Thu.Dec 15, 2022

article thumbnail

Combined SOC Webinar Q&A: From EDR to ITDR and ASO … and ChatGPT

Anton on Security

In recent weeks, I did two fun webinars related to Security Operations, and there was a lot of fun Q&A. The questions below are sometimes slighting edited for clarity, typos, etc. For extra fun, I had ChatGPT answer some of them, to see if it can replace me :-) So, first, ISACA webinar “Modernize Your SOC for the Future” focused on our Autonomic Security Operations vision.

article thumbnail

A Security Vulnerability in the KmsdBot Botnet

Schneier on Security

Security researchers found a software bug in the KmsdBot cryptomining botnet: With no error-checking built in, sending KmsdBot a malformed command­—like its controllers did one day while Akamai was watching­—created a panic crash with an “index out of range” error. Because there’s no persistence, the bot stays down, and malicious agents would need to reinfect a machine and rebuild the bot’s functions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security alert: Use these most popular passwords at your peril

Tech Republic Security

Yes, there’s a good chance “123456” is the code to the restroom at your local Starbucks, but it is also the second most popular password worldwide, according to a new study by password manager NordPass. That can’t be good. The post Security alert: Use these most popular passwords at your peril appeared first on TechRepublic.

Passwords 148
article thumbnail

Oh, the scammers online are frightful

Cisco Security

Oh, the scammers online are frightful, and the deals they offer seem delightful. No matter what you think you know, let it go, let it go, let it go (to the tune of 1945’s Let it Snow by Vaughn Monroe with the Norton Sisters). ‘Tis the season to find ourselves awash in good tidings and, well, consumerism. While it’s only partly tongue in cheek, we must be honest with ourselves.

Scams 29
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

ChatGPT: A Brave New World for Cybersecurity

eSecurity Planet

Released on November 30, ChatGPT has instantly become a viral online sensation. In a week, the app gained more than one million users. Unlike most other AI research projects, ChatGPT has captivated the interest of ordinary people who do not have PhDs in data science. They can type in queries and get human-like responses. The answers are often succinct.

article thumbnail

Agenda Ransomware Uses Rust to Target More Vital Industries

Trend Micro

This year, various ransomware-as-a-service groups have developed versions of their ransomware in Rust, including Agenda. Agenda's Rust variant has targeted vital industries like its Go counterpart. In this blog, we will discuss how the Rust variant works.

LifeWorks

More Trending

article thumbnail

LEGO BrickLink bugs let hackers hijack accounts, breach servers

Bleeping Computer

Security analysts have discovered two API security vulnerabilities in BrickLink.com, LEGO Group's official second-hand and vintage marketplace for LEGO bricks. [.].

article thumbnail

The state of Identity Security: Widespread attacks, wasted investment and identity sprawl

IT Security Guru

Identity management is in dire straits, according to a recently conducted survey by identity security firm One Identity. Surveying over 1,000 IT security professionals, the results showed that 96 percent of companies report using multiple identity management tools, with 41 percent deploying at least 25 different systems to manage access rights. However, 70 percent of companies reported they’re paying for identity tools they’re not actively using.

article thumbnail

Operation Power Off: 50 DDoS-services taken offline in international crackdown

Graham Cluley

Law enforcement agencies in the United States, UK, Netherlands, Poland, and Germany have brought down the most popular DDoS-for-hire services on the internet, responsible for tens of millions of attacks against websites. Read more in my article on the Tripwire State of Security blog.

DDOS 122
article thumbnail

Hackers Bombard Open Source Repositories with Over 144,000 Malicious Packages

The Hacker News

NuGet, PyPi, and npm ecosystems are the target of a new campaign that has resulted in over 144,000 packages being published by unknown threat actors. "The packages were part of a new attack vector, with attackers spamming the open-source ecosystem with packages containing links to phishing campaigns," researchers from Checkmarx and Illustria said in a report published Wednesday.

Phishing 122
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

AirTag Stalking – Murder, Fear and Litigation

Security Boulevard

At the end of January 2022, Akron, Ohio resident Heidi Moon was staying in a hotel in Kent, Ohio when her ex-boyfriend texted her, indicating that he knew where she was. Four hours later, Moon was shot and killed by her ex-boyfriend, who then turned the gun on himself. In the back of Moon’s car, The post AirTag Stalking – Murder, Fear and Litigation appeared first on Security Boulevard.

article thumbnail

Dozens of cybersecurity efforts included in this year’s US NDAA

CSO Magazine

Last week, members of the US House of Representatives and Senate reconciled their versions of the annual must-pass National Defense Authorization Act (NDAA). Each year the NDAA contains a wealth of primarily military cybersecurity provisions, delivering hundreds of millions, if not billions, in new cybersecurity funding to the federal government. This year’s bill is no exception.

article thumbnail

Hackers Use SVG Files to Spread QBot Malware onto Windows Systems

Heimadal Security

A new technique for spreading QBot malware gained popularity among hackers – they are now distributing it through SVG files to perform HTML smuggling, which locally generates a malicious installer for Windows. In this attack, the target’s browser is tricked into downloading a Base64 encoded version of the QBot malware installer hidden within an SVG […].

Malware 119
article thumbnail

CrowdStrike Adds Attack Surface Management Module

Security Boulevard

Following its acquisition of Reposify earlier this year, CrowdStrike today added external attack surface management (EASM) technology to the CrowdStrike Falcon platform. CrowdStrike CTO Michael Sentonas said CrowdStrike Falcon Surface will initially be made available as a standalone module before EASM capabilities are more deeply embedded in the company’s core cybersecurity platform.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Expanding the App Defense Alliance

Google Security

Posted by Brooke Davis, Android Security and Privacy Team The App Defense Alliance launched in 2019 with a mission to protect Android users from bad apps through shared intelligence and coordinated detection between alliance partners. Earlier this year, the App Defense Alliance expanded to include new initiatives outside of malware detection and is now the home for several industry-led collaborations including Malware Mitigation, MASA (Mobile App Security Assessment) & CASA (Cloud App Security A

Mobile 112
article thumbnail

FDA, MDIC and MITRE Publish Medical Device Threat Modeling Playbook

Security Boulevard

Modern medical devices are complex, networked and often vulnerable to attack. With that in mind, the U.S. Food and Drug Administration (FDA) has funded the development of a playbook for threat modeling by the Medical Device Innovation Consortium (MDIC) and MITRE. The playbook is designed to help health care organizations and medical device manufacturers identify.

article thumbnail

Microsoft Reclassifies SPNEGO Extended Negotiation Security Vulnerability as 'Critical'

The Hacker News

Microsoft has revised the severity of a security vulnerability it originally patched in September 2022, upgrading it to "Critical" after it emerged that it could be exploited to achieve remote code execution. Tracked as CVE-2022-37958 (CVSS score: 8.1), the flaw was previously described as an information disclosure vulnerability in SPNEGO Extended Negotiation (NEGOEX) Security Mechanism.

112
112
article thumbnail

How To Keep Your Business Running Smoothly

SecureBlitz

Here, I will show you how to keep your business running smoothly. If you want to be sure to maintain the progress you’ve made in your company and keep things running smoothly, there are different tools and techniques that can make a difference. A successful business is a combination of a lot of things, ranging […]. The post How To Keep Your Business Running Smoothly appeared first on SecureBlitz Cybersecurity.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

LockBit Ransomware 101: Here’s What You Need to Know

Heimadal Security

LockBit ransomware is a malicious software designed for one thing: locking up the user’s computer in exchange for a ransom. LockBit will automatically vet for targets and encrypt all your files that are accessible on your computer if you don’t pay the ransom. LockBit ransomware attackers are self-piloted cyberattacks and have made a name for […].

article thumbnail

API Flaws in Lego Marketplace Put User Accounts, Data at Risk

Dark Reading

Attackers also could breach internal production data to compromise a corporate network using vulnerabilities found in the BrickLink online platform.

article thumbnail

New Attack Vector: 144k Phishing Packages Found on Open-source Repositories

Heimadal Security

Threat actors found a new attack vector spamming open-source ecosystem with packages that contain links to phishing campaigns. 144,294 phishing-related packages have been uploaded to open-source package repositories, like NPM, PyPi, and NuGet. The Magnitude of this Phishing Campaign Analysts at Checkmarx and Illustria say that all packages and associated user accounts were almost certainly […].

Phishing 110
article thumbnail

Can I Install A Hidden Camera In A Nursing Home?

SecureBlitz

We are in the new millennium, where technology has led to several innovations and inventions at large. We can now install cameras at home to monitor everything from any place and at any time. Hidden nursing cameras are now used to monitor our loved ones in the nursing facilities. But then, can I install a […]. The post Can I Install A Hidden Camera In A Nursing Home?

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Social Blade confirms breach after hacker posts stolen user data

Bleeping Computer

Social media analytics platform Social Blade has confirmed they suffered a data breach after its database was breached and put up for sale on a hacking forum. [.].

article thumbnail

Citrix and Fortinet Zero-Days Actively Exploited by Hackers

SecureWorld News

IT and cybersecurity companies Citrix and Fortinet have announced security updates to patch Zero-Day vulnerabilities that were actively exploited by threat actors. The U.S. National Security Agency (NSA) released an advisory discussing a threat actor known as APT5 (also known as UNC2630 or MANGANESE and linked to Chinese threat actors), which "demonstrated capabilities" against Citrix's Application Delivery Controller (ADC) and Gateway devices.

VPN 103
article thumbnail

Researchers Uncover MirrorFace Cyber Attacks Targeting Japanese Political Entities

The Hacker News

A Chinese-speaking advanced persistent threat (APT) actor codenamed MirrorFace has been attributed to a spear-phishing campaign targeting Japanese political establishments.

article thumbnail

Traveling for the holidays? Stay cyber?safe with these tips

We Live Security

Holiday travel is back with a vengeance this year. Set yourself up for a cyber-safe and hassle-free trip with our checklist. The post Traveling for the holidays? Stay cyber‑safe with these tips appeared first on WeLiveSecurity.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft revised CVE-2022-37958 severity due to its broader scope

Security Affairs

Microsoft revised the severity rate for the CVE-2022-37958 flaw which was addressed with Patch Tuesday security updates for September 2022. Microsoft revised the severity rate for the CVE-2022-37958 vulnerability, the IT giant now rated it as “critical” because it discovered that threat actors can exploit the bug to achieve remote code execution.

article thumbnail

Goodbye SHA-1: NIST Retires 27-Year-Old Widely Used Cryptographic Algorithm

The Hacker News

The U.S. National Institute of Standards and Technology (NIST), an agency within the Department of Commerce, announced Thursday that it's formally retiring the SHA-1 cryptographic algorithm. SHA-1, short for Secure Hash Algorithm 1, is a 27-year-old hash function used in cryptography and has since been deemed broken owing to the risk of collision attacks.

article thumbnail

GAO warns government agencies: focus on IoT and OT within critical infrastructure

CSO Magazine

The US Government Accounting Office (GAO) continues to highlight shortcomings in the cybersecurity posture of government entities responsible for the protection of United States infrastructure when it comes to internet of things (IoT) and operational technology (OT) devices and systems. In a recent report, the GAO shone a light on the Departments of Energy, Health and Human Services, Homeland Security, and Transportation.

IoT 99
article thumbnail

GPS Signals Are Being Disrupted in Russian Cities

WIRED Threat Level

Navigation system monitors have seen a recent uptick in interruptions since Ukraine began launching long-range drone attacks.

Hacking 99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!