Tue.Aug 01, 2023

article thumbnail

Hacking AI Resume Screening with Text in a White Font

Schneier on Security

The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font. The idea is that the programs rely primarily on simple pattern matching, and the trick is to copy a list of relevant keywords—or the published job description—into the resume in a white font. The computer will process the text, but humans won’t see it.

Hacking 222
article thumbnail

News Alert: Devo, Cybermindz partner to improve mental health of cybersecurity pros in the U.S.

The Last Watchdog

Cambridge, Mass. – Aug. 1, 2023 – Devo Technology , the cloud-native security analytics company, today announced its financial support for Cybermindz, a not-for-profit organization dedicated to improving the mental health and well-being of cybersecurity professionals. Founded in Australia just over one year ago, Cybermindz entered the U.S. in April to expand its global reach.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple Users Open to Remote Control via Tricky macOS Malware

Dark Reading

The Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots.

Malware 98
article thumbnail

News Alert: Nile raises $175 million in series C funding to deliver network-as-a-service (NaaS)

The Last Watchdog

San Jose, Calif. – Aug.1, 2023 – Nile the leader in next-generation enterprise networks, today announced a $175 million Series C investment round co-led by March Capital and Sanabil Investments, with strategic participation from solutions by stc, Prosperity7, and Liberty Global Ventures, and contribution from 8VC, Geodesic Capital, FirstU Capital, and Valor Equity Partners.

Wireless 186
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Balbix Ties CIS Benchmarks to Cybersecurity Risk Quantification

Security Boulevard

Balbix makes it simpler for organizations to determine the degree to which their assets are outside the scope of best practices recommended by a CIS assessment. The post Balbix Ties CIS Benchmarks to Cybersecurity Risk Quantification appeared first on Security Boulevard.

Risk 98
article thumbnail

News Alert: Lumu announces launch of new threat hunting service to come at Black Hat USA 2023

The Last Watchdog

Miami, Fla., Aug 1, 2023 –? Lumu , the creators of the Continuous Compromise Assessment cybersecurity model that empowers organizations to measure compromise in real time, will debut Lumu for Threat Hunting at the Black Hat USA 2023. Lumu for Threat Hunting goes a step further than traditional cybersecurity tools by using automation to continuously monitor networks and point out unusual activity.

More Trending

article thumbnail

News Alert: AppViewX – EMA study finds 79 percent of SSL/TLS certificates vulnerable to MiTM attacks

The Last Watchdog

New York, NY, Aug. 1, 2023– AppViewX , a leader in automated machine identity management (MIM) and application infrastructure security, today announced the results of a research study conducted by Enterprise Management Associates (EMA) on SSL/TLS Certificate Security. The survey found that nearly 80% of TLS certificates on the Internet are vulnerable to Man in the Middle (MiM) attacks, while as many as 25% of all certificates are expired at any given time.

Internet 100
article thumbnail

Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers

Security Boulevard

The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Grammatech. The post Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers appeared first on Security Boulevard.

article thumbnail

Cybercriminals train AI chatbots for phishing, malware attacks

Bleeping Computer

In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called FraudGPT has emerged, and at least another one is under development that is allegedly based on Google's AI experiment, Bard. [.

article thumbnail

Zero Trust for Virtual Infrastructure

Security Boulevard

Ask any CIO or CISO today what they are doing to protect their organization from. The post Zero Trust for Virtual Infrastructure appeared first on Entrust Blog. The post Zero Trust for Virtual Infrastructure appeared first on Security Boulevard.

CISO 98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark Web

Dark Reading

The DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the whole of the cyber-underground knowledge base.

Malware 95
article thumbnail

News Alert: Devo, Cybermindz partner to improve mental health of cybersecurity pros in the U.S.

Security Boulevard

Cambridge, Mass. – Aug. 1, 2023 – Devo Technology , the cloud-native security analytics company, today announced its financial support for Cybermindz, a not-for-profit organization dedicated to improving the mental health and well-being of cybersecurity professionals. Founded in Australia just … (more…) The post News Alert: Devo, Cybermindz partner to improve mental health of cybersecurity pros in the U.S. appeared first on Security Boulevard.

article thumbnail

Be aware of exposure of sensitive data on Wi-Fi settings for Canon inkjet printers

Security Affairs

Canon warns that sensitive data on the Wi-Fi connection settings stored in the memories of inkjet printers may not be deleted during initialization. Canon warns that sensitive information on the Wi-Fi connection settings stored in the memories of home and office/large format inkjet printers may not be deleted by the usual initialization process. When a printer may be in the hand of any third party, such as when repairing, lending, selling or disposing the device, the users’ info may be exp

article thumbnail

Human-Assisted CAPTCHA

Security Boulevard

Human-Assisted CAPTCHA-Cracking Now at Play in Bot Attacks Human solvers are now working in collusion with automated attacks to deliver an even greater threat to anti-bot puzzles. The arms race between security measures and cybercriminal tactics has taken an alarming turn with the rise of human CAPTCHA solvers aiding malicious activities. Originally designed to separate […] The post Human-Assisted CAPTCHA appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Public companies must now disclose breaches within 4 days

Malwarebytes

Public organisations in the US impacted by a cyberattack will now have to disclose it within four days…with some caveats attached. On Wednesday, new rules were approved by the US Securities and Exchange Commission (SEC). These rules mean that publicly traded companies will need to reveal said attack details in cases where it had a “material impact” on their finances.

Risk 95
article thumbnail

LogRhythm Hosts First Asia-Pacific Partner Tech University, Empowering Participants to Deliver Effectively

Security Boulevard

Close to 100 participants across over 30 partner organisations in the region participated in the two-day event. SINGAPORE, August 1, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy insights, today announced… The post LogRhythm Hosts First Asia-Pacific Partner Tech University, Empowering Participants to Deliver Effectively appeared first on LogRhythm.

95
article thumbnail

Retail chain Hot Topic discloses wave of credential-stuffing attacks

Bleeping Computer

American apparel retailer Hot Topic is notifying customers about multiple cyberattacks between February 7 and June 21 that resulted in exposing sensitive information to hackers. [.

Retail 91
article thumbnail

WikiLoader malware-as-a-service targets Italian organizations

Security Affairs

Threat actors are targeting Italian organizations with a phishing campaign aimed at delivering a new malware called WikiLoader. WikiLoader is a new piece of malware that is employed in a phishing campaign that is targeting Italian organizations. Threat actors behind the campaign are using WikiLoader to deliver a banking trojan, stealer, and malware such as Ursnif to the victims’ computers.

Malware 95
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CISA issues new warning on actively exploited Ivanti MobileIron bugs

Bleeping Computer

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of state hackers exploiting two flaws in Ivanti's Endpoint Manager Mobile (EPMM), formerly MobileIron Core, since April. [.

Mobile 89
article thumbnail

NodeStealer 2.0 takes over Facebook Business accounts and targets crypto wallets

Security Affairs

Researchers spotted a Python variant of the NodeStealer that was designed to take over Facebook business accounts and cryptocurrency wallets. Palo Alto Network Unit 42 discovered a previously unreported phishing campaign that distributed a Python variant of the NodeStealer. The malicious code was designed to take over Facebook business accounts and steal funds from cryptocurrency wallets.

article thumbnail

How AI May Be Used to Create Custom Disinformation Ahead of 2024

WIRED Threat Level

Generative AI won't just flood the internet with more lies—it may also create convincing disinformation that's targeted at groups or even individuals.

article thumbnail

CISA adds second Ivanti EPMM flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added the second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM, formerly MobileIron Core) vulnerability, tracked as CVE-2023-35081 , to its Known Exploited Vulnerabilities Catalog. “The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber S

Mobile 93
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Norwegian Entities Targeted in Ongoing Attacks Exploiting Ivanti EPMM Vulnerability

The Hacker News

Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) as a zero-day since at least April 2023 in attacks directed against Norwegian entities, including a government network.

Mobile 85
article thumbnail

USB Security: How to Prevent Data Loss and Stop Malware

Digital Guardian

Graeme Batsman, a Senior Security Consultant with Fortra’s Professional Services team, gives a primer on all things USB: How to limit data ingress, egress, and other technical controls that can be implemented to mitigate risk.

Malware 86
article thumbnail

Threat actors abuse Google AMP for evasive phishing attacks

Bleeping Computer

Security researchers are warning of increased phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures and get to inboxes of enterprise employees. [.

article thumbnail

Canon Advises Users to Reset Wi-Fi Settings When Discarding Inkjet Printers

Heimadal Security

Canon is cautioning users of home, office, and large format inkjet printers that their devices’ Wi-Fi connection settings are not properly wiped during initialization, posing a security and privacy risk. This flaw could potentially allow unauthorized individuals, such as repair technicians, temporary users, or future buyers, to access sensitive Wi-Fi network details stored in the […] The post Canon Advises Users to Reset Wi-Fi Settings When Discarding Inkjet Printers appeared first o

Risk 83
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

The Hacker News

A nation-state actor with links to China is suspected of being behind a series of attacks against industrial organizations in Eastern Europe that took place last year to siphon data stored on air-gapped systems.

Hacking 81
article thumbnail

Hackers use new malware to breach air-gapped devices in Eastern Europe

Bleeping Computer

Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems. [.

Malware 94
article thumbnail

Fake Android App Used to Exfiltrate Signal and WhatsApp User Data

Heimadal Security

A fake Android app called ‘SafeChat’ is used by malicious actors to infect devices with spyware malware that allows them to steal call logs, text messages, and GPS locations from phones. The spyware appears to be a variant of “Coverlm,” known for its ability to steal data from communications apps such as Telegram, Signal, WhatsApp, […] The post Fake Android App Used to Exfiltrate Signal and WhatsApp User Data appeared first on Heimdal Security Blog.

Spyware 83
article thumbnail

European Bank Customers Targeted in SpyNote Android Trojan Campaign

The Hacker News

Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of an aggressive campaign detected in June and July 2023.

Banking 81
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.