Wed.Sep 14, 2022

article thumbnail

Weird Fallout from Peiter Zatko’s Twitter Whistleblowing

Schneier on Security

People are trying to dig up dirt on Peiter Zatko, better known as Mudge. For the record, I have not been contacted. I’m not sure if I should feel slighted.

239
239
article thumbnail

Wormable Flaw, 0days Lead Sept. 2022 Patch Tuesday

Krebs on Security

This month’s Patch Tuesday offers a little something for everyone, including security updates for a zero-day flaw in Microsoft Windows that is under active attack, and another Windows weakness experts say could be used to power a fast-spreading computer worm. Also, Apple has also quashed a pair of zero-day bugs affecting certain macOS and iOS users, and released iOS 16 , which offers a new privacy and security feature called “ Lockdown Mode.” And Adobe axed 63 vulnerabilities i

Spyware 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Security in the Context of International Security , online, on September 22, 2022. I’m speaking at IT-Security INSIDE 2022 in Zurich, Switzerland, on September 22, 2022. The list is maintained on this page.

46
article thumbnail

What is GRC?

Tech Republic Security

Find out what GRC stands for, its history and where it can be used today. The post What is GRC? appeared first on TechRepublic.

Big data 148
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

There’s No Honor Among Thieves: Carding Forum Staff Defraud Users in an ESCROW Scam

Digital Shadows

Although in decline, carding has traditionally been an easy entry point into the world of cybercrime, owing to the low. The post There’s No Honor Among Thieves: Carding Forum Staff Defraud Users in an ESCROW Scam first appeared on Digital Shadows.

Scams 139
article thumbnail

North Korean cyberespionage actor Lazarus targets energy providers with new malware

Tech Republic Security

Lazarus, a North Korean cyberespionage group, keeps hitting energy providers in the U.S., Canada and Japan with a new malware arsenal. The post North Korean cyberespionage actor Lazarus targets energy providers with new malware appeared first on TechRepublic.

Malware 148

LifeWorks

More Trending

article thumbnail

Surya Pochareddy Named Head of M&A and Strategy at IDIQ

Identity IQ

Surya Pochareddy Named Head of M&A and Strategy at IDIQ. IdentityIQ. New role further develops company’s strategic growth across identity and credit solutions. Temecula, California, Sept. 14, 2022 – IDIQ , an industry leader in identity theft protection and credit monitoring, has named Surya Pochareddy to the role of executive vice president, head of M&A and strategy.

article thumbnail

Most enterprises looking to consolidate security vendors

CSO Magazine

A total 75% of organizations across North America, Asia Pacific and EMEA plan to consolidate the number of security vendors they use, a Gartner survey of 418 respondents found. That percentage has increased significantly, as only 29% were looking to consolidate vendors in 2020. The main reasons are an increase in dissatisfaction with operational inefficiencies and lack of integration of a heterogenous security stack, the survey found.

122
122
article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Cybercrime is a growth industry like no other. According to statistics from the FBI’s 2021 Internet Crime Report , complaints to the Internet Crime Complaint Center (IC3) have been rising since 2017. In 2021 alone, IC3 received 847,376 complaints which amounted to $6.9 billion in reported losses, up from 2020’s 791,790 complaints and $4.2 billion in reported losses.

article thumbnail

Google Cloud completes Mandiant acquisition for $5.4 billion

CyberSecurity Insiders

Google Cloud has made an official announcement that it has completed the acquisition process of cybersecurity firm Mandiant for $5.4 billion. Trade analysts felt that the business purchase will help the cloud business of the web search giant mitigate risks associated with cyber threats with great confidence driven readiness. For the information of our readers, Mandiant is the same company that revealed the Solar Winds hack details to the world and uncovered the after details such as the attack i

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

You never walk alone: The SideWalk backdoor gets a Linux variant

We Live Security

ESET researchers have uncovered another tool in the already extensive arsenal of the SparklingGoblin APT group: a Linux variant of the SideWalk backdoor. The post You never walk alone: The SideWalk backdoor gets a Linux variant appeared first on WeLiveSecurity.

115
115
article thumbnail

Ransomware news headlines trending on Google

CyberSecurity Insiders

A recent study made in the time frame of January to June this year revealed that over 1.2 million ransomware attacks were launched so far in this year. And as per an estimate, most of the targets were businesses operating in healthcare, finance, education, utilities and technology sectors. The research carried out by Barracuda networks confirmed that most cyber attacks of ransomware genre do not make it to the news headlines as the CFOs,CTOs and CIOs hide the news because of the fear of losing a

article thumbnail

Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!

Naked Security

It sounds like a scam that could never work: use a picture of browser and convince the user it's a real browser. You might be surprised.

Scams 110
article thumbnail

novoShield Emerges From Stealth With Mobile Phishing Protection App

Hacker Combat

With an enterprise-grade iPhone protection app, mobile phishing defense firm novoShield has come out of hiding. According to novoShield, the new solution was created to shield organizations and end users against the rising amount of phishing attempts. With its real-time protection solution , novoShield seeks to address the considerable rise in cybercrime, including phishing, brought by the Covid-19 pandemic’s migration to remote work.

Mobile 105
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Major Cyberattack Hits English Company Eurocell

Heimadal Security

English PVC-U manufacturer Eurocell suffered a data breach this year, in July. The threat actors managed to infiltrate the organization’s network and steal sensitive employee data. The company announced the incidents to the present and former employees in a letter, although it is not certain if the former staff data has been copied or not. […].

article thumbnail

Goodbye Friction, Hello Flow: 6 Ways to Build Trust with Strong Customer Authentication

Tech Republic Security

Virtually every business today is a technology business, relying on digital services in some way to serve and support their customers. The seamlessness of that online experience can make all the difference between a customer who makes a purchase and one who abandons their cart in frustration. The pandemic has driven services online faster than. The post Goodbye Friction, Hello Flow: 6 Ways to Build Trust with Strong Customer Authentication appeared first on TechRepublic.

article thumbnail

SparklingGoblin APT Hackers Using New Linux Variant of SideWalk Backdoor

The Hacker News

A Linux variant of a backdoor known as SideWalk was used to target a Hong Kong university in February 2021, underscoring the cross-platform abilities of the implant. Slovak cybersecurity firm ESET, which detected the malware in the university's network, attributed the backdoor to a nation-state actor dubbed SparklingGoblin.

Malware 102
article thumbnail

A Post-exploitation Look at Coinminers Abusing WebLogic Vulnerabilities

Trend Micro

This blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected and blocked the abuse of the CVE-2020-14882 WebLogic vulnerability in affected endpoints.

99
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Over 280,000 WordPress Sites Attacked Using WPGateway Plugin Zero-Day Vulnerability

The Hacker News

A zero-day flaw in the latest version of a WordPress premium plugin known as WPGateway is being actively exploited in the wild, potentially allowing malicious actors to completely take over affected sites. Tracked as CVE-2022-3180 (CVSS score: 9.

101
101
article thumbnail

How to help your child manage their online reputation

Malwarebytes

Whether your child has been socially active online for a while now or you just handed your young one their first ever smartphone, now is an excellent time to think about managing their online reputation. The concept may sound overwhelming, but doing it is easy. Since you're no doubt talking to your kids about how to keep themselves safe online, you might as well open up about online reputations and how to create or maintain a positive one.

article thumbnail

Twitter former head of security told the Senate of severe security failings by the company

Security Affairs

Twitter whistleblower, and former head of security, Peiter Zatko, told the US Congress that the platform ignored his security concerns. Peiter ‘Mudge’ Zatko , former head of security, testified in front of Congress on Tuesday, sustaining that the platform ignored his security concerns and was vulnerable to cyber attacks. Zatko filed a whistleblower complaint in July with Congress, the justice department, the Federal Trade Commission and the Securities and Exchange Commission, arguing that Twitte

article thumbnail

To Ease the Cybersecurity Worker Shortage, Broaden the Candidate Pipeline

Dark Reading

With enough passion, intelligence, and effort, anyone can be a successful cybersecurity professional, regardless of education or background.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Threat actors are actively exploiting a zero-day in WPGateway WordPress plugin

Security Affairs

Threat actors are actively exploiting a zero-day vulnerability in the WPGateway premium plugin to target WordPress websites. The Wordfence Threat Intelligence team reported that threat actors are actively exploiting a zero-day vulnerability ( CVE-2022-3180 ) in the WPGateway premium plugin in attacks aimed at WordPress sites. The WPGateway plugin is a premium plugin that allows users of the WPGateway cloud service to setup and manage WordPress sites from a single dashboard.

article thumbnail

Attackers: Modern Day API Cartographers

Security Boulevard

Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing the coastline of New England, drawing a map as they sailed. Instead, they talked to people who did the sailing. Before they drew a map, they picked brains, plied sailors with strong drinks, gathered information and sifted through contradictory claims to build their.

article thumbnail

How to Do Malware Analysis?

The Hacker News

According to the 2022 Malwarebytes Threat review, 40M Windows business computers' threats were detected in 2021. And malware analysis is necessary to combat and avoid this kind of attack. In this article, we will break down the goal of malicious programs' investigation and how to do malware analysis with a sandbox. What is malware analysis?

Malware 98
article thumbnail

Microsoft September 2022 Patch Tuesday fixed actively exploited zero-day

Security Affairs

Microsoft released September 2022 Patch Tuesday security updates to address 64 flaws, including an actively exploited Windows zero-day. Microsoft September 2022 Patch Tuesday security updates address 64 vulnerabilities, including an actively exploited Windows zero-day. The flaws fixed by the IT giant impact Microsoft Windows and Windows Components; Azure and Azure Arc; NET and Visual Studio and.NET Framework; Microsoft Edge (Chromium-based); Office and Office Components; Windows Defender; and Li

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ukraine’s Cyberwar Chief Sounds Like He’s Winning

WIRED Threat Level

Yurii Shchyhol gives WIRED a rare interview about running the country’s Derzhspetszviazok and the state of the online conflict with Russia.

Hacking 98
article thumbnail

Patch now! Microsoft issues critical security updates as PCs attacked through zero-day flaw

Graham Cluley

Windows users are once again being told to update their systems with the latest security patches from Microsoft, following the discovery of critical vulnerabilities - including ones which are already being exploited in the wild, or could be used to fuel a fast-spreading worm. Read more in my article on the Hot for Security blog.

Malware 98
article thumbnail

Update now! Microsoft patches two zero-days

Malwarebytes

The Microsoft September 2022 Patch Tuesday includes fixes for two publicly disclosed zero-day vulnerabilities, one of which is known to be actively exploited. Five of the 60+ security vulnerabilities were rated as “Critical”, and 57 as important. Two vulnerabilities qualify as zero-days, with one of them being actively exploited. Zero-days.

article thumbnail

Cybersecurity startup launches mobile app to protect against phishing attacks

CSO Magazine

Cybersecurity startup novoShield has launched an enterprise-grade mobile security application , designed to protect users from mobile phishing threats. Released this week for iPhones via the US and Israeli Apple app stores, novoShield’s namesake app detects malicious websites in real time and blocks users from accessing them. The software also provides users with live on-screen indicators to inform them when a website is safe to browse.

Mobile 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!