Thu.Jul 21, 2022

article thumbnail

“Cybersecurity For Dummies” Second Edition Now Available

Joseph Steinberg

The second edition of Cybersecurity For Dummies , Joseph Steinberg’s best-selling introductory-level book about cybersecurity, is now available. Like its first-edition counterpart, CyberSecurity For Dummies: Second Edition is written for general audiences, and can help people of all backgrounds stay cyber-secure, regardless of their technical skillsets.

article thumbnail

Critical Vulnerabilities in GPS Trackers

Schneier on Security

This is a dangerous vulnerability: An assessment from security firm BitSight found six vulnerabilities in the Micodus MV720 , a GPS tracker that sells for about $20 and is widely available. The researchers who performed the assessment believe the same critical vulnerabilities are present in other Micodus tracker models. The China-based manufacturer says 1.5 million of its tracking devices are deployed across 420,000 customers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 305

Troy Hunt

I broke Yoda's stick! 3D printing woes, and somehow I managed to get through the explanation without reverting to a chorus of My Stick by a Bad Lip Reading (and now you'd got that song stuck in your head). Loads of data breaches this week and whilst "legacy", still managed to demonstrate how bad some practices remain today (hi Shadi.com 👋).

article thumbnail

Massive Losses Define Epidemic of ‘Pig Butchering’

Krebs on Security

U.S. state and federal investigators are being inundated with reports from people who’ve lost hundreds of thousands or millions of dollars in connection with a complex investment scam known as “ pig butchering ,” wherein people are lured by flirtatious strangers online into investing in cryptocurrency trading platforms that eventually seize any funds when victims try to cash out.

Scams 328
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to create an effective incident report

Tech Republic Security

Learn what incident report templates are, eight steps on how to write an incident report and five software solutions for creating effective incident reports. The post How to create an effective incident report appeared first on TechRepublic.

Software 197
article thumbnail

Radware Employs Blockchain Technologies to Thwart Bots

Security Boulevard

Radware this week revealed it added blockchain technologies to its Bot Manager platform to thwart attacks designed to evade completely automated public Turing tests to tell computers and humans apart—better known as CAPTCHA challenges. Dr. David Aviv, CTO for Radware, said that while a CAPTCHA challenge can be an effective way to determine if an. The post Radware Employs Blockchain Technologies to Thwart Bots appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Windows 11 now blocks RDP brute-force attacks by default

Bleeping Computer

Recent Windows 11 builds now come with the Account Lockout Policy policy enabled by default which will automatically lock user accounts (including Administrator accounts) after 10 failed sign-in attempts for 10 minutes. [.].

article thumbnail

What Is A Cost Sheet: Everything Explained

SecureBlitz

A cost sheet is a statement that lists the different parts of a product’s total cost and shows data from. Read more. The post What Is A Cost Sheet: Everything Explained appeared first on SecureBlitz Cybersecurity.

article thumbnail

The Kronos Ransomware Attack: What You Need to Know So Your Business Isn't Next

Dark Reading

Identify your business's security posture and head off ransomware attacks with third-party risk management and vendor security assessments.

article thumbnail

9 Best Security Practices for E-Commerce App Developers

Appknox

Smartphones have become a central part of our lives, surpassing the popularity of desktops and laptops. That's why brands and companies these days need to take on a mobile approach when designing and creating applications.

Mobile 135
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Mysterious, Cloud-Enabled macOS Spyware Blows Onto the Scene

Dark Reading

The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities.

Spyware 129
article thumbnail

NSO Group’s Pegasus crashes as Apple initiates Dignity and Justice Fund

CSO Magazine

Much has been written about NSO Group’s collision with government reality when the Israeli firm found itself on the wrong side of a business decision to sell their technologies to entities that used it to target human rights activists, political leaders, journalists, and a bevy of U.S. persons. The collision came in the form of the U.S. government blacklisting the company , effectively drying up a great percentage of their clients to the point where bankruptcy was seen on the horizon.

article thumbnail

Atlassian patched a critical Confluence vulnerability

Security Affairs

Atlassian released security updates to address a critical security vulnerability affecting Confluence Server and Confluence Data Center. Atlassian released security updates to address a critical hardcoded credentials vulnerability in Confluence Server and Data Center tracked as CVE-2022-26138. A remote, unauthenticated attacker can exploit the vulnerability to log into unpatched servers.

article thumbnail

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

Security Boulevard

An add-on vehicle tracker is incredibly insecure—to the point it’s dangerous to use. The MV720 and other products sold by MiCODUS are full of easily exploited bugs. The post MiCODUS Car Trackers are SUPER Vulnerable and Dangerous appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cybersecurity is a constant fire drill—that’s not just bad, it’s dangerous

CSO Magazine

As part of my job as an industry analyst, I do lots of quantitative research with security professionals. One question we often pose to security professionals is around their biggest challenges. The research results often include issues like coping with alert storms, addressing the dangerous threat landscape, managing a multitude of point tools, scaling manual processes, and staffing shortages, along with one.

article thumbnail

Lightning Framework, a previously undetected malware that targets Linux systems

Security Affairs

Researchers discovered a previously undetected malware dubbed ‘Lightning Framework’ that targets Linux systems. Researchers from Intezer discovered a previously undetected malware, tracked as Lightning Framework , which targets Linux systems. The malicious code has a modular structure and is able to install rootkits. “ Lightning Framework is a new undetected Swiss Army Knife-like Linux malware that has modular plugins and the ability to install rootkits. ” reads the repor

Malware 124
article thumbnail

Apple iPhone has over 36 vulnerabilities

CyberSecurity Insiders

All Apple iPhone users are being requested to download the new iOS 15.6 update as it offers patches to almost 39 vulnerabilities, out of which 17 are serious enough to expose users to critical hacks such as access to sensitive data in the iCloud Photo Library. In what’s known to our Cybersecurity Insiders, most of the patches are related to memory safety flaws that could expose users to threat actors launching remote code execution attacks.

article thumbnail

Threat actors target software firm in Ukraine using GoMet backdoor

Security Affairs

Threat actors targeted a large software development company in Ukraine using the GoMet backdoor. Researchers from Cisco Talos discovered an uncommon piece of malware that was employed in an attack against a large Ukrainian software development company. The software development company produces software that is used by various state organizations in Ukraine.

Software 124
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

How To Choose The Best IT Service Provider

SecureBlitz

Here, I will show you how to choose the best IT service provider. When one runs an online business or. Read more. The post How To Choose The Best IT Service Provider appeared first on SecureBlitz Cybersecurity.

article thumbnail

BrandPost: Identity-first Security: How to Keep Your Security Team Strategic

CSO Magazine

The technological arc as we knew it pre-COVID is moving toward a new perimeter. How we work, where we work, and who we work with have all drastically changed in the last three years. Security teams across the globe have been forced to adapt to that change at an incredible pace just to keep up, prioritizing security approaches that align with the evolving threat landscape.

article thumbnail

The Future of Executive Protection is Digital

Security Boulevard

This article was originally written for, and published in, Threatpost. As threats to an executive’s safety and security increase, organizations should look to digital executive protection to help reduce risks manifesting in both the physical and digital worlds. Physical threats against executives are on the rise. Intensified by unprecedented societal tension, pandemic fatigue, and the […].

Risk 115
article thumbnail

Chrome zero-day used to infect journalists with Candiru spyware

Bleeping Computer

The Israeli spyware vendor Candiru was found using a zero-day vulnerability in Google Chrome to spy on journalists and other high-interest individuals in the Middle East with the 'DevilsTongue' spyware. [.].

Spyware 115
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

S3 Ep92: Log4Shell4Ever, travel tips, and scamminess [Audio + Text]

Naked Security

Latest episode - listen, read or both!

115
115
article thumbnail

Google blocks site of largest computing society for being ‘harmful’

Bleeping Computer

Google Search and Drive are erroneously flagging links to Association for Computing Machinery (ACM) research papers and websites as malware. BleepingComputer has successfully reproduced the issue, first reported by researcher Maximilian Golla. [.].

Malware 115
article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation. brooke.crothers. Thu, 07/21/2022 - 15:03. 8 views. What SHA-1 history can teach us? Can the cybersecurity industry learn anything from the problems encountered with the move from the deprecated SHA-1 to the stronger and safer SHA-2 hashing algorithm? Since 2005, SHA-1 has been regarded as unsafe against well-funded adversaries.

article thumbnail

How Conti ransomware hacked and encrypted the Costa Rican government

Bleeping Computer

Details have emerged on how the Conti ransomware gang breached the Costa Rican government, showing the attack's precision and the speed of moving from initial access to the final stage of encrypting devices. [.].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CyberResiliency and End-user Performance

Tech Republic Security

Cyber resiliency is an essential requirement for any business. Given organizations face larger attack surfaces with users working from anywhere, businesses must invest in mature strategies to reduce risk and unencumber workers. New research from ESG finds that cyber-resiliency investments are even more valuable than previously thought: In addition to minimizing risk, they are critical.

Risk 113
article thumbnail

Ex-Coinbase manager charged in first crypto insider-trading case

Bleeping Computer

The U.S. Department of Justice has charged a former Coinbase manager and two co-conspirators with wire fraud conspiracy and scheme to commit insider trading in cryptocurrency assets. [.].

article thumbnail

Evaluating a Managed Detection and Response Provider

Tech Republic Security

This brief details the key requirements you should consider when evaluating managed detection and response services. It then shows how Dell Managed Detection and Response uses a combination of security analytics software, deep threat intelligence, and leading security expertise to significantly improve threat detection and response times. Links to useful resources like webinars and videos.

article thumbnail

Microsoft Teams outage also takes down Microsoft 365 services

Bleeping Computer

What initially started like a minor Microsoft Teams outage has also taken down multiple Microsoft 365 services with Teams integration, including Exchange Online, Windows 365, and Office Online. [.].

113
113
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!