Sun.Mar 14, 2021

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the Australian Cyber Conference 2021 on March 17 and 18, 2021. I’m keynoting the (all-virtual) RSA Conference 2021 , May 17-20, 2021. I’ll be speaking at an Informa event on September 14, 2021. Details to come. The list is maintained on this page.

221
221
article thumbnail

Cyber Attacks: Is the ‘Big One’ Coming Soon?

Lohrman on Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US White House discusses Cyber Attacks on Quad Countries

CyberSecurity Insiders

Quad Countries that constitute Japan, United States, India, and Australia were seen discussing cyberattacks on their national infrastructure at the virtual meet held by the White House at the end of last week. . Jake Sullivan, the security advisor to the United States said that quad nations were seen discussing seriously the shortage of semiconductors and the impact of state funded attacks on critical infrastructure. .

article thumbnail

Cyber Attacks: Is the ‘Big One’ Coming Soon?

Security Boulevard

Is it time to ring cyber alarm bells — even louder? Many CSO, CTOs, military leaders, and even some global company CEOs, are now saying yes. Quick Recap 2020 was the year that the COVID-19 crisis also brought a cyber pandemic. Late last year, the security industry’s top experts from global cybersecurity company leadership predicted. The post Cyber Attacks: Is the ‘Big One’ Coming Soon?

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

New PoC for Microsoft Exchange bugs puts attacks in reach of anyone

Bleeping Computer

A security researcher has released a new proof-of-concept exploit this weekend that requires slight modification to install web shells on Microsoft Exchange servers vulnerable to the actively exploited ProxyLogon vulnerabilities. [.].

132
132
article thumbnail

Google releases Spectre PoC code exploit for Chrome browser

Security Affairs

Google released proof-of-concept code to conduct Spectre attacks against its Chrome browser to share knowledge of browser-based side-channel attacks. Google released proof-of-concept code for conducting a Spectre attack against its Chrome browser on GitHub. The experts decided to publish the proof of concept code to demonstrate the feasibility of a web-based Spectre exploit.

Software 129

More Trending

article thumbnail

Experts found 15 flaws in Netgear JGS516PE switch, including a critical RCE

Security Affairs

Netgear has released security and firmware updates for its JGS516PE Ethernet switch to address 15 vulnerabilities, including a critica remote code execution issue. Netgear has released security and firmware updates to address 15 vulnerabilities in its JGS516PE Ethernet switch, including an unauthenticated remote code execution flaw rated as critical.

Firmware 126
article thumbnail

Verkada Surveillance Hack, Breach Highlights IoT Risks

Security Boulevard

Building security vendor Verkada Inc. reported a breach of customer surveillance data to the U.S. Federal Bureau of Investigation (FBI), the company said in a statement. News of the Verkada breach broke Tuesday, along with the release of photos and videos from a number of the approximately 150,000 connected cameras. The affected businesses included such.

article thumbnail

Windows 10 'Spring Update' - The new features and how to download

Bleeping Computer

Windows 10 21H1, aka the 'Spring Update,' is slated for release within the next two months, and while it does not contain too many new and interesting features, it does get us ready for a more exciting feature update coming this fall. [.].

112
112
article thumbnail

Buffalo Public School Ransomware attack details

CyberSecurity Insiders

A ransomware attack that took place on the database of Buffalo Public Schools (BPS) on Friday last week is reportedly being investigated by the Federal Bureau of Investigation(FBI) says a recently posted tweet from the school district. And since the digital infrastructure has been disrupted, the school pupils may witness a holiday for the next day or two this week beginning Monday( March 15th,2021). .

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach

Security Boulevard

Why is federal law enforcement (still) asking Congress for encryption backdoors? Attacks on Microsoft Exchange servers seem to have gotten worse, details on an airline supplier data breach, and the real reason Kevin hasn’t replaced his Chewbacca mannequin with Darth Vader! ** Links mentioned on the show ** The FBI Should Stop Attacking Encryption and […].

article thumbnail

Exclusive Interview With Yoav Keren, Co-Founder & CEO Of BrandShield

SecureBlitz

In this interview, we spoke with Yoav Keren the CEO at BrandShield regarding the increased social media vaccine scams. Since news of a COVID-19 vaccine broke, counterfeits and phishing scams have exploded from Vaccine ‘hard seltzer,’ to social accounts posing as Carol Baskin selling vaccinations. A year ago there were 117 sites, now there are. The post Exclusive Interview With Yoav Keren, Co-Founder & CEO Of BrandShield appeared first on SecureBlitz Cybersecurity.

Scams 101
article thumbnail

Data Privacy Day: Three ways to keep consumer data secure

CyberSecurity Insiders

Data Privacy Day (known in Europe as Data Protection Day) is an international event that occurs every year on the 28 th of January. The purpose of the day is to raise awareness about how businesses and individuals can promote the implementation of privacy and data protection best practices. . With our Europe Data Threat Report revealing in 2020 that European organisations have a false sense of security when it comes to protecting themselves from data breaches, and with GD

article thumbnail

Top 9 Network Access Control (NAC) Solutions

eSecurity Planet

Network Access Control (NAC) helps enterprises implement policies for controlling devices and user access to their networks. NAC can set policies for resource, role, device and location-based access and enforce security compliance with security and patch management policies, among other controls. NAC is an effort to create order out of the chaos of connections from within and outside the organization.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Best Microsoft tools created for Windows 10 power users

Bleeping Computer

Over the past year, Microsoft has quietly released new built-in Windows 10 command-line applications and free Microsoft Store apps that enhance the operating system's functionality. [.].

article thumbnail

Cybersecurity for MSSE 2022

Security Boulevard

I am offering a fully online cybersecurity elective to MSSE second-year students for 2022: SENG 5271. It uses my Cybersecurity in the Cloud specialization offered on Coursera, plus readings and labs from my textbook Elementary Information Security. The course and textbook focus on how technical measures relate to more abstract business and safety goals.

article thumbnail

Twitter bug automatically suspends you when tweeting 'Memphis'

Bleeping Computer

A bug on Twitter is causing users to become temporarily suspended if they tweet the word 'Memphis,' BleepingComputer has confirmed. [.].

article thumbnail

Book Review: Born Digital by Robert Wigley

Security Boulevard

There is a growing generation of adults who have grown up in the digital age, not knowing a life without almost immediate access to a digital connected world. Most adults and children either carry or have access to connected computers, whether they be smartphones, tablets, games consoles, or good old-fashioned PCs, computers have become an essential human tool.

Media 94
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Security Affairs newsletter Round 305

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. Chinese hackers allegedly hit thousands of organizations using Microsoft Exchange REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims Russia-linked APT groups exploited Lithuanian infrastructure to launch attacks Hackers compromised

article thumbnail

BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’

Security Boulevard

Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosec event. Permalink. The post BSides Huntsville 2021 – David Hunt’s ‘Hack In Your Sleep’ appeared first on Security Boulevard.

Hacking 88
article thumbnail

Intego Premium Bundle X9 Review [100% Unbiased]

SecureBlitz

The Mac OS is used exclusively on Apple products. Hence, I will show you the Intego Premium Bundle X9 review, a security suite for mac users. Due to the exclusiveness of the mac OS, there is a general misconception that Apple products are not susceptible to any security breach. However, cyber threats have shown that. The post Intego Premium Bundle X9 Review [100% Unbiased] appeared first on SecureBlitz Cybersecurity.

article thumbnail

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’

Security Boulevard

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink. The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 319’ appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Ep. 142 – You Can Be Right And Still Be Wrong With Brian Phillips

Security Through Education

In this episode of the SECurity Awareness Series of the SEPodcast , Chris Hadnagy and Ryan MacDougall are joined by Brian Phillips who is responsible for i nformation s ecurity at Macy’s. Listen as they discuss how to : build an information security organization , hire the right people, and get buy-in from executives. March 15, 2021 .

article thumbnail

BSides Huntsville 2021 – Ronnie Watson’s ‘Build Yourself An Elastic Threat Hunting And Monitoring SIEM’

Security Boulevard

Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosec event. Permalink. The post BSides Huntsville 2021 – Ronnie Watson’s ‘Build Yourself An Elastic Threat Hunting And Monitoring SIEM’ appeared first on Security Boulevard.

InfoSec 54
article thumbnail

Ep. 142 – You Can Be Right And Still Be Wrong With Brian Phillip

Security Through Education

In this episode of the SECurity Awareness Series of the SEPodcast , Chris Hadnagy and Ryan MacDougall are joined by Brian Phillips who is responsible for i nformation s ecurity at Macy’s. Listen as they discuss how to : build an information security organization , hire the right people, and get buy-in from executives. March 15, 2021 .

article thumbnail

What Does the HIPAA Safe Harbor Bill Mean for Your Practice?

Security Boulevard

Getting incentives for the best security practices is a win-win for all healthcare-related entities. For one, you are getting incentives, and secondly, you are making sure that you have a rock-solid defense in terms of security. Many organizations find that the rules and regulations that HIPAA entails are too extensive and overwhelming, however. What’s more, […]… Read More.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Cloud One – Conformity Rules Support Amazon ECS Exec

Trend Micro

Building in containers offers amazing benefits for development teams – speed, agility, flexibility, scalability, etc.

article thumbnail

Top IoT predictions for 2021

CyberSecurity Insiders

If there’s one thing we learned from 2020, it’s to expect the unexpected! As the COVID-19 pandemic spread around the world, nearly every aspect of life was disrupted. So, with all the uncertainty, why bother with an annual IoT prediction survey ? The IoT is still booming! Despite the challenges of 2020, the IoT industry is thriving. As the world quickly transitioned to remote work and school, the importance of connected devices has never been more apparent.

IoT 86