Mon.Oct 10, 2022

article thumbnail

Complex Impersonation Story

Schneier on Security

This is a story of one piece of what is probably a complex employment scam. Basically, real programmers are having their resumes copied and co-opted by scammers, who apply for jobs (or, I suppose, get recruited from various job sites), then hire other people with Western looks and language skills are to impersonate those first people on Zoom job interviews.

Scams 333
article thumbnail

GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them

The Last Watchdog

As digital technologies become more immersive and tightly integrated with our daily lives, so too do the corresponding intrusive attacks on user privacy. Related: The case for regulating facial recognition. Virtual reality (VR) is well positioned to become a natural continuation of this trend. While VR devices have been around in some form since well before the internet, the true ambition of major corporations to turn these devices into massively-connected social “metaverse” platforms has only r

Risk 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Re-Launchers: Pivoting into Cybersecurity as a Mid-Career Professional

Cisco Security

It is never too late to start a career in cybersecurity — this may sound cliché, but it holds a lot of truth. If you are passionate about the topic and are ready to put in the work to acquire the skills and knowledge needed, anyone, regardless of educational background, can break into cybersecurity. At the age of 26, I started a four-year bachelor’s degree in digital forensics.

article thumbnail

Human-Centric No-Code Automation is the Future of Cybersecurity

Security Boulevard

It’s never been more challenging to work in cybersecurity. The cost of a breach keeps going up, the number of attacks is constantly increasing and the industry is in the middle of a multi-year staffing crisis. It’s no surprise that 90% of security teams see automation as essential for them to deliver on their mandate. The post Human-Centric No-Code Automation is the Future of Cybersecurity appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

When It Comes to M&A, Security Is a Journey

Cisco Security

Shiva Persaud is the director of security engineering for Cisco. His team is responsible for the Cisco Secure Development Lifecycle (CSDL), a set of practices based on a “secure-by-design” philosophy developed to ensure that security and compliance are top-of-mind in every step of a solution’s lifecycle. This blog is the third in a series focused on M&A cybersecurity, following Jason Button’s post on Demonstrating Trust and Transparency in Mergers and Acquisitions.

article thumbnail

Pro-Russia group KillNet targets US airports

Security Affairs

The pro-Russia hacktivist group ‘KillNet’ is behind massive DDoS attacks that hit websites of several major airports in the US. The pro-Russia hacktivist group ‘ KillNet ‘ is claiming responsibility for massive distributed denial-of-service (DDoS) attacks against the websites of several major airports in the US. The DDoS attacks have taken the websites offline, users were not able to access it during the offensive.

DDOS 141

LifeWorks

More Trending

article thumbnail

Why is Ransomware Still a Thing?

Security Boulevard

Ransomware remains top-of-mind for vendors and industry folks, at least if my discussions over the past two weeks and visits to our editorial sites are any indication. I spoke to two separate companies that were putting all of their wood behind a ransomware recovery use case. We’ve had a slew of articles (here, here, here. The post Why is Ransomware Still a Thing?

article thumbnail

Serious Security: OAuth 2 and why Microsoft is finally forcing you into it

Naked Security

Microsoft calls it "Modern Auth", though it's a decade old, and is finally forcing Exchange Online customers to switch to it.

129
129
article thumbnail

Secure web browsers for the enterprise compared: How to pick the right one

CSO Magazine

The web browser has long been the security sinkhole of enterprise infrastructure. While email is often cited as the most common entry point, malware often enters via the browser and is more difficult to prevent. Phishing, drive-by attacks, ransomware, SQL injections, man-in-the-middle (MitM), and other exploits all take advantage of the browser’s creaky user interface and huge attack surface, and the gullibility of most end users.

Phishing 129
article thumbnail

The head of the Federal Cyber Security Authority (BSI) faces dismissal

Security Affairs

The German Interior Minister wants to dismiss the head of the Federal Cyber Security Authority (BSI), Arne Schoenbohm, due to possible contacts with Russian security services. German Interior Minister Nancy Faeser wants to dismiss the head of the Federal Cyber Security Authority (BSI), Arne Schoenbohm, due to possible contact with people involved with Russian security services.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How social environments impact student mental health and self-harm

Security Boulevard

Why are we the way that we are? Why do we do what we do? These are two broad questions that nobody really knows the answer to, but most researchers agree that a combination of factors are involved — most notably, our environment. It’s true: Environmental stress has a direct relationship with personal stress. A […]. The post How social environments impact student mental health and self-harm appeared first on ManagedMethods.

Education 123
article thumbnail

CVE-2022-40684 flaw in Fortinet products is being exploited in the wild

Security Affairs

Fortinet has confirmed that the recently disclosed critical authentication bypass issue (CVE-2022-40684) is being exploited in the wild. Last week, Fortinet addressed a critical authentication bypass flaw, tracked as CVE-2022-40684 , that impacted FortiGate firewalls and FortiProxy web proxies. An attacker can exploit the vulnerability to log into vulnerable devices.

article thumbnail

A critical vulnerability in vm2 Allow a Remote Attacker to Escape The Sandbox

Hacker Combat

Vm2, a JavaScript sandbox package that receives more than 16 million downloads each month, provides the synchronous execution of untrusted code within a single process. Security researchers at Oxeye found CVE-2022-36067 in August 2022, a major vulnerability in vm2 with a CVSS score of 10 that should notify all vm2 users due to its potential for wide-ranging effects.

article thumbnail

Zimbra RCE Bug Under Active Attack

Dark Reading

A flaw in unpatched Zimbra email servers could allow attackers to obtain remote code execution by pushing malicious files past filters.

120
120
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US airports' sites taken down in DDoS attacks by pro-Russian hackers

Bleeping Computer

The pro-Russian hacktivist group 'KillNet' is claiming large-scale distributed denial-of-service (DDoS) attacks against the websites of several major airports in the U.S., making them unaccessible. [.].

DDOS 119
article thumbnail

Russia-linked Hackers Launch DDoS Attacks on U.S. Airport Websites

eSecurity Planet

A series of distributed denial of service ( DDoS ) attacks today briefly took down the websites of over a dozen U.S. airports, including those for Atlanta and Los Angeles International Airports. The attacks followed a recent Telegram post by the pro-Kremlin hacker group Killnet listing 46 websites to be targeted. Still, as NBC News noted, some of the targets on the list seemed like the result of translation errors – rather than targeting Chicago’s O’Hare Airport website, for example, the hackers

DDOS 115
article thumbnail

Russia Killnet Hacking Group disrupts US Air Travel websites

CyberSecurity Insiders

Russia funded Killnet Hacking Group has disrupted several US Air Travel websites yesterday, including the ones operating for two busiest airports. The Attack was DDoS related and led to the downtime because of overwhelming internet traffic that became unmanageable by the servers. Both Colorado.gov and Kentucky.org websites were severely hit by the digital assault.

Hacking 114
article thumbnail

Will Security Teams Lose Relevance in the Age of Decentralized IT?

Security Boulevard

As I discussed in Decentralized IT Clouds the Security Team’s Ability to Spot Risks, 74% of IT decision-makers in the U.S. and Canada reported that their organization has successfully decentralized its IT structure. With more business-technology decisions being made outside the IT department than ever, will security teams lose their ability to help guide technology.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Solana Phantom Targeted by Password-Stealing Malware

Heimadal Security

Solana cryptocurrency owners are being targeted by NFTs pretending to be alerts for a new Phantom security update. This will result in the installation of password-stealing malware and the theft of cryptocurrency wallets. Upon a Closer Look Since its beginning two weeks ago, the attack starts off with NFTs titled ‘PHANTOMUPDATE.COM’ or ‘UPDATEPHANTOM.COM’ sent as warnings […].

Passwords 110
article thumbnail

GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them

Security Boulevard

As digital technologies become more immersive and tightly integrated with our daily lives, so too do the corresponding intrusive attacks on user privacy. Related: The case for regulating facial recognition. Virtual reality (VR) is well positioned to become a natural … (more…). The post GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them appeared first on Security Boulevard.

Risk 110
article thumbnail

US Airports in Cyberattack Crosshairs for Pro-Russian Group Killnet

Dark Reading

Killnet calls on other groups to launch similar attacks against US civilian infrastructure, including marine terminals and logistics facilities, weather monitoring centers, and healthcare systems.

article thumbnail

Endor Labs offers dependency management platform for open source software

CSO Magazine

Endor Labs came out of stealth mode on Monday, launching its Dependency Lifecycle Management Platform, designed to ensure end-to-end security for open source software (OSS). The software addresses three key things—helping engineers select better dependencies , helping organizations optimize their engineering, and helping them reduce vulnerability noise.

Software 109
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Steam account stolen? Here’s how to get it back

We Live Security

Has your Steam account been hacked? Here are the signs to look for and what you can do to get your account back. The post Steam account stolen? Here’s how to get it back appeared first on WeLiveSecurity.

article thumbnail

Fortinet says critical auth bypass bug is exploited in attacks

Bleeping Computer

Fortinet has confirmed today that a critical authentication bypass security vulnerability patched last week is being exploited in the wild. [.].

article thumbnail

Cybersecurity is a Successfully Failure

Security Boulevard

Cybersecurity is a Successfully Failure. Next-generation firewalls are well, XDRing, IPS in prevention mode, and we had 100% attainment of our security awareness weekly training podcast. Yes, we even have email encryption of all outbound messages with complete data loss prevention enabled with multi-factor authentication! Hold on, didn’t we just deploy CASB for DLP?

article thumbnail

Social Engineering Strategies Used in Callback Phishing Attacks Are Evolving

Heimadal Security

The social engineering techniques used by callback phishing operations have developed: while they still use typical bogus subscription lures for the initial phase of the attack, they now flip to attempting to assist victims in dealing with a virus or hack. Victims are infected with a malware loader, which drops additional payloads such as remote […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Where Should You Go For Cybersecurity Guidelines?

Security Boulevard

It’s Cybersecurity Awareness Month – Here’s What Each Industry Should Know. Who is responsible for protecting clients, employees, and customers on the internet? Well, it depends. Educational institutions, healthcare organizations, governmental divisions, and businesses across all industries are all targets for cyberattacks. More and more organizations, of different sizes and different industries, are being caught in a crossfire of cyber.

article thumbnail

Hacktivist Groups Get Involved in Iranian Protests

Heimadal Security

Anonymous and other hacktivist groups have organized cyberattacks and are now engaged in a full-on assault on Iranian officials and institutions, joining the protesters on the ground in resistance to the country’s strict laws. As Internet access in Iran has been extremely limited in recent weeks, hackers are using apps such as Telegram to aid anti-government […].

Internet 105
article thumbnail

Caffeine service lets anyone launch Microsoft 365 phishing attacks

Bleeping Computer

A phishing-as-a-service (PhaaS) platform named 'Caffeine' makes it easy for threat actors to launch attacks, featuring an open registration process allowing anyone to jump in and start their own phishing campaigns. [.].

Phishing 104
article thumbnail

Leaked Alder Lake BIOS Source Code, Confirmed Authentic by Intel

Heimadal Security

On Friday, a Twitter account going by the handle “freak” shared links to what they claimed to be the UEFI firmware source code for Intel Alder Lake, which they claim was made available by 4chan. Intel confirms the source code leak for the UEFI BIOS is authentic. Alder Lake is the name of the company’s […]. The post Leaked Alder Lake BIOS Source Code, Confirmed Authentic by Intel appeared first on Heimdal Security Blog.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!