Mon.Jun 26, 2023

article thumbnail

Excel Data Forensics

Schneier on Security

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. (And, yes, an author of a paper on dishonesty is being accused of dishonesty. There’s more evidence.

271
271
article thumbnail

Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR

Tech Republic Security

Pro-Kremlin groups Anonymous Sudan, Killnet and Clop have other motivations than just hacktivism as they widen their attack field beyond political targets. The post Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR appeared first on TechRepublic.

Banking 190
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Dialing in generative AI to truly relieve and assist cybersecurity professionals

The Last Watchdog

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: A call to regulate facial recognition Although AI has become a powerful weapon, there’s concern it might be too effective compared to human cybersecurity professionals — leading to layoffs and replacements.

article thumbnail

UK hacker busted in Spain gets 5 years over Twitter hack and more

Naked Security

Not just that infamous Twitter hack, but SIM-swapping, stalking and swatting too…

Hacking 125
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How cybercrime is impacting SMBs in 2023

SecureList

According to the United Nations , small and medium-sized businesses (SMBs) constitute 90 percent of all companies and contribute 60 to 70 percent of all jobs in the world. They generate 50 percent of global gross domestic product and form the backbone of most countries’ economies. Hit hardest by the COVID pandemic, geo-political and climate change, they play a critical role in a country’s recovery, requiring greater support from governments to stay afloat.

article thumbnail

Diablo IV video game hit by DDoS attacks

Graham Cluley

It wasn't a great weekend for video game fans, as players of Diablo IV multiplayer role-playing game were greeted with an error message as it tried to connect to the servers of developer Blizzard.

DDOS 120

LifeWorks

More Trending

article thumbnail

Wells Notice Against SolarWinds CISO Could Be First of Its Kind

SecureWorld News

SolarWinds Corporation, which suffered a major breach of its Orion software platform in December 2020, submitted a U.S. Securities and Exchange Commission (SEC) filing on June 23rd, saying the enforcement staff of the SEC provided the company with a Wells Notice related to its investigation into the cyber incident. A Wells Notice is a letter the SEC generally issues to organizations or individuals when it is planning to take action against them.

CISO 111
article thumbnail

China's 'Volt Typhoon' APT Turns to Zoho ManageEngine for Fresh Cyberattacks

Dark Reading

A recent campaign shows that the politically motivated threat actor has more tricks up its sleeve than previously known, targeting a critical exploit and wiping logs to cover their tracks.

109
109
article thumbnail

Mayor candidate slaps Latitude with $1 million lawsuit for data breach

CyberSecurity Insiders

A Mayor candidate of Australia is suing Latitude for not protecting customer details from hackers. As the unsuccessful mayoral candidate was one victim of the data breach, the person is claiming $1 million as damages in the federal court. Shahriar Sean Saffari is the person who launched a legal appeal against the financial services firm of Australia in the court and is seeking a financial compensation for the distress caused to him after the incident.

article thumbnail

Trojanized Super Mario Installer Goes After Gamer Data

Dark Reading

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.

Malware 107
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to Measure the Maturity of Your Software Supply Chain

Security Boulevard

In today's fast-paced software development landscape, organizations face rising challenges to ensure the security, quality, and reliability of the software they deliver. Your software supply chain plays a pivotal role in meeting these challenges head-on. The post How to Measure the Maturity of Your Software Supply Chain appeared first on Security Boulevard.

Software 105
article thumbnail

Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers

The Hacker News

In what's an ingenious side-channel attack, a group of academics has found that it's possible to recover secret keys from a device by analyzing video footage of its power LED.

105
105
article thumbnail

“I Got Scammed on PayPal!” Protect Against PayPal Scams

Security Boulevard

PayPal is generally considered a secure platform for online transactions, but it's important to remain vigilant and take necessary precautions to safeguard your account. The post “I Got Scammed on PayPal!” Protect Against PayPal Scams appeared first on Security Boulevard.

Scams 105
article thumbnail

What Is Code Encryption and How Does It Work?

Digital Guardian

What is code encryption? In this blog we describe the benefits of code encryption, how it differs from code obfuscation, and how it relates to data loss prevention.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Buried Story of the 2023 Verizon DBIR: Ransomware Stopped Growing

Security Boulevard

As we do every year, we’re reading the Verizon Data Breach Investigations Report for 2023 with respect for the service they provide to the cybersecurity and cyber risk community with this massive effort in data gathering and interpretation, and admiration for the clarity (and humor!) of their presentation. The DBIR was one inspiration for us to create our own annual Cybersecurity Risk Report analyzing FAIR™ top-risk scenarios populated with data gathered from the DBIR and other trusted industry

article thumbnail

Zombie API vs Shadow API: The Crashtest

IT Security Guru

The 1954 novel, “I Am Legend,” played a major role in the development of the modern zombie and vampire genre. As far as the main character, Robert Neville, knows, he’s the last survivor of the pandemic that turned everyone else into “vampires” (though they resemble more of what we think of as zombies). One distinguishing mark of the novel was the scientific explanation behind the disease, and the accompanying biological fix.

InfoSec 102
article thumbnail

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers

The Hacker News

Microsoft has disclosed that it's detected a spike in credential-stealing attacks conducted by the Russian state-affiliated hacker group known as Midnight Blizzard.

article thumbnail

Blacktail: Unveiling the tactics of a notorious cybercrime group

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In recent months, a cybercrime group known as Blacktail has begun to make headlines as they continue to target organizations around the globe. The group was first spotted by the Unit 42 Team at Palo Alto Networks earlier this year.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

News Alert: DerSecur rercognized in Forrester’s Static Application Security Testing (SAST) report

The Last Watchdog

Haifa, Israel, June 26, 2023 — DerSecur , which has developed DerScanner a comprehensive application security platform, has become one of the vendors whose products “In order to work more effectively to improve software security, it is necessary to ensure continuous processes of code analysis and error correction throughout the entire product development lifecycle.

article thumbnail

Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack

The Hacker News

An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month to deploy an Apple macOS backdoor called JokerSpy. Elastic Security Labs, which is monitoring the intrusion set under the name REF9134, said the attack led to the installation of Swiftbelt, a Swift-based enumeration tool inspired by an open-source utility called SeatBelt.

article thumbnail

News Alert: Flexxon selects a Chief Technology Strategist, signals intent to expand into the US

The Last Watchdog

Singapore, June 26, 2023 – Hardware cybersecurity solutions pioneer Flexxon today announced the appointment of Erik Nilsen, PhD, as its Chief Technology Strategist. An industry veteran with almost three decades of experience, Nilsen will work closely with the Company’s executive management and Research and Development (R&D) team to design and deploy technological roadmaps for its value-driven cybersecurity innovations, with a focus on the US market.

article thumbnail

New Fortinet's FortiNAC Vulnerability Exposes Networks to Code Execution Attacks

The Hacker News

Fortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC network access control solution that could lead to the execution of arbitrary code. Tracked as CVE-2023-33299, the flaw is rated 9.6 out of 10 for severity on the CVSS scoring system. It has been described as a case of Java untrusted object deserialization.

99
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Company finds lost SSD—and confidential data—for sale on eBay

Malwarebytes

Major software company SAP is putting the pieces of a story involving missing SSD disks back together. Four SSD disks are alleged to have gone on an adventure last November, making their way out of a Walldorf, Germany, datacenter with one of them ending up on eBay. An investigation revealed that despite the disks being located in a building referred to as a “secure location”, it was anything but for the disks in question.

article thumbnail

Internet Systems Consortium (ISC) fixed three DoS flaw in BIND

Security Affairs

The Internet Systems Consortium (ISC) addressed three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The Internet Systems Consortium (ISC) released security updates to address three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The three issues, tracked as CVE-2023-2828, CVE-2023-2829 and CVE-2023-2911, are remotely exploitable.

article thumbnail

GDPR FAIL: US Firm ‘Profiles Half the World’ — it’s Max Schrems Again

Security Boulevard

NYOB accuses TeleSign, Proximus and BICS of misusing phone users’ private data. Reputation scoring = privacy violation? The post GDPR FAIL: US Firm ‘Profiles Half the World’ — it’s Max Schrems Again appeared first on Security Boulevard.

article thumbnail

Citizen of Croatia charged with running the Monopoly Market drug marketplace

Security Affairs

Milomir Desnica, a citizen of Croatia and Serbia, has been charged with running the Monopoly Market drug darknet marketplace. Milomir Desnica (33), a citizen of Croatia and Serbia, has been extradited from Austria to the United States to face charges of running the darknet drug marketplace Monopoly Market. According to the indictment, in late 2019, the man launched and operated a darknet marketplace to sell illicit narcotics, including opioids, stimulants, psychedelics, and prescription medicati

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS

The Hacker News

Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And AI tools are no exception. Employees and business leaders alike are flocking to generative AI software and similar programs, often unaware of the major SaaS security vulnerabilities they're introducing into the enterprise.

Risk 98
article thumbnail

Energy company Suncor suffered a cyber attack and its company Petro-Canada gas reported problems at its gas stations in Canada

Security Affairs

The cyber attack suffered by Suncor Energy impacted payment operations at Petro-Canada gas stations in Canada. Suncor Energy is Canada’s leading integrated energy company that provides oil sands development, production and upgrading, offshore oil and gas, and petroleum refining in Canada and the U.S. It owns the Petro-Canada retail and wholesale distribution networks.

article thumbnail

More Spending on Cybersecurity Means More Attacks?

SecureWorld News

Cybersecurity is more important than ever. Every year, it seems that the number and variety of potential digital threats get bigger and bigger. Even as your organization hires more security experts and invests in ever-better cybersecurity technology, malware, phishing, and other attacks remain a persistent threat to your organization and the data of your customers.

article thumbnail

China-linked APT group VANGUARD PANDA uses a new tradecraft in recent attacks

Security Affairs

China-linked APT group VANGUARD PANDA, aka Volt Typhoon, was spotted observing a novel tradecraft to gain initial access to target networks. CrowdStrike researchers observed the China-linked APT group VANGUARD PANDA, aka Volt Typhoon , using a novel tradecraft to gain initial access to target networks. The Volt Typhoon group has been active since at least mid-2021 it carried out cyber operations against critical infrastructure.

DNS 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!