Wed.Sep 21, 2022

article thumbnail

Automatic Cheating Detection in Human Racing

Schneier on Security

This is a fascinating glimpse of the future of automatic cheating detection in sports: Maybe you heard about the truly insane false-start controversy in track and field? Devon Allen—a wide receiver for the Philadelphia Eagles—was disqualified from the 110-meter hurdles at the World Athletics Championships a few weeks ago for a false start.

311
311
article thumbnail

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The Last Watchdog

The pace and extent of digital transformation that global enterprise organizations have undergone cannot be overstated. Related: The criticality of ‘attack surface management’ Massive global macro-economic shifts have fundamentally changed the way companies operate. Remote work already had an impact on IT strategy and the shift to cloud, including hybrid cloud , well before the onset of Covid 19.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Uber exposes Lapsus$ extortion group for security breach

Tech Republic Security

In last week’s security breach against Uber, the attackers downloaded internal messages from Slack as well as information from a tool used to manage invoices. The post Uber exposes Lapsus$ extortion group for security breach appeared first on TechRepublic.

article thumbnail

GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’

The Last Watchdog

Cybersecurity is a top concern for individuals and businesses in the increasingly digital world. Billion-dollar corporations, small mom-and-pop shops and average consumers could fall victim to a cyberattack. Related: Utilizing humans as security sensors. Phishing is one of the most common social engineering tactics cybercriminals use to target their victims.

Phishing 198
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Energy bill rebate scams spread via SMS and email

Graham Cluley

The UK’s National Cyber Security Centre (NCSC) has warned that fraudsters are sending out emails and SMS texts urging homeowners to sign up for a discount on their energy bills.

Scams 145
article thumbnail

Data Security Training Needs an Update

CyberSecurity Insiders

By Robert Fleming, Chief Marketing Officer at Zivver. Employees are constantly overloaded with the ‘we need to be more secure’ mantra from their employers but, as found in our recent report, out of the 67% of employees who had security training in the last two years, only 36% applied these tips and techniques to their core role. This means one thing: security training alone isn’t getting the job done.

LifeWorks

More Trending

article thumbnail

Data security laxity makes Morgan Stanley pay $35 million SEC Penalty

CyberSecurity Insiders

Morgan Stanley, the world-renowned American firm that is into the business of financial investment, was slapped with a fine of $35 million by US SEC. And sources report that the penalty was pronounced by the US Securities and Exchange Commission for showing laxity in dealing with customer data. Going deep into the details, it’s learned that the company disposed of some of the company servers and Hard Disk Drives (HDDS) operated in its server farms last year.

article thumbnail

Vulnerability Intelligence Roundup: Five RCE Vulnerabilities to Prioritize in September

Digital Shadows

If you have ever watched a movie or television show that depicted hacking, you have probably heard the phrase, “I’m. The post Vulnerability Intelligence Roundup: Five RCE Vulnerabilities to Prioritize in September first appeared on Digital Shadows.

Hacking 125
article thumbnail

Fake Zoom Sites Deploying Vidar Malware

Heimadal Security

Cyble Research and Intelligence Labs (CRIL) discovered multiple fake Zoom sites created to spread malware among Zoom users. The sites were created with a similar user interface and disguised the malware as Zoom’s legitime application. The whole discovery was triggered by a tweet mentioning the apparition of those sites: Malware @Zoom downloads ?? /zoom-download.host /zoom-download.space […].

Malware 122
article thumbnail

Malware related news headlines trending on Google

CyberSecurity Insiders

First is the news about Hive Ransomware targeting the New York Racing Association (NYRA) on 30th of June this year that resulted in disruption of IT services, including the website. Interestingly, the accessed records by the threat actors include health info, health insurance records, Social Security Numbers, and Driving License numbers of customers.

Malware 121
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Quick Heal Supports Windows 11 version 22H2

Quick Heal Antivirus

Microsoft has recently come up with a new update called Windows 11 22H2. The below article highlights. The post Quick Heal Supports Windows 11 version 22H2 appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Antivirus 119
article thumbnail

Top 5 attack surface challenges related to security operations

CSO Magazine

According to newly published ESG research , just over half of all organizations (52%) say that security operations are more difficult today than they were two years ago. When asked why, 41% pointed to an evolving and dangerous threat landscape, 38% identified a growing and changing attack surface, 37% said that alert volume and complexity are driving this change, and 34% blamed growing use of public cloud computing services.

article thumbnail

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Dark Reading

It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services.

Passwords 116
article thumbnail

Fingerprints are awesome, until they’re not

Javvad Malik

I’m filing this one under I’m a bit cynical about it. According to this story there have been a bunch of people who have paid to have their fingerprints surgically altered. Some of the people were workers in Kuwait who had been deported for criminal activity. By having their fingerprints altered, and a new identity created in the Indian ID system Aadhaar, they were able to apply for a new visa to Kuwait.

113
113
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

U.S. gov adds more Chinese Telecom firms to the Covered List

Security Affairs

The U.S. Federal Communications Commission (FCC) has added more Chinese telecom firms to the Covered List. The U.S. Federal Communications Commission (FCC) has added Pacific Network Corp, ComNet (USA) LLC, and China Unicom (Americas) Operations Limited, to the Covered List. The Covered List, published by Public Safety and Homeland Security Bureau published, included products and services that could pose an unacceptable risk to the national security of the United States or the security and safety

article thumbnail

Heimdal® Named Expert Insights Fall 2022 “Best-Of” Winner in Four Categories

Heimadal Security

Copenhagen, September 20th, 2022 – Heimdal® has been named one of the Best-Of award winners by Expert Insights for our cybersecurity solutions. The awards recognize the most innovative and effective solutions that provide powerful benefits to their users, across multiple B2B cloud software categories. Heimdal has been awarded a Fall 2022 Expert Insights “Best-Of” award in four […].

B2B 105
article thumbnail

What we’re reading this month: September 2022

Digital Shadows

In this months episode of the what we’re reading series, we deep dive into an investigation into Russia’s military intelligence. The post What we’re reading this month: September 2022 first appeared on Digital Shadows.

article thumbnail

How to Create a Successful Cybersecurity Strategy

Heimadal Security

Ever wondered what are the main elements of an effective cybersecurity strategy? In today’s article, I’m going to describe all the aspects that I consider mandatory in order to stay one step (or more) ahead of cybercriminals in an ever-evolving cyberthreat landscape. What Is a Cybersecurity Strategy? A cybersecurity strategy is an organizational plan designed […].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Russian Sandworm APT impersonates Ukrainian telcos to deliver malware

Security Affairs

Russia-linked APT group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Russia-linked cyberespionage group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Multiple security firms have reported that the Sandworm APT continues to target Ukraine with multiple means, including custom malware and botnet like Cyclops Blink.

Malware 105
article thumbnail

2K Games’ Help Deck Platform Hacked

Heimadal Security

American video game publishing house 2K Games confirms that they have been the victims of a cyberattack. The hackers targeted 2K’s help desk platform and used it to reach customers with fake support tickets, pushing malware through embedded links. 2K’s support account took to Twitter to address the ongoing situation after BleepingComputer broke the story […].

Hacking 104
article thumbnail

Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware

Trend Micro

Users are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in the wild for malicious cryptocurrency mining.

article thumbnail

Imperva blocked a record DDoS attack with 25.3 billion requests

Security Affairs

Cybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests. Cybersecurity firm Imperva mitigated a DDoS attack with over 25.3 billion requests on June 27, 2022. According to the experts, the attack marks a new record for Imperva’s application DDoS mitigation solution.

DDOS 103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

5 things to teach your kids about social media

Malwarebytes

With children now back at school, it’s time to think about social media, and their use of it. Are they already firing out tweets, chatting in Discord channels, or even just looking to set up a Tik-Tok account? Now is the time to consider giving your kids some security and privacy tips for all their social media needs. 1. Get to grips with default settings.

Media 98
article thumbnail

HIVE Ransomware Claims Responsibility for NYRA Attack

Heimadal Security

The New York Racing Association disclosed that, on June 30th, a cyberattack impacted IT operations, website availability, and compromised member data. NYRA is operating the three largest thoroughbred horse racing tracks in New York, namely the Aqueduct Racetrack, the Belmont Park, and the Saratoga Race Course. The Hive ransomware group, which was recently responsible for […].

article thumbnail

Scammers send fake 'Energy Bills Support Scheme' texts

Malwarebytes

Watch out for an energy-themed scam being sent out via SMS. The message plays on energy price fears, similar to what we’ve seen previously. Scam alert. I just received this text. Click through and it looks very official. It’s a scam. The £400 energy bill discount is automatic, you don’t need to register or share any details with anyone.

Scams 98
article thumbnail

Duo’s MacLogon Release Enhances MacOS Security With Offline and M1 Support

Duo's Security Blog

MacOS is popular computer operating system used on Apple computers. Like any personal computing device, it requires local authentication to login. Apple provides username and password login for primary authentication and Cisco Duo provides secondary factors to strengthen the macOS security authentication process. Now Duo has extended support for secondary authentication when the macOS endpoint is offline and added support for the popular M1 line of macOS hardware.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Vulnerable children's identities used in tax fraud scheme

Malwarebytes

The United States Attorney for the Southern District of New York has sentenced Ariel "Melo" Jimenez (38) to 12 years in prison for leading a "tax fraud and identity theft conspiracy" that resulted in the fraudulent claiming of tax credits, earning him millions of dollars. "Ariel Jimenez was the leader of a long-running fraudulent tax business that cheated the Government of tax refunds by stealing the identities of vulnerable children and using those identities to falsely claim tax credits on beh

article thumbnail

Survey Reveals the Severity of Cloud Security Challenge

Security Boulevard

A full 80% of 400 cloud engineering and security practitioners and leaders surveyed by market research firm Propeller Insights on behalf of Snyk experienced at least one major cloud security incident in the past year. The most common experiences were misconfigurations (34%) followed closely by an actual data breach (33%), an intrusion (27%) and a. The post Survey Reveals the Severity of Cloud Security Challenge appeared first on Security Boulevard.

article thumbnail

Tax refund phish logs keystrokes to swipe personal details

Malwarebytes

There’s been some smart phishing campaigns running over the last few weeks, and this one is particularly sneaky. Bleeping Computer reports that a phishing page is targeting Greek taxpayers with a tax refund scam. The added sting in the tail comes in the form of an embedded keylogger which grabs everything entered onto the page. An untimely tax refund.

article thumbnail

Details of Juice Jacking and USB Condom

CyberSecurity Insiders

Juice Jacking, the term is currently trending on Google because the said cyber threat is on the rise from the past few months. Technically speaking, Juice Jacking is an exploited USB port that can pass on malware and sniff data from a victimized device. This usually occurs when innocent device users unaware of the security threat charge their mobile phones in a public charging station, such as transit points like airports, shopping malls, and other points.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!