Mon.Dec 19, 2022

article thumbnail

How to Surrender to a Drone

Schneier on Security

The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone: “Seeing the drone in the field of view, make eye contact with it,” the video instructs. Soldiers should then raise their arms and signal they’re ready to follow. After that the drone will move up and down a few meters, before heading off at walking pace in the direction of the nearest representatives of Ukraine’s army, it says.

334
334
article thumbnail

The security skills shortage is here, here’s how to prepare

Tech Republic Security

Corporate security is near the top of the list of CIO concerns for 2023 — but a security skills shortfall is also a problem. What can companies do to bring up the slack? The post The security skills shortage is here, here’s how to prepare appeared first on TechRepublic.

174
174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange

SecureList

Summary. At the end of September, GTSC reported an attack on critical infrastructure that took place in August. During the investigation, experts found that two 0-day vulnerabilities in Microsoft Exchange Server were used in the attack. The first one, later identified as CVE-2022-41040, is a server-side request forgery (SSRF) vulnerability that allows an authenticated attacker to remotely trigger the next vulnerability – CVE-2022-41082.

Malware 145
article thumbnail

GitHub Secret Scanning is now Free (as in Beer)

Security Boulevard

Microsoft’s GitHub source control service will help stop devs accidentally embedding secrets in public code repositories. It’s a big problem. The post GitHub Secret Scanning is now Free (as in Beer) appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Old vulnerabilities in Cisco products actively exploited in the wild

Security Affairs

IT giant Cisco is warning of threat actors exploiting many old vulnerabilities in attacks in the wild. Cisco has updated multiple security advisories to warn of the active exploitation of several old vulnerabilities impacting its products. The bugs, some of which are rated as ‘critical’ severity, impact Cisco IOS, NX-OS, and HyperFlex software. Below are the critical vulnerabilities being exploited in attacks in the wild: CVE-2017-12240 (CVSS score of 9.8) – The vulnerability affects the D

Wireless 144
article thumbnail

What is Kubernetes Governance?

Security Boulevard

Kubernetes governance is the set of policies and procedures organizations adopt to define how Kubernetes is managed and maintained, and it is an essential part of how enterprises become production-ready at scale. Kubernetes governance includes management of Kubernetes resources, scheduling, upgrades, and role-based access control. It also includes the process for making decisions about Kubernetes, such as how to manage security issues, bug fixes, and feature requests. .

LifeWorks

More Trending

article thumbnail

Diving into an Old Exploit Chain and Discovering 3 new SIP-Bypass Vulnerabilities

Trend Micro

More than two years ago, a researcher, A2nkF demonstrated the exploit chain from root privilege escalation to SIP-Bypass up to arbitrary kernel extension loading. In this blog entry, we will discuss how we discovered 3 more vulnerabilities from the old exploit chain.

136
136
article thumbnail

Experts spotted a variant of the Agenda Ransomware written in Rust

Security Affairs

Researchers spotted a new variant of the Agenda ransomware which is written in the cross-platform programming language Rust. Trend Micro researchers have spotted a new variant of the Agenda ransomware (aka Qilin) that is written in Rust Language. The move follows the decision of other ransomware gangs, like Hive , Blackcat , RansomExx , and Luna , of rewriting their ransomware into Rust.

article thumbnail

How to set up parental controls on your child’s new smartphone

We Live Security

Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls. The post How to set up parental controls on your child’s new smartphone appeared first on WeLiveSecurity.

132
132
article thumbnail

Ukraine defense email systems infected by malware

CyberSecurity Insiders

Ukraine’s war miseries emerging from Russia seem to be never-ending as a compromised email account related to the country’s Ministry of Defense was caught sending phishing emails to users of the Delta Situational awareness program. Ukraine’s Computer Emergency Response Team of Ukraine created DELTA in March this year, to issue an alert to military personnel about the movements of enemy forces.

Malware 131
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

GUEST ESSAY: ‘Initial access brokers’ — IABs — specialize in enabling surreptitious access

The Last Watchdog

Cybercrime is a big business. And like any other large industry, specialization has emerged. Related: IABs fuel ransomware surge. As data becomes more valuable, criminals can profit more from stealing, selling or holding it for ransom, leading to a massive black market of information. Initial access brokers (IABs) play an increasingly central role in this cyber underworld.

article thumbnail

How to Manage BYOD in the Work-from-Anywhere World of Mobile Security

CyberSecurity Insiders

By Ted Wolcott, PhD, Chief Strategy Officer, Quokka. Mobile devices may not have changed fundamentally in recent years, but the way they are used within businesses has. The massive shift toward work-from-anywhere policies means that employees are no longer just bringing their own devices to the workplace. They’re increasingly relying on personal devices to conduct work remotely – and creating new privacy and security challenges for mobile device managers in the process.

Mobile 129
article thumbnail

Malicious PyPI package posed as SentinelOne SDK to serve info-stealing malware

Security Affairs

Researchers spotted a malicious package in the Python Package Index (PyPI) repository that impersonates a software development kit (SDK) for SentinelOne. Cybersecurity researchers at ReversingLabs have discovered a new malicious package, named ‘SentinelOne,’ on the Python Package Index (PyPI) repository that impersonates a legitimate software development kit (SDK) for SentinelOne.

Malware 124
article thumbnail

Holiday Spam, Phishing Campaigns Challenge Retailers

Dark Reading

Revived levels of holiday spending have caught the eye of threat actors who exploit consumer behaviors and prey on the surge of online payments and digital activities during the holidays.

Retail 113
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What is Account Takeover (ATO)?

Security Boulevard

Identity theft takes many shapes and forms, and account takeover is one of them. In this case, ATO happens when a cybercriminal gains unauthorized access to a user’s financial, airline miles, retail, streaming, or mobile device account. Attackers can then make wholesale changes to compromised accounts or use them as part of another attack. […]. The post What is Account Takeover (ATO)?

article thumbnail

BrandPost: Why a Culture of Awareness and Accountability Is Essential to Cybersecurity

CSO Magazine

Effective cybersecurity relies only in part on technology. Even as tools and systems become more powerful, avoiding security mishaps is still largely dependent on people doing the right thing. From following best practices for updating and patching systems and software to knowing and understanding the everyday risks posed by phishing emails, malicious websites, or other attack vectors, everyone — not just the dedicated IT/security professionals — has some level of responsibility for cybersecurit

article thumbnail

Can Your Identity Be Stolen From Your Passport?

Identity IQ

Can Your Identity Be Stolen From Your Passport? IdentityIQ. Most of us are familiar with the concept of identity theft – someone stealing your personal information and using it to commit fraud or other crimes. You can try to take all the proper precautions, but, unfortunately, your identity still might be at risk. For example, this can happen if your passport falls into the wrong hands.

article thumbnail

Sophisticated DarkTortilla Malware Serves Imposter Cisco, Grammarly Pages

Dark Reading

Sites spoofing Grammarly and a Cisco webpage are spreading the DarkTortilla threat, which is filled with follow-on malware attacks.

Malware 111
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Web3 IPFS Only Used for Phishing - So Far

Trend Micro

We discuss the use of the InterPlanetary File System (IPFS) in phishing attacks.

Phishing 109
article thumbnail

Glupteba botnet is back after Google disrupted it in December 2021

Security Affairs

The Glupteba botnet is back, researchers reported a surge in infection worldwide after Google disrupted its operation in 2021. In December 2021, Google announced it has taken down the infrastructure operated by the Glupteba botnet, it also sued Russian nationals Dmitry Starovikov and Alexander Filippov for creating and operating the botnet. The blockchain-enabled botnet has been active since at least 2011, researchers estimated that the Glupteba botnet was composed of more than 1 million Windows

DNS 109
article thumbnail

Microsoft finds macOS bug that lets malware bypass security checks

Bleeping Computer

Apple has fixed a vulnerability that could be leveraged to deploy malware on vulnerable macOS devices via untrusted applications capable of bypassing Gatekeeper application execution restrictions. [.].

Malware 109
article thumbnail

Google Chrome supports passkeys for authentication

CyberSecurity Insiders

In this digital world, nothing seems to be secure enough to hold info tight. So, the only way to prevent digital theft is the use of Passkeys that are now being entertained by companies like Microsoft, Google and Apple for better security. A passkey is nothing but a passcode that enables authenticated access to a website service. It doesn’t have a text-based password in action, but is basically a password-less authentication that can be triggered by using the resources on a device like biometric

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Raspberry Robin Malware Targets Telecom, Governments

Trend Micro

We found samples of the Raspberry Robin malware spreading in telecommunications and government office systems beginning September. The main payload itself is packed with more than 10 layers for obfuscation and is capable of delivering a fake payload once it detects sandboxing and security analytics tools.

article thumbnail

The Near Future of Conflict Will Not be About Oil but Microchips

Security Boulevard

Given the global shortage of ‘new’ oil, an upcoming energy drought and the geopolitical effects that could occur if there’s a decade-long recession in China, the near future of conflict will not be about oil but about microchips. The Microchip As the world shifts to new and more sustainable sources of energy, oil becomes less. The post The Near Future of Conflict Will Not be About Oil but Microchips appeared first on Security Boulevard.

article thumbnail

Cybercrime (and Security) Predictions for 2023

The Hacker News

Threat actors continue to adapt to the latest technologies, practices, and even data privacy laws—and it's up to organizations to stay one step ahead by implementing strong cybersecurity measures and programs. Here's a look at how cybercrime will evolve in 2023 and what you can do to secure and protect your organization in the year ahead.

article thumbnail

US consumers seriously concerned over their personal data

CSO Magazine

A report released today by Big Four accounting firm KPMG found that large majorities of the American public are highly concerned about the security of their personal data, and that US companies aren’t helping matters by ramping up their collection of that data. Fully 92% of respondents to KPMG’s survey said that they were concerned to some extent about how personal data that they provide to companies is handled, and nearly nine in 10 said that businesses should be more forthright in detailing ho

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Details Gatekeeper Bypass Vulnerability in Apple macOS Systems

The Hacker News

Microsoft has disclosed details of a now-patched security flaw in Apple macOS that could be exploited by an attacker to get around security protections imposed to prevent the execution of malicious applications. The shortcoming, dubbed Achilles (CVE-2022-42821, CVSS score: 5.5), was addressed by the iPhone maker in macOS Ventura 13, Monterey 12.6.2, and Big Sur 11.7.

103
103
article thumbnail

T-Mobile Carrier Scammer Gets Decade in the Slammer

Dark Reading

A mobile phone store owner stole T-Mobile employee credentials to "unlock" phones for resale, earning him millions in illicit profits.

Mobile 99
article thumbnail

SECURITY ALERT: Aikido Wiperware Leverages Security Controls Vulnerability to Delete System Files with User-Type Privileges

Heimadal Security

In the wake of SafeBreach’s Aikido Wiperware vulnerability announcement back in early December, many have begun to suspect the possibility of pseudo-ransomware making a comeback. Despite being a Proof-of-Concept (P.O.C), the vulnerability earmarked Aikido Wiperware, opens up new Insider Threat opportunities, alongside specific TTPs (i.e. Tactics, Techniques, and Procedures) that could potentially lead to even […].

article thumbnail

Adult popunder campaign used in mainstream ad fraud scheme

Malwarebytes

This blog post was authored by Jérôme Segura. Online advertising is a multi billion dollar industry with projected spending to reach over 600 billion U.S. dollars for 2022. It's not surprising that criminals are trying their hardest to abuse this ecosystem in any way that they can. One of the biggest threats and always top of mind for advertisers is bot traffic as it is the equivalent of throwing money down the drain with ads that will never be seen by real eye balls.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!