Mon.May 24, 2021

Welcoming the Trinidad & Tobago Government to Have I Been Pwned

Troy Hunt

Today I'm very happy to welcome the first Caribbean government to Have I Been Pwned, Trinidad & Tobago.

AIs and Fake Comments

Schneier on Security

This month, the New York state attorney general issued a report on a scheme by “U.S. Companies and Partisans [to] Hack Democracy.” ” This wasn’t another attempt by Republicans to make it harder for Black people and urban residents to vote.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Employers are watching remote workers and they're monitoring these activities

Tech Republic Security

While many employers are tapping technologies to monitor workflows, a new report highlights potential drawbacks and even resentment among surveilled employees

SHARED INTEL: Akamai reports web attack traffic spiked 62 percent in 2020 — all sectors hit hard

The Last Watchdog

Some instructive fresh intelligence about how cyber attacks continue to saturate the Internet comes to us from Akamai Technologies. Related: DHS launches 60-day cybersecurity sprints. Akamai, which happens to be the Hawaiian word for “smart,” recently released its annual State of the Internet security report. As a leading global content delivery network (CDN), Akamai has a birdseye view of what is coursing through cyber space moment-by-moment.

Apple? Issues Patches to Combat Ongoing 0-Day Attacks on macOS, tvOS

The Hacker News

Apple on Monday rolled out security updates for iOS, macOS, tvOS, watchOS, and Safari web browser to fix multiple vulnerabilities, including an actively exploited zero-day flaw in macOS Big Sur and expand patches for two previously disclosed zero-day flaws.

95

SolarWinds, Exchange attacks revive calls for mandatory breach notification, better information sharing

CSO Magazine

On the heels of three major cybersecurity incidents over the past six months—the SolarWinds and Microsoft Exchange supply chain attacks and the Colonial Pipeline ransomware attack—government officials and some in the private sector are reviving calls for better information sharing and national breach notification requirements.

New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices

The Hacker News

Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks.

94

More Trending

Zeppelin ransomware gang is back after a temporary pause

Security Affairs

Operators behind the Zeppelin ransomware-as-a-service (RaaS) have resumed their operations after a temporary interruption.

XDR Delivers Significant Performance Improvement over SIEM

CyberSecurity Insiders

In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean Time to Detection (MTTD) and Mean Time to Remediation (MTTR). The risk and exposure from any cyber threat can be reduced significantly by improving these metrics.

Audio maker Bose discloses data breach after ransomware attack

Bleeping Computer

Bose Corporation (Bose) has disclosed a data breach following a ransomware attack that hit the company's systems in early March. [.]. Security

FBI warns of Conti ransomware attacks against healthcare organizations

Tech Republic Security

The attacks have targeted US healthcare and first responder networks with ransom demands as high as $25 million, says the FBI

Bluetooth flaws allow attackers to impersonate legitimate devices

Bleeping Computer

Attackers could abuse vulnerabilities discovered in the Bluetooth Core and Mesh Profile specifications to impersonate legitimate devices during the pairing process and launch man-in-the-middle (MitM) attacks. [.]. Security

113
113

Details Disclosed On Critical Flaws Affecting Nagios IT Monitoring Software

The Hacker News

Cybersecurity researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be abused by an adversary to hijack the infrastructure without any operator intervention. "In

FBI intelligence analyst indicted for theft of cybersecurity, counterterrorism documents

Zero Day

The former agent held top-level clearance privileges

French intel found flaws in Bluetooth Core and Mesh specs

Security Affairs

Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks.

North Korean hackers behind CryptoCore multi-million dollar heists

Bleeping Computer

Security researchers piecing together evidence from multiple attacks on cryptocurrency exchanges, attributed to a threat actor they named CryptoCore have established a strong connection to the North Korean state-sponsored group Lazarus. [.]. Security

US banks are giving facial recognition a go; EU tightens regulations, FTC updates AI guidelines

Security Affairs

US banks are giving the green light to the adoption of facial recognition technology, while authorities provide regulations and updates guidelines. Many among the US biggest banks are trying their luck with facial recognition technology.

What To Do When Your Business Is Hacked

The Hacker News

As businesses move to a remote workforce, hackers have increased their activity to capitalize on new security holes. Cybercriminals often use unsophisticated methods that continue to be extremely successful.

The new group policies coming to Windows 10 21H2

Bleeping Computer

As Microsoft continues to develop the Windows 10 21H2 feature update, we can use the preview builds to get a glimpse of the upcoming features, changes, and new group policies coming to the operating system this fall. [.]. Microsoft

97

Researchers Link CryptoCore Attacks On Cryptocurrency Exchanges to North Korea

The Hacker News

State-sponsored hackers affiliated with North Korea have been behind a slew of attacks on cryptocurrency exchanges over the past three years, new evidence has revealed.

Reinventing Asset Management for Cybersecurity Professionals

IT Security Guru

In conversations with our customers, it’s very clear that organisations need to establish a comprehensive view of their IT asset infrastructure because you can’t secure what you don’t know or can’t see.

Risk 67

Turning every Android device into a trusted companion

CyberSecurity Insiders

In this blog, I am joined by my colleagues Stéphane Quetglas, Marketing Director, Embedded Products and Jean-François Rubon, Strategy and Partnership, as well as Sudhi Herle, Head of Android TM Platform Security at Google, to discuss the latest innovation in embedded secure element (eSE).

FBI Analyst Accused of Stealing and Hoarding Classified Data, Including on Cyber Threats

Hot for Security

A federal grand jury indicted an employee of the FBI’s Kansas City Division for taking classified documents at home, for years on end, related to counterterrorism procedures, counterintelligence and cyber threats.

Eight suspects busted in raid on “home delivery” scamming operation

Naked Security

Some victims of home delivery scams end up with their entire bank accounts drained. Don't get caught out! Law & order bust devlivery scam Royal Mail Scam

Scams 66

Should I Trust VPN Review Sites?

SecureBlitz

In this post, I will answer the question - should you trust VPN review sites? based on personal experience. Some websites have even made it a point to review VPNs. They judge how secure these VPNs are and the general user-friendliness of the VPNs.

VPN 65

US Postal service conducts public surveillance program with Facial Recognition

CyberSecurity Insiders

Interestingly, the United States Postal Services(USPS) department is conducting a surveillance program for the past few weeks with the help of Facial Recognition integrated with Artificial Intelligence. .

Rom?con: How romance fraud targets older people and how to avoid it

We Live Security

Online dating scams often follow the same script – here’s what senior citizens should watch out for and how their younger relatives can help them avoid falling victim. The post Rom‑con: How romance fraud targets older people and how to avoid it appeared first on WeLiveSecurity. How To

Scams 63

Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise

Dark Reading

A global insurance carrier refuses to write new ransomware policies in France, while insurers rewrite policies. Are we heading toward a day when ransomware incidents become uninsurable

American Express slapped with £90,000 penalty for spamming customers

CyberSecurity Insiders

American Express (Amex), a New York-based financial services company was slapped with a penalty of £90,000 for spamming customers with unwanted marketing emails, despite their unsubscription from the service. .

As Threat Hunting Matures, Malware Labs Emerge

Dark Reading

By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process

AWS IAM security

CyberSecurity Insiders

Executive summary. AWS Policies are a key foundation in good cloud security, but they are often overlooked. In this blog, we take a quick look on some AWS Policies, particularly for Identity and Access Management (IAM), that could become problematic if not properly managed.

Cartoon Caption Winner: Magic May

Dark Reading

And the winner of The Edge's May cartoon caption contest is

59

How to disable the Linux login banner

Tech Republic Security

Looking to eke out as much security as you can from your Linux servers? Jack Wallen shows you how you can limit the information would-be ne'er-do-wells get by disabling the login banner

83

Stepping on the cracks

Notice Bored

Anyone seeking information security standards or guidance is spoilt for choice e.g. : ISO27k - produced by a large international committee of subject matter experts and national representatives NIST SP 800 series – well researched, well written, actively maintained. and FREE!

13 flaws in Nagios IT Monitoring Software pose serious risk to orgs

Security Affairs

Researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be exploited for malicious purposes.

FBI identifies 16 Conti ransomware attacks striking US healthcare, first responders

Zero Day

One of Conti’s latest victims is Ireland’s health service

Can Web Security Tools Prevent Data Breaches?

Security Boulevard

For most, 2020 will go down in history as the year of the COVID-19 pandemic. The year that everything shut down, jobs were lost and social distancing became the ‘new normal.’