Thu.Dec 29, 2022

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

KrebsOnSecurity turns 13 years old today. That’s a crazy long time for an independent media outlet these days, but then again I’m bound to keep doing this as long as they keep letting me. Heck, I’ve been doing this so long I briefly forgot which birthday this was!

Extracting Encrypted Credentials From Common Tools

Dark Reading

Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Biden administration passes bill against Quantum Computing Data Breaches

CyberSecurity Insiders

Joe Biden and his administration seems be on a forward thinking gear for quantum technology linked cyber attacks leading to data breaches. On December 21st,2022, the Senate passed a bipartisan bill to prevent data breaches emerging from quantum computing.

3 Industries, 3 Security Programs

Dark Reading

Security leaders from a media corporation, a commercial real estate company, and an automotive technology company share how they address cyber-risk

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

How One Jobseeker Used AI to Apply for 200 Jobs in 2 Days

Javvad Malik

The search for a job has never been easy, but with the commoditisation of AI tools, it’s becoming a bit easier for the ambitious jobseeker. Recently, one such individual used AI to apply for nearly 200 jobs in the span of two days - a feat most of us can only dream of achieving. jerryjhlee Replying to @jaymie_inc this is how you apply to 200 jobs in 2 days — perfect timing with the holidays #resume #jobtips ♬ Betty (Get Money) - Yung Gravy.

After the Uber Breach: 3 Questions All CISOs Should Ask Themselves

Dark Reading

How CISOs handle the ethical issues around data breaches can make or break their careers. Don't wait until a breach happens to plot the course forward

More Trending

6 Ways to Protect Your Organization Against LAPSUS$

Dark Reading

Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture

6 Reasons Why Today’s Cybersecurity Landscape is so Complex

Security Boulevard

Today’s cyber threat landscape is constantly expanding and evolving. On top of that, threat actors’ attack tactics are increasingly complex and difficult to detect.

Nuclear secrets leak through USB via Insider

CyberSecurity Insiders

Well, it cannot be termed exactly as an insider threat. But surely, an innocent mistake of an employee could have/might have leaked sensitive details to the outside world such as hackers.

Happy 13th Birthday, KrebsOnSecurity!

Security Boulevard

KrebsOnSecurity turns 12 years old today. That's a crazy long time for an independent media outlet these days, but then again I'm liable to keep doing this as long as they keep letting me!

Media 94

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

Ohio Court rules out Ransomware Attack loss on Software

CyberSecurity Insiders

In one of the strange decisions taken by Ohio Supreme Court over a previous judgement pronounced earlier by Ohio Second District Court, the law stated that there must be a direct physical loss or damage to a company in the event of a file encrypting malware disaster.

The horror! The horror! NOTEPAD gets tabbed editing (very briefly)

Naked Security

Is there a special meaning of "don't" that means "go right ahead"? Microsoft Uncategorized Happy New Year humor humour Notepad

90

New Year's Surprise: Cybersecurity M&A, Funding Activity Snowballs in Q4

Dark Reading

Concerns about recessionary trends impacting the cybersecurity sector in 2022 remained largely unfounded in Q4, as investment activity surged after a Q3 slowdown

US passes the Quantum Computing Cybersecurity Preparedness Act – and why not?

Naked Security

Cryptographic agility: the ability and the willingness to change quickly when needed. Cryptography Congress Grover PQC quantum quantum computing Shor

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

What Is IoT Connectivity and What Does It Look Like

Security Boulevard

The World of IoT Connectivity has become an inseparable part of daily living. Its flexibility and wide range of potential applications across industries have made it. The post What Is IoT Connectivity and What Does It Look Like appeared first on FirstPoint.

IoT 80

Google Home speakers allowed hackers to snoop on conversations

Bleeping Computer

A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely and to turn it into a snooping device by accessing the microphone feed. [.]. Security Google

Cybersecurity trends and challenges to look out for in 2023

We Live Security

What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023? The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity

Netgear warns users to patch recently fixed WiFi router bug

Bleeping Computer

Netgear has fixed a high-severity vulnerability affecting multiple WiFi router models and advised customers to update their devices to the latest available firmware as soon as possible. [.]. Security

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

Thousands of Citrix servers still vulnerable to CVE-2022-27510 and CVE-2022-27518

Security Affairs

Researchers warn of thousands of Citrix Application Delivery Controller (ADC) and Gateway endpoints are still unpatched.

VPN 74

Crypto platform 3Commas admits hackers stole API keys

Bleeping Computer

An anonymous Twitter user published yesterday a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform. [.]. Security CryptoCurrency

Thousands of Citrix Servers Still Unpatched for Critical Vulnerabilities

The Hacker News

Thousands of Citrix Application Delivery Controller (ADC) and Gateway endpoints remain vulnerable to two critical security flaws disclosed by the company over the last few months.

106
106

The Worst Hacks of 2022

WIRED Threat Level

The year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks. Security Security / Cyberattacks and Hacks Security / National Security

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

Ukraine shuts down fraudulent call center claiming 18,000 victims

Bleeping Computer

A group of imposters operating out of a Ukrainian call center defrauded thousands of victims while pretending to be IT security employees at their banks and leading them to believe that attackers had gained access to their bank accounts. [.]. Security

CISA Warns of Active exploitation of JasperReports Vulnerabilities

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two years-old security flaws impacting TIBCO Software's JasperReports product to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaws, tracked as CVE-2018-5430 (CVSS score: 7.7)

One Key to Rule Them All? A Very Bad Idea

Security Boulevard

A friend of mine, Igor Odnovorov, always said, “Convenience is the enemy of security.” This recently hit home for me and many others. The post One Key to Rule Them All? A Very Bad Idea appeared first on Security Boulevard.

12 Pieces Examining Trends in Cybersecurity for 2023

SecureWorld News

We love good "trends in cybersecurity" articles and posts. Here's a compilation of a dozen solid trend pieces looking back at the year that was 2022 and the year ahead in 2023.

CISO 66

Randall Munroe’s XKCD ‘Game Night Ordering’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post Randall Munroe’s XKCD ‘Game Night Ordering’ appeared first on Security Boulevard. Humor Security Bloggers Network Randall Munroe Sarcasm satire XKCD

70

Telecom Company Intrado Hit by Royal Ransomware Cyberattack

Heimadal Security

Even if the year is coming to a close, threat groups are still as busy. On Tuesday, a cyberattack targeting telecommunication company Intrado was claimed by Royal Ransomware group. The attack started on December 1st.

The Antidote for the LastPass password vault breach

Security Boulevard

The scale of the recent LastPass breach is so large, changing all the passwords isn’t the most practical or realistic solution. The post The Antidote for the LastPass password vault breach appeared first on VeriClouds.

LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients

Security Affairs

The Lake Charles Memorial Health System (LCMHS) suffered a ransomware attack that impacted 270,000 patients. The Lake Charles Memorial Health System (LCMHS) disclosed a data breach that affected almost 270,000 patients at its medical centers.

How To Minimize Your Cloud Breach Blast Radius

Security Boulevard

Reading Time: 5 minutes Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud. The post How To Minimize Your Cloud Breach Blast Radius appeared first on Security Boulevard.

Lake Charles Memorial Hospital Suffered a Ransomware Attack

Heimadal Security

Nearly 270,000 patients of the Lake Charles Memorial Health System (LCMHS) are being notified of a data breach that may have exposed their personal information.