Tue.Oct 11, 2022

article thumbnail

Inserting a Backdoor into a Machine-Learning System

Schneier on Security

Interesting research: “ ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks , by Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, and Robert Mullins: Abstract : Early backdoor attacks against machine learning set off an arms race in attack and defence development. Defences have since appeared demonstrating some ability to detect backdoors in models or even remove them.

article thumbnail

Microsoft Patch Tuesday, October 2022 Edition

Krebs on Security

Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited. However, noticeably absent from this month’s Patch Tuesday are any updates to address a pair of zero-day flaws being exploited this past month in Microsoft Exchange Server.

DNS 339
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook warns of 400 malicious apps that tried to steal your account credentials

Tech Republic Security

Previously available on Apple’s App Store and Google Play, the phony apps impersonated photo editors, games, VPN services and utilities to trick users into sharing their Facebook credentials. The post Facebook warns of 400 malicious apps that tried to steal your account credentials appeared first on TechRepublic.

article thumbnail

Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike

Trend Micro

We analyzed a QAKBOT-related case leading to a Brute Ratel C4 and Cobalt Strike payload that can be attributed to the threat actors behind the Black Basta ransomware.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

9 top Dropbox alternatives: Free and premium tools

Tech Republic Security

If you're tired of Dropbox's hidden costs, here are some of the best alternatives to Dropbox that you can use today. The post 9 top Dropbox alternatives: Free and premium tools appeared first on TechRepublic.

Software 148
article thumbnail

LEAKED: Intel’s BIOS Source Code — All 6GB of It

Security Boulevard

Source code for the Intel Alder Lake processor EUFI BIOS has gone walkies. 4chan is said to be involved. The post LEAKED: Intel’s BIOS Source Code — All 6GB of It appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Data Transparency and its Impact on Customer Trust

Cisco Security

How do organizations earn and build trust when it comes to the personal data that customers share with them? Customers certainly expect these organizations to comply with all privacy laws that are now in place in more than 130 countries. Customers also expect them not to sell personal data without consent and to try to avoid data breaches that could expose personal data.

article thumbnail

LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware

Security Affairs

Lockbit ransomware affiliates are compromising Microsoft Exchange servers to deploy their ransomware, experts warn. South-Korean cybersecurity firm AhnLab reported that Lockbit ransomware affiliates are distributing their malware via compromised Microsoft Exchange servers. In July 2022, two servers operated by a customer of the security firm were infected with LockBit 3.0 ransomware. .

article thumbnail

Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched

Dark Reading

The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.

139
139
article thumbnail

VMware has yet to fix CVE-2021-22048 flaw in vCenter Server disclosed one year ago

Security Affairs

VMware has yet to address the CVE-2021-22048 privilege escalation vulnerability in vCenter Server disclosed in November 2021. VMware warns customers that it has yet to address a high-severity privilege escalation vulnerability, tracked as CVE-2021-22048 , in the vCenter Server. The flaw was disclosed in November 2021, it resides in the vCenter Server ‘s IWA (Integrated Windows Authentication) mechanism.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

POLONIUM targets Israel with Creepy malware

We Live Security

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group. The post POLONIUM targets Israel with Creepy malware appeared first on WeLiveSecurity.

Malware 138
article thumbnail

Google Pixel 7 and Pixel 7 Pro: The next evolution in mobile security

Google Security

Dave Kleidermacher, Jesse Seed, Brandon Barbello, Sherif Hanna, Eugene Liderman, Android, Pixel, and Silicon Security Teams Every day, billions of people around the world trust Google products to enrich their lives and provide helpful features – across mobile devices, smart home devices, health and fitness devices, and more. We keep more people safe online than anyone else in the world, with products that are secure by default, private by design and that put you in control.

Mobile 136
article thumbnail

Microsoft Exchange servers hacked to deploy LockBit ransomware

Bleeping Computer

Lockbit ransomware affiliates are encrypting victims via Microsoft Exchange servers hacked using exploits targeting unpatched vulnerabilities. [.].

Hacking 131
article thumbnail

Why Do You Need Ongoing Vulnerability Assessments?

CyberSecurity Insiders

[ This article was originally published here by Indusface.com ]. There are over 40,756 open vulnerabilities in applications – according to Indusface AppTrana, August-September 2022. 90% of all vulnerabilities are exploitable, even by attackers with little technical knowledge or skills. Given the circumstances, you need to build and maintain a sound security posture.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

All Windows versions can now block admin brute-force attacks

Bleeping Computer

Microsoft announced today that IT admins can now configure any Windows system still receiving security updates to automatically block brute force attacks targeting local administrator accounts via a group policy. [.].

article thumbnail

Hey CISO: You Need a Data-Driven Way to Navigate Budgeting Season

Security Boulevard

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Hey CISO: You Need a Data-Driven Way to Navigate Budgeting Season appeared first on Security Boulevard.

CISO 125
article thumbnail

Android leaks some traffic even when 'Always-on VPN' is enabled

Bleeping Computer

Mullvad VPN has discovered that Android leaks traffic every time the device connects to a WiFi network, even if the "Block connections without VPN," or "Always-on VPN," features is enabled. [.].

VPN 125
article thumbnail

Cloud security is the new battle zone

InfoWorld on Security

Don’t look now. More than 80% of organizations have experienced a security incident on a cloud platform during the past 12 months according to research from Venafi. Most concerning, almost half of those organizations reported at least four incidents during the same period. The study also shows that organizations encountered security incidents due to unauthorized access and misconfigurations.

125
125
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Behavioral Analytics in Cybersecurity: Does It Work as Advertised?

eSecurity Planet

In the ever-evolving fight against data loss , data breaches, and data theft in the 21st century, organizations worldwide have turned to a number of cybersecurity solutions, services, and software in an attempt to keep their data safe and secure from threats. One such solution is behavioral analytics, more specifically User and Entity Behavior Analytics (UEBA).

article thumbnail

This Thermal Attack Can Crack Your Password in Just a Few Seconds

Heimadal Security

Computer security researchers have developed a thermal attack technique combining thermal imaging and AI. It uses an AI-driven system that can guess your password by inspecting the heat signatures left by fingertips when entering data on keyboards and screens. This could discover computer or smartphone passwords in seconds, and it is a warning about how […].

Passwords 124
article thumbnail

Toyota Discloses Data Breach Impacting Source Code

Hacker Combat

Toyota, a Japanese automaker, has identified a security breach involving source code stored on GitHub that may have given third parties access to some 300,000 customer email addresses. According to the firm, the event affects users who subscribe to the T-Connect website. This service offers consumers automobile management tools like finding my car, maintenance reminders, concierge services, vehicle information, and a mobile application.

article thumbnail

How To Simplify Security With Cybersecurity Mesh Architecture

Tech Republic Security

As networks become more complex and distributed, detecting and responding to threats has become increasingly difficult. Case in point, today’s enterprises have deployed an average of 45 security solutions across their networks, making any sort of centralized management nearly impossible. And worse, detecting and responding to a cyber incident requires coordination across all these tools, The post How To Simplify Security With Cybersecurity Mesh Architecture appeared first on TechRepublic.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New to cookies? Here’s what you need to know (Part 1)

BH Consulting

If you’re a rookie when it comes to cookies, look no further. This two-part blog aims to explain what they are, and why we’re hearing so much about them these days. We’ll give a rundown of cookie requirements, consent, and what organisations must do to make sure their cookies comply with the EU GDPR (and why that matters). What are cookies? Cookies are small text files that organisations’ websites or apps place on your device as you’re browsing.

article thumbnail

Researchers Warn of New Phishing-as-a-Service Being Used by Cyber Criminals

The Hacker News

Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their attacks and distribute nefarious payloads.

Phishing 119
article thumbnail

Meta Published A List of 400+ Malicious Apps that Steal Log-in Information

Heimadal Security

In a recent press release, Meta shares with the public a list of over 400 malicious Android and iOS apps specifically designed to steal Facebook login information. The company has also disclosed its findings to Apple and Google to help affected users protect their accounts. These apps were listed on the Google Play Store and Apple’s App Store […].

article thumbnail

More Details of macOS Archive Utility Flaw Emerge

Security Boulevard

Now that Apple has addressed a vulnerability in its macOS Archive Utility that could run malicious apps around Apple security, security researchers have released additional details about the flaw. The vulnerability, designated CVE-2022-32910, “could lead to the execution of an unsigned and unnotarized application without displaying security prompts to the user, by using a specially.

Malware 116
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ransomware Group Uses Vulnerability to Bypass EDR Products

eSecurity Planet

The BlackByte ransomware group is actively exploiting a vulnerability in RTCore32.sys and RTCore64.sys, the drivers of a widely used graphic card utility called Micro-Star MSI AfterBurner (version 4.6.2.15658). Recorded as CVE-2019-16098 , the flaw allows any authenticated user to read and write to arbitrary memory, I/O ports and MSR control registers.

article thumbnail

Researchers Detail Critical RCE Flaw Reported in Popular vm2 JavaScript Sandbox

The Hacker News

A now-patched security flaw in the vm2 JavaScript sandbox module could be abused by a remote adversary to break out of security barriers and perform arbitrary operations on the underlying machine. "A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox," GitHub said in an advisory published on September 28, 2022.

113
113
article thumbnail

Google acquired Cloud companies now come under one Security umbrella

CyberSecurity Insiders

Google has launched Chronicle Security Operations to bring down its latest two acquisitions Mandiant and Siemplify under one umbrella. The internet juggernauts plan is to bring all its cybersecurity related purchases under one roof, so that its response to threats might pick up with speed, scale and intelligence. Chronicle Security Operations is a cloud-based software suite that was born on October 11th,2022 and is better enabled to respond to threats and investigate proactively.

article thumbnail

Major US Airports’ Sites Are Down, Pro-Russian Hackers Claim the Attack

Heimadal Security

The pro-Russian hacktivist group ‘KillNet’ claims large-scale distributed denial-of-service (DDoS) attacks on the websites of several major airports in the United States, making them inoperable. Travelers are unable to connect and receive updates about their scheduled flights or book airport services because the servers hosting these sites are being overloaded by garbage requests as a result […].

DDOS 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!