Mon.Nov 07, 2022

article thumbnail

The Conviction of Uber’s Chief Security Officer

Schneier on Security

I have been meaning to write about Joe Sullivan, Uber’s former Chief Security Officer. He was convicted of crimes related to covering up a cyberattack against Uber. It’s a complicated case, and I’m not convinced that he deserved a guilty ruling or that it’s a good thing for the industry. I may still write something, but until then, this essay on the topic is worth reading.

article thumbnail

6 ways to reduce your IoT attack surface

Tech Republic Security

As attackers target the ever-growing IoT attack surface, companies can reduce their risks with these six security best practices. The post 6 ways to reduce your IoT attack surface appeared first on TechRepublic.

IoT 217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mastodon now has over 1 million users amid Twitter tensions

Bleeping Computer

Mastodon, the free, open-source, decentralized micro-blogging social media platform, has surpassed a million monthly active users for the first time in its history. [.].

Media 144
article thumbnail

Twitter’s Ex-Election Chief Is Worried About the US Midterms

WIRED Threat Level

Edward Perez says that “manufactured chaos” by bad actors will be even riskier thanks to Elon Musk’s own mayhem.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

REMnux: The Linux Toolkit for Reverse Engineering and Malware Analysis

eSecurity Planet

REMnux is a free community distribution that ethical hackers, security researchers, and many other security pros can leverage to build their own labs and speed up malware analysis. Whether you’re new to these specialties or an experienced investigator, REMnux contains many helpful Debian packages and configurations to perform advanced tasks, such as: Extracting IoCs (Indicators of Compromise) Disassembling/decompiling binaries or windows executables (such as PE files) Decoding, deobfuscating, de

article thumbnail

Safely Test Your Malware, Ransomware and Virus Defenses

Security Boulevard

What’s the best way for a company to test its malware defenses in real-life scenarios? The past few years have seen both an uptick in cyberattacks and a dire shortage of security talent. In fact, a 2017 report predicted that by 2020 businesses will be hit by a threat actor every eleven seconds. Not to. The post Safely Test Your Malware, Ransomware and Virus Defenses appeared first on Security Boulevard.

Malware 134

LifeWorks

More Trending

article thumbnail

Robin Banks Relocated to a Russian Server

Heimadal Security

The cybercriminals behind Robin Bank have relocated the phishing-as-a-service (PhaaS) platform to a Russian hosting service. DDoS-Guard takes over from Cloudflare after the latest caused a multi-day disruption of Robin Bank operations by distancing its services from the phishing infrastructure. The Russian rock-solid hosting provider previously hosted the alt-tech social network Parler as well as […].

Banking 130
article thumbnail

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

CSO Magazine

Organizations that want to prove to others – and to themselves – that they have a solid cybersecurity and data privacy program will undergo a SOC 2 audit. As such, a SOC 2 audit is a big deal, and it’s demanding, and it requires some serious preparation. SOC audits were created by the American Institute of CPAs (AICPA) under several evaluation and reporting frameworks comprising the System and Organization Controls headers SOC 1, SOC 2, and SOC 3.Although each of those holds value, many organiza

article thumbnail

All UK Hosted Internet Devices Will be Scanned by the British Government

Heimadal Security

The United Kingdom’s National Cyber Security Centre (NCSC), the government agency leading UK’s cybersecurity mission, will start scanning all the Internet-exposed devices hosted in the UK. In a statement posted on its official website, the NCSC declared that this operation will help them better understand the country’s vulnerability and security.

Internet 126
article thumbnail

Public URL scanning tools – when security leads to insecurity

Naked Security

Never make your users cry/By how you use an API.

126
126
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

SHARED INTEL: The non-stop advance and diversification of ransomware extortion tactics

The Last Watchdog

Cybercriminals are becoming more creative as cybersecurity analysts adapt quickly to new ransomware strategies. Related: How training can mitigate targeted attacks. Ransomware has evolved from classic attacks to more innovative approaches to navigate reinforced security infrastructure. Here’s how hackers crafting new ransomware extortion tactics to keep analysts on their toes: Data exfiltration is no more.

article thumbnail

Microsoft WinGet package manager failing due to CDN issues

Bleeping Computer

Microsoft's WinGet package manager is currently having problems installing or upgrading packages due to the Azure Content Delivery Network (CDN) returning a 0-byte database file. [.].

124
124
article thumbnail

The Role of Cybersecurity in Accounting

Heimadal Security

It comes as no surprise that cybersecurity is one of the most important topics in this hacker-prone Internet era. A large number of cyber attacks occur every day and they have no regard for large corporations or individuals. Ransomware inflicts significant financial harm. Businesses are now hiring certified cybersecurity experts to aid them in identifying flaws […].

article thumbnail

Voices from Validate – Simplifying Posture Management

Security Boulevard

Learn from Zscaler how zero trust, MITRE ATT&CK, and BAS can work together to optimize security posture across complex environments. The post Voices from Validate – Simplifying Posture Management appeared first on SafeBreach. The post Voices from Validate – Simplifying Posture Management appeared first on Security Boulevard.

119
119
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Hacking baby monitors can be child’s play: Here’s how to stay safe

We Live Security

Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk. The post Hacking baby monitors can be child’s play: Here’s how to stay safe appeared first on WeLiveSecurity.

Hacking 117
article thumbnail

DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework

Trend Micro

This report provides defenders and security operations center teams with the technical details they need to know should they encounter the DeimosC2 C&C framework.

article thumbnail

Threat Group Continuously Updates Malware to Evade Antivirus Software

eSecurity Planet

Kaspersky researchers recently found evidence of an advanced threat group continuously updating its malware to evade security products, similar to a release cycle for developers. Kaspersky revealed that APT10, also known as the Cicada hacking group, has successfully deployed the LODEINFO malware in government, media, public sector, and diplomatic organizations in Japan.

Antivirus 117
article thumbnail

China is targeting smaller nations with Cyber Attacks

CyberSecurity Insiders

Microsoft released its Digital Defense Report of 2022, in which it clearly specified that China was targeting smaller nations with intense digital attacks to gather intelligence via cyber espionage. Its actual aim behind this activity is to internationally strengthen the nation’s stand both economically and to attain an utmost position in military influence.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Twitter $8 Fee Exploited by Cybercriminals

Heimadal Security

As Elon Musk took charge of Twitter`s management, there have been some controversial changes implemented, one of them being the $8 a month fee for Twitter Blue and account verification. Other than receiving the famous blue tick, paid users will get priority in replies, mentions & search, fewer ads, and the ability to post longer content. However, […].

article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

By Michael DeCesare, CEO & President, Exabeam. As the digital economy grows, organizations have become increasingly susceptible to cyberattacks. Adversaries actively seek opportunities to exploit gaps within IT systems, applications, or hardware, causing trillions of dollars worth of damage annually. As a result, security teams are leveraging security capabilities in the form of Security Information and Event Management (SIEM) software to help identify and respond to security threats in real

Marketing 116
article thumbnail

OpenText Security Solutions 2022 Global SMB Ransomware Survey: Fighting More… with Less

Webroot

Small and medium-size business (SMB) leaders have a lot on their minds. The looming recession and inflation have created financial uncertainty. Meanwhile, the global rise in sophisticated ransomware threats and geo-political tensions are escalating cyber threats. With so many factors and pressures at play, how are SMBs navigating this challenging business landscape while fighting back against cybercriminals?

article thumbnail

Security myths of Smart Phones debunked

CyberSecurity Insiders

Smart Phones have become a necessity in our lives. But still half of such device users do not know the basics of mobile security and all that revolves around it. In this article, we will try to bust some of the common myths and misconceptions that are circling around smart phones and their usage. Computers are secure than smart phones – If that was the case, then why the former encountered more malware attacks in the year 2020-21 and why is that the latter is not been used for only communi

VPN 115
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ukraine’s Response to Cyber Threats a Model in DDoS Prevention

Security Boulevard

With the disruption, loss of life and heartbreaking images that the Russia-Ukraine conflict has produced, it is easy to overlook what it has meant to the cyber threat landscape. Even threat actors have taken sides. The post Ukraine’s Response to Cyber Threats a Model in DDoS Prevention appeared first on Radware Blog. The post Ukraine’s Response to Cyber Threats a Model in DDoS Prevention appeared first on Security Boulevard.

article thumbnail

Continental, the Newest Victim of LockBit Ransomware

Heimadal Security

LockBit, one of the most notorious ransomware gangs around, is claiming responsibility for a cyberattack that hit the German auto parts giant Continental. The ransomware gang allegedly stole some data from the company’s systems and is now threatening to make the data publicly available if their demands are not met by Continental. LockBit has yet […].

article thumbnail

CISOs, Security Leaders Eyeing Other Job Options 

Security Boulevard

Nearly a third of CISOs or IT security leaders in the United States and the United Kingdom are considering leaving their current role, according to research by BlackFog. Of those considering leaving their current role, a third of those would do so within the next six months, according to the survey, which polled more than 500 IT. The post CISOs, Security Leaders Eyeing Other Job Options appeared first on Security Boulevard.

CISO 111
article thumbnail

What Is Encrypted DNS Traffic?

Heimadal Security

Encrypted DNS traffic is a type of DNS traffic secured in a way that no third party can intervene during a DNS resolution (the process of translating a domain name into an IP address). This means that no one can intercept the data changed during a DNS request, so the names of the websites and […]. The post What Is Encrypted DNS Traffic? appeared first on Heimdal Security Blog.

DNS 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What are message queues? | Importance, use cases and vulnerabilities | Contrast Security

Security Boulevard

Many significant concerns arise while developing modern-day applications in the cloud, including uptime, geographic distribution and scalability. Adopting application architectures based on event-driven microservices helps resolve these concerns and enables us to scale different services independently. However, event-based microservices present significant challenges, including communication between these services.

article thumbnail

BrandPost: Managed Security Services Can Relieve the Cybersecurity Skills Gap

CSO Magazine

The skills gap facing cybersecurity is an ongoing issue that has plagued the industry for years. Recent research from (ISC)2 finds the global cybersecurity workforce needs to grow 65% to effectively defend organizations’ critical assets, requiring a massive influx of 2.7 million professionals to meet demand. The (ISC)2’s Cybersecurity Workforce Study also found the workforce gap remains the #1 barrier to meeting security needs, and 60% of participants feel that a cybersecurity staffing shortag

article thumbnail

How DevOps Drive Business Growth?

Security Boulevard

The world of information technology is constantly advancing. As time passes, technological tools, trends, and usage behavior change. Integration of DevOps within development infrastructure is one of today’s most popular ideas, which the majority of IT firms are embracing. DevOps, to put it simply, is the integration of services offered by development and operations teams. […].

article thumbnail

New AI Technology can lead to privacy invasion of human minds

CyberSecurity Insiders

Scientists from the University of Texas have developed a new AI model that can scan brains and read minds. It was developed with a hardship of over 7-years with an aim to help read the minds of people who cannot speak. The technology behind this new mode of communication decoding is called Functional Magnetic Resonance Imaging (fMRI) that conceptualizes arbitrary stimuli that a person’s brain is grasping or analyzing as a natural language in real-time.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!