Mon.Jun 26, 2023

article thumbnail

Excel Data Forensics

Schneier on Security

In this detailed article about academic plagiarism are some interesting details about how to do data forensics on Excel files. It really needs the graphics to understand, so see the description at the link. (And, yes, an author of a paper on dishonesty is being accused of dishonesty. There’s more evidence.

211
211
article thumbnail

GUEST ESSAY: Dialing in generative AI to truly relieve and assist cybersecurity professionals

The Last Watchdog

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: A call to regulate facial recognition Although AI has become a powerful weapon, there’s concern it might be too effective compared to human cybersecurity professionals — leading to layoffs and replacements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR

Tech Republic Security

Pro-Kremlin groups Anonymous Sudan, Killnet and Clop have other motivations than just hacktivism as they widen their attack field beyond political targets. The post Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR appeared first on TechRepublic.

Banking 162
article thumbnail

Hackers steal data of 45,000 New York City students in MOVEit breach

Bleeping Computer

The New York City Department of Education (NYC DOE) says hackers stole documents containing the sensitive personal information of up to 45,000 students from its MOVEit Transfer server. [.

Education 126
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

News Alert: Flexxon selects a Chief Technology Strategist, signals intent to expand into the US

The Last Watchdog

Singapore, June 26, 2023 – Hardware cybersecurity solutions pioneer Flexxon today announced the appointment of Erik Nilsen, PhD, as its Chief Technology Strategist. An industry veteran with almost three decades of experience, Nilsen will work closely with the Company’s executive management and Research and Development (R&D) team to design and deploy technological roadmaps for its value-driven cybersecurity innovations, with a focus on the US market.

article thumbnail

Diablo IV video game hit by DDoS attacks

Graham Cluley

It wasn't a great weekend for video game fans, as players of Diablo IV multiplayer role-playing game were greeted with an error message as it tried to connect to the servers of developer Blizzard.

DDOS 114

More Trending

article thumbnail

Mayor candidate slaps Latitude with $1 million lawsuit for data breach

CyberSecurity Insiders

A Mayor candidate of Australia is suing Latitude for not protecting customer details from hackers. As the unsuccessful mayoral candidate was one victim of the data breach, the person is claiming $1 million as damages in the federal court. Shahriar Sean Saffari is the person who launched a legal appeal against the financial services firm of Australia in the court and is seeking a financial compensation for the distress caused to him after the incident.

article thumbnail

Trojanized Super Mario Installer Goes After Gamer Data

Dark Reading

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.

Malware 107
article thumbnail

How to Measure the Maturity of Your Software Supply Chain

Security Boulevard

In today's fast-paced software development landscape, organizations face rising challenges to ensure the security, quality, and reliability of the software they deliver. Your software supply chain plays a pivotal role in meeting these challenges head-on. The post How to Measure the Maturity of Your Software Supply Chain appeared first on Security Boulevard.

Software 104
article thumbnail

Suncor Energy cyberattack impacts Petro-Canada gas stations

Bleeping Computer

Petro-Canada gas stations across Canada are impacted by technical problems preventing customers from paying with credit card or rewards points as its parent company, Suncor Energy, discloses they suffered a cyberattack. [.

103
103
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

“I Got Scammed on PayPal!” Protect Against PayPal Scams

Security Boulevard

PayPal is generally considered a secure platform for online transactions, but it's important to remain vigilant and take necessary precautions to safeguard your account. The post “I Got Scammed on PayPal!” Protect Against PayPal Scams appeared first on Security Boulevard.

Scams 104
article thumbnail

What Is Code Encryption and How Does It Work?

Digital Guardian

What is code encryption? In this blog we describe the benefits of code encryption, how it differs from code obfuscation, and how it relates to data loss prevention.

article thumbnail

Buried Story of the 2023 Verizon DBIR: Ransomware Stopped Growing

Security Boulevard

As we do every year, we’re reading the Verizon Data Breach Investigations Report for 2023 with respect for the service they provide to the cybersecurity and cyber risk community with this massive effort in data gathering and interpretation, and admiration for the clarity (and humor!) of their presentation. The DBIR was one inspiration for us to create our own annual Cybersecurity Risk Report analyzing FAIR™ top-risk scenarios populated with data gathered from the DBIR and other trusted industry

article thumbnail

Blacktail: Unveiling the tactics of a notorious cybercrime group

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In recent months, a cybercrime group known as Blacktail has begun to make headlines as they continue to target organizations around the globe. The group was first spotted by the Unit 42 Team at Palo Alto Networks earlier this year.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Anatsa Android trojan now steals banking info from users in US, UK

Bleeping Computer

A new mobile malware campaign since March 2023 pushes the Android banking trojan 'Anatsa' to online banking customers in the U.S., the U.K., Germany, Austria, and Switzerland. [.

Banking 98
article thumbnail

GDPR FAIL: US Firm ‘Profiles Half the World’ — it’s Max Schrems Again

Security Boulevard

NYOB accuses TeleSign, Proximus and BICS of misusing phone users’ private data. Reputation scoring = privacy violation? The post GDPR FAIL: US Firm ‘Profiles Half the World’ — it’s Max Schrems Again appeared first on Security Boulevard.

article thumbnail

Zombie API vs Shadow API: The Crashtest

IT Security Guru

The 1954 novel, “I Am Legend,” played a major role in the development of the modern zombie and vampire genre. As far as the main character, Robert Neville, knows, he’s the last survivor of the pandemic that turned everyone else into “vampires” (though they resemble more of what we think of as zombies). One distinguishing mark of the novel was the scientific explanation behind the disease, and the accompanying biological fix.

InfoSec 98
article thumbnail

Tines Adds Tool to Customize Automated Cybersecurity Workflows

Security Boulevard

Tines added a case management tool to its no-code automation platform that makes it simpler for cybersecurity teams to track individual incidents, investigate security breaches and manage response activities. The post Tines Adds Tool to Customize Automated Cybersecurity Workflows appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Company finds lost SSD—and confidential data—for sale on eBay

Malwarebytes

Major software company SAP is putting the pieces of a story involving missing SSD disks back together. Four SSD disks are alleged to have gone on an adventure last November, making their way out of a Walldorf, Germany, datacenter with one of them ending up on eBay. An investigation revealed that despite the disks being located in a building referred to as a “secure location”, it was anything but for the disks in question.

article thumbnail

Internet Systems Consortium (ISC) fixed three DoS flaw in BIND

Security Affairs

The Internet Systems Consortium (ISC) addressed three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The Internet Systems Consortium (ISC) released security updates to address three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The three issues, tracked as CVE-2023-2828, CVE-2023-2829 and CVE-2023-2911, are remotely exploitable.

article thumbnail

Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack

The Hacker News

An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month to deploy an Apple macOS backdoor called JokerSpy. Elastic Security Labs, which is monitoring the intrusion set under the name REF9134, said the attack led to the installation of Swiftbelt, a Swift-based enumeration tool inspired by an open-source utility called SeatBelt.

article thumbnail

Citizen of Croatia charged with running the Monopoly Market drug marketplace

Security Affairs

Milomir Desnica, a citizen of Croatia and Serbia, has been charged with running the Monopoly Market drug darknet marketplace. Milomir Desnica (33), a citizen of Croatia and Serbia, has been extradited from Austria to the United States to face charges of running the darknet drug marketplace Monopoly Market. According to the indictment, in late 2019, the man launched and operated a darknet marketplace to sell illicit narcotics, including opioids, stimulants, psychedelics, and prescription medicati

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers

The Hacker News

In what's an ingenious side-channel attack, a group of academics has found that it's possible to recover secret keys from a device by analyzing video footage of its power LED.

95
article thumbnail

Energy company Suncor suffered a cyber attack and its company Petro-Canada gas reported problems at its gas stations in Canada

Security Affairs

The cyber attack suffered by Suncor Energy impacted payment operations at Petro-Canada gas stations in Canada. Suncor Energy is Canada’s leading integrated energy company that provides oil sands development, production and upgrading, offshore oil and gas, and petroleum refining in Canada and the U.S. It owns the Petro-Canada retail and wholesale distribution networks.

article thumbnail

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS

The Hacker News

Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And AI tools are no exception. Employees and business leaders alike are flocking to generative AI software and similar programs, often unaware of the major SaaS security vulnerabilities they're introducing into the enterprise.

Risk 89
article thumbnail

3 Steps to Successfully & Ethically Navigate a Data Breach

Dark Reading

In this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers

The Hacker News

Microsoft has disclosed that it's detected a spike in credential-stealing attacks conducted by the Russian state-affiliated hacker group known as Midnight Blizzard.

article thumbnail

UK hacker busted in Spain gets 5 years over Twitter hack and more

Naked Security

Not just that infamous Twitter hack, but SIM-swapping, stalking and swatting too…

Hacking 125
article thumbnail

Windows 11 is getting a built-in passkey manager for Windows Hello

Bleeping Computer

Microsoft is expanding support for passkeys in Windows 11 to make it more secure to log into websites and apps using biometric authentication. [.

article thumbnail

Ransomware attack hits Suncor Energy disrupting fuel station payments across Canada

CyberSecurity Insiders

Numerous gas and fuel filling stations throughout Canada experienced significant disruptions in processing credit card and reward points-based payments due to a cyber attack on Suncor Energy, the parent company. The attack, suspected to be a form of ransomware, affected a substantial number of systems within the leading synthetic crude oil producer.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.