Tue.Aug 01, 2023

article thumbnail

Hacking AI Resume Screening with Text in a White Font

Schneier on Security

The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font. The idea is that the programs rely primarily on simple pattern matching, and the trick is to copy a list of relevant keywords—or the published job description—into the resume in a white font. The computer will process the text, but humans won’t see it.

Hacking 245
article thumbnail

News Alert: Devo, Cybermindz partner to improve mental health of cybersecurity pros in the U.S.

The Last Watchdog

Cambridge, Mass. – Aug. 1, 2023 – Devo Technology , the cloud-native security analytics company, today announced its financial support for Cybermindz, a not-for-profit organization dedicated to improving the mental health and well-being of cybersecurity professionals. Founded in Australia just over one year ago, Cybermindz entered the U.S. in April to expand its global reach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WikiLoader malware-as-a-service targets Italian organizations

Security Affairs

Threat actors are targeting Italian organizations with a phishing campaign aimed at delivering a new malware called WikiLoader. WikiLoader is a new piece of malware that is employed in a phishing campaign that is targeting Italian organizations. Threat actors behind the campaign are using WikiLoader to deliver a banking trojan, stealer, and malware such as Ursnif to the victims’ computers.

Malware 98
article thumbnail

News Alert: Guardz uncovers new macOS malware – Hidden Virtual Network Computing (hVNC)

The Last Watchdog

Tel Aviv, Israel, Aug. 1, 2023 – Guardz , the cybersecurity company securing and insuring SMEs, today disclosed the existence of a Hidden Virtual Network Computing (hVNC) malware targeting macOS devices. The malware, which is available on the major Russian dark web forum Exploit, allows cybercriminals to gain and maintain persistent unauthorized access to a victim’s Mac computer without being detected, and demonstrates the concerning emergence of a growing number of macOS-focused Attack

Malware 189
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

A New Attack Impacts ChatGPT—and No One Knows How to Stop It

WIRED Threat Level

Researchers found a simple way to make ChatGPT, Bard, and other chatbots misbehave, proving that AI is hard to tame.

article thumbnail

News Alert: Nile raises $175 million in series C funding to deliver network-as-a-service (NaaS)

The Last Watchdog

San Jose, Calif. – Aug.1, 2023 – Nile the leader in next-generation enterprise networks, today announced a $175 million Series C investment round co-led by March Capital and Sanabil Investments, with strategic participation from solutions by stc, Prosperity7, and Liberty Global Ventures, and contribution from 8VC, Geodesic Capital, FirstU Capital, and Valor Equity Partners.

Wireless 186

LifeWorks

More Trending

article thumbnail

News Alert: Lumu announces launch of new threat hunting service to come at Black Hat USA 2023

The Last Watchdog

Miami, Fla., Aug 1, 2023 –? Lumu , the creators of the Continuous Compromise Assessment cybersecurity model that empowers organizations to measure compromise in real time, will debut Lumu for Threat Hunting at the Black Hat USA 2023. Lumu for Threat Hunting goes a step further than traditional cybersecurity tools by using automation to continuously monitor networks and point out unusual activity.

article thumbnail

NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets

Security Affairs

Researchers spotted a Python variant of the NodeStealer that was designed to take over Facebook business accounts and cryptocurrency wallets. Palo Alto Network Unit 42 discovered a previously unreported phishing campaign that distributed a Python variant of the NodeStealer. The malicious code was designed to take over Facebook business accounts and steal funds from cryptocurrency wallets.

article thumbnail

News Alert: AppViewX – EMA study finds 79 percent of SSL/TLS certificates vulnerable to MiTM attacks

The Last Watchdog

New York, NY, Aug. 1, 2023– AppViewX , a leader in automated machine identity management (MIM) and application infrastructure security, today announced the results of a research study conducted by Enterprise Management Associates (EMA) on SSL/TLS Certificate Security. The survey found that nearly 80% of TLS certificates on the Internet are vulnerable to Man in the Middle (MiM) attacks, while as many as 25% of all certificates are expired at any given time.

Internet 100
article thumbnail

CISA adds second Ivanti EPMM flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added the second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM, formerly MobileIron Core) vulnerability, tracked as CVE-2023-35081 , to its Known Exploited Vulnerabilities Catalog. “The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber S

Mobile 98
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How AI May Be Used to Create Custom Disinformation Ahead of 2024

WIRED Threat Level

Generative AI won't just flood the internet with more lies—it may also create convincing disinformation that's targeted at groups or even individuals.

article thumbnail

Apple Users Open to Remote Control via Tricky macOS Malware

Dark Reading

The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots.

Malware 98
article thumbnail

Experts Sound Alarm on Critical Cloud Security Risks

SecureWorld News

The accelerated adoption of cloud computing over the past decade has unlocked new levels of business agility, scalability, and cost efficiency. However, security has struggled to keep up with the rapid pace of cloud innovation. Misconfigurations, vulnerable services, advanced malware, and sheer scale have opened cracks in cloud security. A new report from Qualys highlights critical security issues organizations face as they adopt cloud computing models.

Risk 98
article thumbnail

Public companies must now disclose breaches within 4 days

Malwarebytes

Public organisations in the US impacted by a cyberattack will now have to disclose it within four days…with some caveats attached. On Wednesday, new rules were approved by the US Securities and Exchange Commission (SEC). These rules mean that publicly traded companies will need to reveal said attack details in cases where it had a “material impact” on their finances.

Risk 98
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Report: Cyber Insurance Not Driving Ransomware Market

SecureWorld News

It is no secret that ransomware attacks have been on the rise in recent years and have caused a significant amount of pain to organizations worldwide. One aspect of these cyberattacks that has been hotly debated is the role that cybersecurity insurance plays in these incidents. To better understand the relationship between insurance and ransomware, U.K.

article thumbnail

World Wide Web Day: What is Digital Identity?

GlobalSign

A celebration of World Wide Web Day and why protecting digital identity is important.

98
article thumbnail

Canon Advises Users to Reset Wi-Fi Settings When Discarding Inkjet Printers

Heimadal Security

Canon is cautioning users of home, office, and large format inkjet printers that their devices’ Wi-Fi connection settings are not properly wiped during initialization, posing a security and privacy risk. This flaw could potentially allow unauthorized individuals, such as repair technicians, temporary users, or future buyers, to access sensitive Wi-Fi network details stored in the […] The post Canon Advises Users to Reset Wi-Fi Settings When Discarding Inkjet Printers appeared first o

Risk 98
article thumbnail

Best Cybersecurity and IT Outsourcing Options

eSecurity Planet

No one can be an expert at everything, and very few organizations can afford to hire experts in every facet of information technology (IT). Yet without a solid foundation of IT fundamentals, even the most capable cybersecurity tools and experts will be undermined. To ensure robust IT and security capabilities, most organizations turn to outsourcing to provide a wide variety of solutions to satisfy their even wider variety of outsourcing needs.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Fake Android App Used to Exfiltrate Signal and WhatsApp User Data

Heimadal Security

A fake Android app called ‘SafeChat’ is used by malicious actors to infect devices with spyware malware that allows them to steal call logs, text messages, and GPS locations from phones. The spyware appears to be a variant of “Coverlm,” known for its ability to steal data from communications apps such as Telegram, Signal, WhatsApp, […] The post Fake Android App Used to Exfiltrate Signal and WhatsApp User Data appeared first on Heimdal Security Blog.

Spyware 98
article thumbnail

Balbix Ties CIS Benchmarks to Cybersecurity Risk Quantification

Security Boulevard

Balbix makes it simpler for organizations to determine the degree to which their assets are outside the scope of best practices recommended by a CIS assessment. The post Balbix Ties CIS Benchmarks to Cybersecurity Risk Quantification appeared first on Security Boulevard.

Risk 98
article thumbnail

New SEC Regulations: US Businesses Must Report Cyberattacks within 4 Days

Heimadal Security

The U.S. Securities and Exchange Commission (SEC) has approved new rules requiring publicly traded companies to disclose cyberattack details within four days of identifying a “material” impact on their finances, signaling a significant change in breach disclosure practices. SEC Chair Gary Gensler emphasized the need for consistent, comparable, and decision-useful cybersecurity disclosure to benefit companies […] The post New SEC Regulations: US Businesses Must Report Cyberattac

article thumbnail

Digital Certificates Riddled With Security Weaknesses

Security Boulevard

A study published today found 79% of certificates on the internet are vulnerable to man-in-the-middle (MitM) attacks, with as many as 10% expired or self-signed (15%) in a way that is considered insecure. The study, conducted by Enterprise Management Associates on behalf of AppViewX, a provider of automated machine identity management (MIM) and application infrastructure.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Norwegian Entities Targeted in Ongoing Attacks Exploiting Ivanti EPMM Vulnerability

The Hacker News

Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) as a zero-day since at least April 2023 in attacks directed against Norwegian entities, including a government network.

Mobile 97
article thumbnail

Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers

Security Boulevard

The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Grammatech. The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Security Boulevard.

article thumbnail

Managing Deliveries on the Go: Top Apps for Delivery Professionals

SecureBlitz

This post will show you the top apps for delivery professionals… In the fast-paced world of delivery services, efficient management is key to ensuring timely and successful deliveries. Delivery professionals face a myriad of challenges, from optimizing routes to staying connected with customers and dispatchers on the go. Fortunately, technology comes to the rescue with […] The post Managing Deliveries on the Go: Top Apps for Delivery Professionals appeared first on SecureBlitz Cybers

article thumbnail

Zero Trust for Virtual Infrastructure

Security Boulevard

Ask any CIO or CISO today what they are doing to protect their organization from. The post Zero Trust for Virtual Infrastructure appeared first on Entrust Blog. The post Zero Trust for Virtual Infrastructure appeared first on Security Boulevard.

CISO 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark Web

Dark Reading

The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.

Malware 95
article thumbnail

News Alert: Devo, Cybermindz partner to improve mental health of cybersecurity pros in the U.S.

Security Boulevard

Cambridge, Mass. – Aug. 1, 2023 – Devo Technology , the cloud-native security analytics company, today announced its financial support for Cybermindz, a not-for-profit organization dedicated to improving the mental health and well-being of cybersecurity professionals. Founded in Australia just … (more…) The post News Alert: Devo, Cybermindz partner to improve mental health of cybersecurity pros in the U.S. appeared first on Security Boulevard.

article thumbnail

China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

The Hacker News

A nation-state actor with links to China is suspected of being behind a series of attacks against industrial organizations in Eastern Europe that took place last year to siphon data stored on air-gapped systems.

Hacking 95
article thumbnail

MDR firm saves $100K per year with LimaCharlie

Security Boulevard

Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. After switching from their custom-engineered security stack to the LimaCharlie SecOps Cloud Platform, they achieved an annual cost savings of $100,000, improved their mean detection and response times by 98%, and laid the groundwork for scalable, long-term growth.

InfoSec 97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!