Thu.Dec 29, 2022

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

KrebsOnSecurity turns 13 years old today. That’s a crazy long time for an independent media outlet these days, but then again I’m bound to keep doing this as long as they keep letting me. Heck, I’ve been doing this so long I briefly forgot which birthday this was! Thanks to your readership and support, I was able to spend more time in 2022 on some deep, meaty investigative stories — the really satisfying kind with the potential to affect positive change.

article thumbnail

Google Home speakers allowed hackers to snoop on conversations

Bleeping Computer

A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely and to turn it into a snooping device by accessing the microphone feed. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Year in review for 2022 – Where is Cybersecurity headed?

Security Boulevard

As another year wraps up, it’s time to take a look back at the cybersecurity trends that dominated the landscape. From the ongoing impact of the past years’ pandemic to major geopolitical events and nation-state cyber attacks, 2022 saw a surge in cyberattacks that shows no signs of slowing down. But what exactly is driving […]. The post Year in review for 2022 – Where is Cybersecurity headed?

article thumbnail

Biden administration passes bill against Quantum Computing Data Breaches

CyberSecurity Insiders

Joe Biden and his administration seems be on a forward thinking gear for quantum technology linked cyber attacks leading to data breaches. On December 21st,2022, the Senate passed a bipartisan bill to prevent data breaches emerging from quantum computing. The Quantum Computing Cybersecurity Preparedness Act was made into a legislation that prevents usage of quantum computing technology in decrypting stolen information, as they can break any kind of cryptographic algorithms.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

6 Reasons Why Today’s Cybersecurity Landscape is so Complex

Security Boulevard

Today’s cyber threat landscape is constantly expanding and evolving. On top of that, threat actors’ attack tactics are increasingly complex and difficult to detect. It can be challenging for organizations to keep up with all the new technologies they are adopting, how and where they are being used, who is using them, and whether they are critical for operations. .

article thumbnail

Extracting Encrypted Credentials From Common Tools

Dark Reading

Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this.

LifeWorks

More Trending

article thumbnail

The horror! The horror! NOTEPAD gets tabbed editing (very briefly)

Naked Security

Is there a special meaning of "don't" that means "go right ahead"?

126
126
article thumbnail

CISA Warns of Active exploitation of JasperReports Vulnerabilities

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two years-old security flaws impacting TIBCO Software's JasperReports product to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaws, tracked as CVE-2018-5430 (CVSS score: 7.7) and CVE-2018-18809 (CVSS score: 9.

Software 125
article thumbnail

Cybersecurity trends and challenges to look out for in 2023

We Live Security

What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023? The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity.

article thumbnail

Telecom Company Intrado Hit by Royal Ransomware Cyberattack

Heimadal Security

Even if the year is coming to a close, threat groups are still as busy. On Tuesday, a cyberattack targeting telecommunication company Intrado was claimed by Royal Ransomware group. The attack started on December 1st. The telecom giant is still to make a public statement about the cyberattack, but sources close to the case told […]. The post Telecom Company Intrado Hit by Royal Ransomware Cyberattack appeared first on Heimdal Security Blog.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Nuclear secrets leak through USB via Insider

CyberSecurity Insiders

Well, it cannot be termed exactly as an insider threat. But surely, an innocent mistake of an employee could have/might have leaked sensitive details to the outside world such as hackers. An IT worker of Sellafield Ltd,UK, accidentally forgot her bag in the parking lot and when she got to know about it and went to pick it up, the USB containing sensitive files fell from the bag into the car park leaving the worker in a state of shock.

Spyware 117
article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Security Boulevard

KrebsOnSecurity turns 12 years old today. That's a crazy long time for an independent media outlet these days, but then again I'm liable to keep doing this as long as they keep letting me! Thanks to your readership and support, I was able to spend more time in 2022 on in-depth investigative stories -- the really satisfying kind with the potential to affect positive change.

Media 115
article thumbnail

How One Jobseeker Used AI to Apply for 200 Jobs in 2 Days

Javvad Malik

The search for a job has never been easy, but with the commoditisation of AI tools, it’s becoming a bit easier for the ambitious jobseeker. Recently, one such individual used AI to apply for nearly 200 jobs in the span of two days – a feat most of us can only dream of achieving. @jerryjhlee Replying to @jaymie_inc this is how you apply to 200 jobs in 2 days — perfect timing with the holidays #resume #jobtips ♬ Betty (Get Money) – Yung Gravy.

article thumbnail

Lake Charles Memorial Hospital Suffered a Ransomware Attack

Heimadal Security

Nearly 270,000 patients of the Lake Charles Memorial Health System (LCMHS) are being notified of a data breach that may have exposed their personal information. An announcement on the LCMHS site reveals that the event occurred on October 21, 2022, when the security staff noticed suspicious behavior on the network. On October 25, 2022, after an […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US passes the Quantum Computing Cybersecurity Preparedness Act – and why not?

Naked Security

Cryptographic agility: the ability and the willingness to change quickly when needed.

article thumbnail

The Worst Hacks of 2022

WIRED Threat Level

The year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks.

Hacking 106
article thumbnail

Netgear warns users to patch recently fixed WiFi router bug

Bleeping Computer

Netgear has fixed a high-severity vulnerability affecting multiple WiFi router models and advised customers to update their devices to the latest available firmware as soon as possible. [.].

Firmware 106
article thumbnail

6 Ways to Protect Your Organization Against LAPSUS$

Dark Reading

Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Ohio Court rules out Ransomware Attack loss on Software

CyberSecurity Insiders

In one of the strange decisions taken by Ohio Supreme Court over a previous judgement pronounced earlier by Ohio Second District Court, the law stated that there must be a direct physical loss or damage to a company in the event of a file encrypting malware disaster. Otherwise, the insurance provider can quash of the policy coverage as the malware infected only the software.

article thumbnail

3 Industries, 3 Security Programs

Dark Reading

Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk.

article thumbnail

Thousands of Citrix servers still vulnerable to CVE-2022-27510 and CVE-2022-27518 

Security Affairs

Researchers warn of thousands of Citrix Application Delivery Controller (ADC) and Gateway endpoints are still unpatched. NCC Group’s Fox-IT research team warns of thousands of Citrix ADC and Gateway endpoints remain vulnerable to two critical vulnerabilities, tracked as CVE-2022-27510 and CVE-2022-27518 (CVSS scores: 9.8), that the company addressed in recent months.

article thumbnail

After the Uber Breach: 3 Questions All CISOs Should Ask Themselves

Dark Reading

How CISOs handle the ethical issues around data breaches can make or break their careers. Don't wait until a breach happens to plot the course forward.

CISO 102
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients

Security Affairs

The Lake Charles Memorial Health System (LCMHS) suffered a ransomware attack that impacted 270,000 patients. The Lake Charles Memorial Health System (LCMHS) disclosed a data breach that affected almost 270,000 patients at its medical centers. The Lake Charles Memorial Health System is the largest not-for-profit community healthcare system in Southwest Louisiana.

article thumbnail

The Kronos Ransomware Attack: Here’s What You Need to Know

Heimadal Security

On Dec. 11, 2021, Kronos, a workforce management company that serves over 40 million people in over 100 countries, was notified that a ransomware attack had compromised its Kronos Private Cloud. As a result of the attack, millions of Kronos employees are still short hundreds or thousands of dollars as the Kronos software continues to […]. The post The Kronos Ransomware Attack: Here’s What You Need to Know appeared first on Heimdal Security Blog.

article thumbnail

12 Pieces Examining Trends in Cybersecurity for 2023

SecureWorld News

We love good "trends in cybersecurity" articles and posts. Here's a compilation of a dozen solid trend pieces looking back at the year that was 2022 and the year ahead in 2023. The State of Cybersecurity in 2022 and Trends and Predictions for 2023 – " These thoughts found in this post won't come from the lens of venture capital or private investing but from a cybersecurity practitioner who still buys software and leads security programs today.". 5 Trends to Watch for Cybersecurity in 2023 – "Fro

article thumbnail

Google Ads Exploited to Spread Malware

Heimadal Security

Google Ads have become increasingly used by malware operators to spread malware to unsuspecting users searching for popular software products. The products impersonated in these campaigns include Grammarly, MSI Afterburner, Slack, Dashlane, Malwarebytes, Audacity, μTorrent, OBS, Ring, AnyDesk, Libre Office, Teamviewer, Thunderbird, and Brave. By cloning the official websites of the above projects, threat actors […].

Malware 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

What Is IoT Connectivity and What Does It Look Like

Security Boulevard

The World of IoT Connectivity has become an inseparable part of daily living. Its flexibility and wide range of potential applications across industries have made it. The post What Is IoT Connectivity and What Does It Look Like appeared first on FirstPoint. The post What Is IoT Connectivity and What Does It Look Like appeared first on Security Boulevard.

IoT 95
article thumbnail

Crypto platform 3Commas admits hackers stole API keys

Bleeping Computer

An anonymous Twitter user published yesterday a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform. [.].

article thumbnail

One Key to Rule Them All? A Very Bad Idea

Security Boulevard

A friend of mine, Igor Odnovorov, always said, “Convenience is the enemy of security.” This recently hit home for me and many others. The post One Key to Rule Them All? A Very Bad Idea appeared first on Security Boulevard.

article thumbnail

Ukraine shuts down fraudulent call center claiming 18,000 victims

Bleeping Computer

A group of imposters operating out of a Ukrainian call center defrauded thousands of victims while pretending to be IT security employees at their banks and leading them to believe that attackers had gained access to their bank accounts. [.].

Banking 82
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!