Thu.Jul 06, 2023

article thumbnail

Belgian Tax Hack

Schneier on Security

Here’s a fascinating tax hack from Belgium (listen to the details here , episode #484 of “No Such Thing as a Fish,” at 28:00). Basically, it’s about a music festival on the border between Belgium and Holland. The stage was in Holland, but the crowd was in Belgium. When the copyright collector came around, they argued that they didn’t have to pay any tax because the audience was in a different country.

Hacking 283
article thumbnail

News Alert: Nuvoton underscores its commitment to 8-bit MCU production sustainability

The Last Watchdog

Hsinchu, Taiwan – July 6, 2023 – Nuvoton Technology, one of the world’s leading suppliers of microcontrollers, has proudly launched its MUG51 8-bit MCU series of low power microcontrollers designed for battery-free devices. Nuvoton is committed to sustainable 8-bit MCU production and product longevity to ensure a reliable supply, giving customers the confidence to commit to long-term products, platforms, and projects.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Malware Targets 97 Browser Variants, 76 Crypto Wallets & 19 Password Managers

Tech Republic Security

Learn how the Meduza Stealer malware works, what it targets and how to protect your company from this cybersecurity threat. The post New Malware Targets 97 Browser Variants, 76 Crypto Wallets & 19 Password Managers appeared first on TechRepublic.

article thumbnail

Cisco warns of bug that lets attackers break traffic encryption

Bleeping Computer

Cisco warned customers today of a high-severity vulnerability impacting some data center switch models and allowing attackers to tamper with encrypted traffic. [.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Free Akira ransomware decryptor released for victims who wish to recover their data without paying extortionists

Graham Cluley

There's good news for any business that has fallen victim to the Akira ransomware. Security researchers have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Apps with 1.5M installs on Google Play send your data to China

Bleeping Computer

Security researchers discovered two malicious file management applications on Google Play with a collective installation count of over 1.5 million that collected excessive user data that goes well beyond what's needed to offer the promised functionality. [.

Mobile 141

LifeWorks

More Trending

article thumbnail

Shell Becomes Latest Cl0p MOVEit Victim

Dark Reading

In another MOVEit attack, oil and gas giant Shell saw the release of the private information of its employees.

134
134
article thumbnail

Iranian Hackers' Sophisticated Malware Targets Windows and macOS Users

The Hacker News

The Iranian nation-state actor known as TA453 has been linked to a new set of spear-phishing attacks that infect both Windows and macOS operating systems with malware. "TA453 eventually used a variety of cloud hosting providers to deliver a novel infection chain that deploys the newly identified PowerShell backdoor GorjolEcho," Proofpoint said in a new report.

Malware 128
article thumbnail

Google Searches for 'USPS Package Tracking' Lead to Banking Theft

Dark Reading

Attackers are leveraging well-executed brand impersonation in a Google ads malvertising effort that collects both credit card and bank details from victims.

Banking 127
article thumbnail

Tailing Big Head Ransomware’s Variants, Tactics, and Impact

Trend Micro

We analyze the technical details of a new ransomware family named Big Head. In this entry, we discuss the Big Head ransomware’s similarities and distinct markers that add more technical details to initial reports on the ransomware.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

StackRot Linux Kernel Bug Has Exploit Code on the Way

Dark Reading

Linus Torvalds led a Linux kernel team in developing a set of patches for the privilege escalation flaw.

124
124
article thumbnail

What’s up with Emotet?

We Live Security

ESET research looks back at what Emotet has been up to since its comeback following the takedown in an international collaborative effort in early 2021.

122
122
article thumbnail

SEC Sends Wells Notice to SolarWinds Executives

Security Boulevard

On June 23, 2023, SolarWinds revealed via an SEC Form 8-K filing that the U.S. Securities and Exchange Commission (SEC) notified the company that “certain current and former executive officers and employees of the company, including the company’s chief financial officer and chief information security officer,” had received Wells Notices. What is a Wells Notice, The post SEC Sends Wells Notice to SolarWinds Executives appeared first on Security Boulevard.

article thumbnail

Linux Ransomware Exposed: Not Just a Windows Problem Anymore

Heimadal Security

In the ever-evolving landscape of cyber threats, ransomware has emerged as a pervasive menace, causing widespread damage to individuals and organizations. While most ransomware attacks have historically targeted Windows systems, the rise of Linux ransomware has thrown a new curveball into the mix. Renowned for its robust security features, Linux is no longer immune to […] The post Linux Ransomware Exposed: Not Just a Windows Problem Anymore appeared first on Heimdal Security Blog.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What is a Cybersecurity Incident Response Plan?

Security Boulevard

Cybersecurity threats are a constant problem in today’s digital world. But, for the U.S. school system, it’s an especially serious concern. K-12 school districts process loads of sensitive data about students and staff members. It only takes a single security breach for personal information to wind up in the wrong hands — and at that […] The post What is a Cybersecurity Incident Response Plan?

article thumbnail

Patchless Cisco Flaw Breaks Cloud Encryption for ACI Traffic

Dark Reading

Vulnerable Nexus 9000 Series Fabric Switches in ACI mode should be disabled, Cisco advises.

article thumbnail

S3 Ep142: Putting the X in X-Ops

Naked Security

How to get all your corporate “Ops” teams working together, with cybersecurity correctness as a guiding light.

article thumbnail

Ransomware Attackers Dump Students’ Data Online After School Hacks

Heimadal Security

In a disturbing trend, ransomware gangs have escalated their malicious activities by targeting schools and subsequently dumping students’ private files online. This alarming development has raised concerns among parents, educators, and cybersecurity experts worldwide. According to a recent report, these APTs have shifted their focus to educational institutions, exploiting vulnerabilities in their systems and networks. […] The post Ransomware Attackers Dump Students’ Data Online

Hacking 108
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Apptega Edge – The MSP Ally in Cybersecurity

Security Boulevard

“The gold rush of managed services is quickly coming to an end. Over the next 10 years, we're going to see a consolidation and culling of managed service providers across the board.” That’s a direct quote from Tim Conkle, the CEO of The 20 MSP consortium, that demonstrates the need for MSPs to offer cybersecurity compliance services in order to stay competitive.

article thumbnail

How Threads' Privacy Policy Compares to Twitter's (and Its Rivals')

WIRED Threat Level

Want to try out Meta’s new social media app? Here’s more context on what personal data is collected by Threads and similar social media apps.

Media 105
article thumbnail

BSides Knoxville 2023 – Casey Ellis – Release The Hounds, Part 2

Security Boulevard

Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel. Permalink The post BSides Knoxville 2023 – Casey Ellis – Release The Hounds, Part 2 appeared first on Security Boulevard.

CISO 105
article thumbnail

The State of Passwordless in the Enterprise

Duo's Security Blog

Recently, Cisco Duo sponsored a comprehensive study on Passwordless in the Enterpris e led by ESG senior analyst Jack Poller. Today we will discuss the survey makeup, review key results and explain why Duo’s Passwordless technology is well positioned to meet enterprise authentication needs highlighted in the study. In addition to this blog post, you can find more information on the study results in: ESG’s state of Passwordless in the Enterprise ebook ESG and Duo’s state of Passwordless in the En

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Randall Munroe’s XKCD ‘Room Temperature’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink The post Randall Munroe’s XKCD ‘Room Temperature’ appeared first on Security Boulevard.

105
105
article thumbnail

Microsoft fixes bug behind Windows LSA protection warnings, again

Bleeping Computer

Microsoft is again pushing a Defender Antivirus update (first issued in April and pulled in May) that fixes a known issue triggering Windows Security warnings that Local Security Authority (LSA) Protection is off. [.

article thumbnail

New Tools for Stopping Fraud in the Era of AI

Security Boulevard

Sophisticated identity attacks are on the rise. Learn to prevent them with new anti-fraud protections. It's no secret that the bad guys are training their artificial intelligence (AI) engines to crack passwords, perform account takeovers (ATO), and automate their ransomware demands. In fact, they are using AI to not only predict your users' current passwords. but to go one step further and predict their next password well before those users have even had a chance to think of them!

article thumbnail

Cybersecurity's Future Hinges on Stronger Public-Private Partnerships

Dark Reading

Public and private sector organizations must collaborate on a shared cybersecurity agenda to protect and benefit society at large.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Using Zero Trust to reduce fraud and abuse

Security Boulevard

What does the zero-trust security model look like when it’s applied to online fraud and abuse? In this post, I’ll delve into how concepts from zero-trust can be used to fight fraud and abuse with higher accuracy and less user frustration. The post Using Zero Trust to reduce fraud and abuse appeared first on Security Boulevard.

105
105
article thumbnail

Over 130,000 solar energy monitoring systems exposed online

Bleeping Computer

Security researchers are warning that tens of thousands of photovoltaic (PV) monitoring and diagnostic systems are reachable over the public web, making them potential targets for hackers. [.

99
article thumbnail

StackRot, a new Linux Kernel privilege escalation vulnerability

Security Affairs

StackRot is s new security vulnerability in the Linux kernel that could be exploited to gain elevated privileges on a target system. A security vulnerability, dubbed StackRot was found impacting Linux versions 6.1 through 6.4. The issue, tracked as CVE-2023-3269 , (CVSS score: 7.8), is a privilege escalation issue that resides in the memory management subsystem.

Hacking 98
article thumbnail

'Under Advisement' Bridges Gap Between US Government, Private Industry

SecureWorld News

Under Advisement—an unclassified program of U.S. Cyber Command that allows partners across all sectors of industry to collaborate and share technical information on foreign threats—is doubling in size to further strengthen its efforts to counter foreign cyber threats to the U.S. In a June 29 news release , UNAD (as it's known) was cited for increasing two-way information-sharing that supports the Department of Defense's mission outside of the United States, enabling a broader threat picture and

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!