICM over HTTP/2 ltabo Tue, 07/11/2023 - 18:09 On July 11th, 2023, following a continued monthly cadence of security patches, SAP released patches for two new vulnerabilities (CVE-2023-33987 and CVE-2023-35871), which affect one of the most critical components of SAP applications: the SAP Internet Communications Manager also known as ICM.

article thumbnail

Criminals target businesses with malicious extension for Meta's Ads Manager and accidentally leak stolen accounts

Malwarebytes

Like all social media platforms, Facebook constantly has to deal with fake accounts, scams and malware. We have written about scams targeting consumers that redirect to fake Microsoft alert pages , but there are also threats targeting businesses that use Facebook to promote their products and services. In the past few weeks, there's been a resurgence in sponsored posts and accounts that impersonate Meta/Facebook's own Ads Manager.

article thumbnail

A Closer Look: Differentiating Software Vulnerabilities and Malware

Security Boulevard

In today’s interconnected digital world, vulnerabilities and malware in open source software pose significant threats to the security and integrity of your software supply chain. While these two terms may appear synonymous at first glance, you should know their fundamental differences. They are two distinct yet closely related aspects of cybersecurity.

article thumbnail

Critical VMware Bug Exploit Code Released Into the Wild

Dark Reading

The exploit code was brought to VMware's attention by an anonymous researcher, in tandem with the Trend Micro Zero Day Initiative.

97
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AppSec integrations enable a more secure SDLC

Security Boulevard

AppSec integrations can help keep development secure at the speed your business requires. The post AppSec integrations enable a more secure SDLC appeared first on Security Boulevard.

article thumbnail

Patch Tuesday July 2023 – Microsoft Publishes Bug Fixes for 142 Vulnerabilities

Heimadal Security

The second month of summer comes a-calling with a hefty list of bug fixes; throughout July, Microsoft has released no lesst than 142 patches for various types of vulnerabilities, with scores ranging from Important to Critical. Without further ado, here’s what Patch Tuesday July has in stock for us. Enjoy and don’t forget to subscribe […] The post Patch Tuesday July 2023 – Microsoft Publishes Bug Fixes for 142 Vulnerabilities appeared first on Heimdal Security Blog.

97
article thumbnail

Consolidation: The wave of the (AST) future

Security Boulevard

Reducing complexity and providing insight into software risk, consolidation is the wave of the application security testing future. The post Consolidation: The wave of the (AST) future appeared first on Security Boulevard.

article thumbnail

Data Loss Prevention Best Practices: How to Protect Your Company’s Sensitive Data

Digital Guardian

Most companies understand the importance of data protection but don't always know how to implement an effective data loss prevention program. Here's a quick primer.

95
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!