Thu.Mar 02, 2023

article thumbnail

Dumb Password Rules

Schneier on Security

Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to fail. Some of the systems on the list are even worse: when they fail they don’t tell you why, so you just have to guess until you get it right.

article thumbnail

Weekly Update 337

Troy Hunt

Guns! You know, the things you kinda want to keep pretty well protected and out of the hands of nefarious parties, like the kinds of folks that following their data breach could match firearms to an individual at an address on a phone number of a gender and specific age. But don't worry, no financial information was compromised! 🤦‍♂️ All that and more in the 337th addition of my weekly update, enjoy!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Workspace admins can now use client-side encryption on Gmail and Calendar

Tech Republic Security

Organizations subject to government regulations can gain more control over their own security. The post Google Workspace admins can now use client-side encryption on Gmail and Calendar appeared first on TechRepublic.

article thumbnail

Trezor crypto wallets under attack in SMS phishing campaign

Graham Cluley

Willie Sutton, the criminal who became legendary for stealing from banks during a forty year career, was once asked, "Why do you keep robbing banks?" His answer? "Because that's where the money is." However, today there's a better target for robbers today than banks, which are typically well-defended against theft. Cryptocurrency wallets. Read more in my article on the Tripwire State of Security blog.

Phishing 128
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

1Password is looking to a password-free future. Here’s why

Tech Republic Security

With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to 'eliminate’ passwords entirely. The post 1Password is looking to a password-free future. Here’s why appeared first on TechRepublic.

Passwords 167
article thumbnail

S3 Ep124: When so-called security apps go rogue [Audio + Text]

Naked Security

Rogue software packages. Rogue "sysadmins". Rogue keyloggers. Rogue authenticators. Rogue ROGUES!

LifeWorks

More Trending

article thumbnail

Best and worst data breach responses highlight the do's and don'ts of IR

CSO Magazine

In theory, enterprises should not only have security measures in place to prevent a data breach but should also have detailed plans for a response in the event of a breach. And they should periodically conduct drills to test those plans. Industry-wide best practices for incident response are well established. “In general, you want breach responses to be fairly timely, transparent, communicate with victims in a timely manner, prevent further harm to victims as best as they can do that, and tell s

article thumbnail

S4x23 Review Part 1: What's New in OT Security

Trend Micro

This blog introduces discussions from S4x23, the ICS security conference in Miami over several posts. The first installment will cover two topics from the academic interviews.

article thumbnail

IBM partners up with Cohesity for better data defense in new storage suite

CSO Magazine

Data security and protection are the main upside for IBM’s upcoming storage offering, which combines the company’s own products with those from third parties.

119
119
article thumbnail

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

We Live Security

ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol The post MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT appeared first on WeLiveSecurity

112
112
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Vice Society publishes data stolen during Vesuvius ransomware attack

Graham Cluley

A notorious ransomware gang has claimed responsibility for a cyber attack against Vesuvius, the London Stock Exchange-listed molten metal flow engineering company.

article thumbnail

White House releases an ambitious National Cybersecurity Strategy

CSO Magazine

The White House released its long-anticipated National Cybersecurity Strategy , a comprehensive document that offers fundamental changes in how the US allocates "roles, responsibilities, and resources in cyberspace." The strategy involved months of discussions among more than 20 government agencies and countless consultations with private sector organizations.

article thumbnail

Announcing MelaPress Login Security 1.0.0

Security Boulevard

Today, we are super proud to announce the new and improved MelaPress Login Security (formerly WPassword). This release marks some important changes to our plugin lineup, as well as WP White Security, which we have been working on for the past few months. The post Announcing MelaPress Login Security 1.0.0 appeared first on WP White Security. The post Announcing MelaPress Login Security 1.0.0 appeared first on Security Boulevard.

105
105
article thumbnail

What Is Clone Phishing? Definition, Examples, and Prevention Measures

Heimadal Security

Cybercriminals are using phishing attacks to spread malware and other online threats. But as we get smarter and more educated in blocking their efforts, new types of attacks are constantly invented. That is why hackers are now using clone phishing to steal our money and data. Clone phishing is a more sophisticated type of cybersecurity […] The post What Is Clone Phishing?

Phishing 104
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Google Trust Services now offers TLS certificates for Google Domains customers

Google Security

Andy Warner, Google Trust Services, and Carl Krauss, Product Manager, Google Domains We’re excited to announce changes that make getting Google Trust Services TLS certificates easier for Google Domains customers. With this integration, all Google Domains customers will be able to acquire public certificates for their websites at no additional cost, whether the site runs on a Google service or uses another provider.

DNS 101
article thumbnail

Microsoft releases Windows security updates for Intel CPU flaws

Bleeping Computer

Microsoft has released out-of-band security updates for 'Memory Mapped I/O Stale Data (MMIO)' information disclosure vulnerabilities in Intel CPUs. [.

99
article thumbnail

Hackers Exploit Containerized Environments to Steals Proprietary Data and Software

The Hacker News

A sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. "The attacker exploited a containerized workload and then leveraged it to perform privilege escalation into an AWS account in order to steal proprietary software and credentials," Sysdig said in a new report.

article thumbnail

CISA releases free ‘Decider’ tool to help with MITRE ATT&CK mapping

Bleeping Computer

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released 'Decider,' an open-source tool that helps defenders and security analysts quickly generate MITRE ATT&CK mapping reports. [.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

This Hacker Tool Can Pinpoint a DJI Drone Operator's Exact Location

WIRED Threat Level

Every DJI quadcopter broadcasts its operator's position via radio—unencrypted. Now, a group of researchers has learned to decode those coordinates.

Hacking 98
article thumbnail

WhatsApp, Teams, and Telegram – Banned in Russian Government Organizations

Heimadal Security

Starting March 1st, the Russian law ”On Information, Information Technologies and Information Protection” forbids state organizations to use foreign messenger platforms. The Russian Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor) has banned apps like WhatsApp, Skype for Business, Teams, etc. for state employees` communication.

article thumbnail

How To Choose The Right SEO Agency

SecureBlitz

Without good SEO, an online business is doomed to fail. That is why agencies working in this field are always relevant. To get a really good result, it is important to work with trusted and best-rated SEO agencies. Now we will talk about how to find them and how to choose the one and only. […] The post How To Choose The Right SEO Agency appeared first on SecureBlitz Cybersecurity.

article thumbnail

GootLoader and FakeUpdates Malware Campaign Targets Law Firms

Heimadal Security

Two separate threat campaigns targeted six different law firms in January and February 2023, distributing GootLoader and FakeUpdates, also known as SocGholish malware. GootLoader is a first-stage downloader capable of delivering a wide range of secondary payloads such as Cobalt Strike and ransomware and has been active since late 2020. To funnel victims searching for business-related documents […] The post GootLoader and FakeUpdates Malware Campaign Targets Law Firms appeared first on Heim

Malware 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Threat actors target law firms with GootLoader and SocGholish malware

Security Affairs

Cyber criminals are targeting law firms with GootLoader and FakeUpdates (aka SocGholish) malware families. Researchers from eSentire have foiled 10 cyberattacks targeting six different law firms throughout January and February of 2023. The firms were targeted as part of two distinct campaigns aimed at distributing GootLoader and FakeUpdates (aka SocGholish) malware. “The attacks emanated from two separate threat campaigns.

Malware 98
article thumbnail

SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics

The Hacker News

The threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate, expanding on its ability to target devices running the operating system. The oldest version of the updated artifact dates back to July 2022, with the malware incorporating new features designed to evade security software and resist reverse engineering.

Malware 98
article thumbnail

GunAuction site was hacked and data of 565k accounts were exposed

Security Affairs

Hackers compromised the website GunAuction.com , a website that allows people to buy and sell guns, and stole users’ data. Hackers have compromised GunAuction.com , a website that allows people to buy and sell guns, TechCrunch reported. The attackers have stolen sensitive personal data from more than 550,000 users. Compromised customers’ data include full names, home addresses, email addresses, plaintext passwords, and telephone numbers.

article thumbnail

YouTube under fire for allegedly gathering children's data

Malwarebytes

The UK’s children’s code, introduced three years ago by the Information Commissioner's Office (ICO), is all about ensuring that companies make children’s privacy a primary consideration when creating sites and services, games, and toys. The code, also known as the Age Appropriate Design Code (AADC), may now be stepping into the digital privacy ring.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cisco fixed a critical command injection bug in IP Phone Series

Security Affairs

Cisco addressed a critical vulnerability, tracked as CVE-2023-20078, impacting its IP Phone 6800, 7800, 7900, and 8800 Series products. Cisco released security updates to address a critical flaw impacting its IP Phone 6800, 7800, 7900, and 8800 Series products. The flaw, tracked as CVE-2023-20078 (rated 9.8 out of 10), is a command injection issue that resides in the web-based management interface.

article thumbnail

The Internet’s Future at Stake (Really!) as Supreme Court Takes Up Provider Immunity

Security Boulevard

“No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Those 26 words helped create the modern internet, for better or worse. They provide almost limitless immunity for platforms like Google, Facebook, Twitter and others to disseminate information free.

article thumbnail

Stay Vigilant: Trezor Reports a Massive Crypto Wallet Phishing Scam

Heimadal Security

A phishing campaign poses as a Trezor data breach notification order to steal a target’s cryptocurrency wallet and assets. Trezor is a hardware cryptocurrency wallet that allows users to store their cryptocurrency offline rather than in cloud-based or device-based wallets. Because the wallet is not meant to be connected to your PC, it offers protection […] The post Stay Vigilant: Trezor Reports a Massive Crypto Wallet Phishing Scam appeared first on Heimdal Security Blog.

Scams 98
article thumbnail

Vulnerability Management: Definition, Process & Tools

eSecurity Planet

As enterprise networks continue to grow in size and complexity, so have the misconfigurations and vulnerabilities that could expose those networks to devastating cyber attacks and breaches. Vulnerability management is the process of prioritizing and minimizing those risks. When you consider that the average Fortune 500 company has nearly 500 critical vulnerabilities , the importance of vulnerability management becomes clear.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!