Tue.Dec 20, 2022

article thumbnail

The Equifax Breach Settlement Offer is Real, For Now

Krebs on Security

Millions of people likely just received an email or snail mail notice saying they’re eligible to claim a class action payment in connection with the 2017 megabreach at consumer credit bureau Equifax. Given the high volume of reader inquiries about this, it seemed worth pointing out that while this particular offer is legit (if paltry), scammers are likely to soon capitalize on public attention to the settlement money.

article thumbnail

Trojaned Windows Installer Targets Ukraine

Schneier on Security

Mandiant is reporting on a trojaned Windows installer that targets Ukrainian users. The installer was left on various torrent sites, presumably ensnaring people downloading pirated copies of the operating system: Mandiant uncovered a socially engineered supply chain operation focused on Ukrainian government entities that leveraged trojanized ISO files masquerading as legitimate Windows 10 Operating System installers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Study: Consumer security savvy is way behind IoT threat landscape

Tech Republic Security

A new Comcast study hints at a major risk to businesses, governments and public systems due to poor cybersecurity in the booming Internet of Things industry. The post Study: Consumer security savvy is way behind IoT threat landscape appeared first on TechRepublic.

IoT 179
article thumbnail

GUEST ESSAY: Achieving trust — in a tumultuous 2023 that’s likely to come — can lead to success

The Last Watchdog

The 2020s are already tumultuous. Related: The Holy Grail of ‘digital resiliency’ Individuals are experiencing everything from extraordinary political and social upheaval to war on the European continent to the reemergence of infectious diseases to extreme weather events. Against this unsettling backdrop, citizens, consumers, employees, and partners will look to organizations that they trust for stability and positive long-term relationships.

Banking 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

On-premises vs cloud security: What are the pros and cons?

Tech Republic Security

Is on-premises or cloud computing operations more secure for your business? Consider the security pros and cons with our guide. The post On-premises vs cloud security: What are the pros and cons? appeared first on TechRepublic.

168
168
article thumbnail

A Robot’s View of AI in Cybersecurity

Security Boulevard

An AI chatbot wrote the following article on AI in cybersecurity. For real. No humans were harmed in the drafting of this article. Artificial intelligence (AI) and machine learning (ML) are rapidly advancing technologies that have the potential to greatly impact cybersecurity. These technologies can be used to enhance security by analyzing large amounts of.

More Trending

article thumbnail

Okta's source code stolen after GitHub repositories hacked

Bleeping Computer

In a 'confidential' email notification sent by Okta and seen by BleepingComputer, the company states that attackers gained access to its GitHub repositories this month and stole the company's source code. [.].

Hacking 143
article thumbnail

GitHub offers secret scanning for free

Tech Republic Security

Open source software development service has made it easier for developers using its public repositories to keep coding secrets and tokens close to the chest. The post GitHub offers secret scanning for free appeared first on TechRepublic.

Software 152
article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

ChatGPT, a chatbot developed by OpenAI, is all the rage right now, and is so popular the site continually throws up an overcapacity message. Launched in November of this year, ChatGPT is designed to provide detailed responses and articulate answers across many domains of knowledge. The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it wor

InfoSec 136
article thumbnail

Turbocharge your IT career with this cybersecurity skills training for only $50

Tech Republic Security

Whether you've been in IT for two, five or 10 years, this e-learning bundle can train you for certifications that will give your resume an edge even for the best cybersecurity jobs. The post Turbocharge your IT career with this cybersecurity skills training for only $50 appeared first on TechRepublic.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

UK Data Regulator publishes information of firms hit by data breaches

CyberSecurity Insiders

Next time when you are hit by a cyber attack, you better be aware that the UK’s Information Commissioner’s office (ICO) will soon make the information public by posting it on its website. Yes, this is what the ICO has decided as it believes that naming and shaming will make company heads take measures to safeguard their IT infrastructure and data of users.

article thumbnail

Get a lifetime privacy upgrade with KeepSolid Private Browser for $29

Tech Republic Security

Protect your iOS or Android mobile device with military-grade encryption every time you go online. The post Get a lifetime privacy upgrade with KeepSolid Private Browser for $29 appeared first on TechRepublic.

Mobile 118
article thumbnail

The Data Pipeline and Digital Transformation

Security Boulevard

Companies are generating, ingesting and consuming massive data streams, which are critical for business success. Because of this, Ameesh Divatia, co-founder and CEO of Baffle, believes that digital transformation will accelerate companies’ reliance on data pipelines, allowing multiple sources to feed a data warehouse using streaming mechanisms.

article thumbnail

All GitHub Users Will Need to Enable 2FA by the End of 2023

Heimadal Security

GitHub recently announced that it will require all users who contribute with code on the platform to enable two-factor authentification over the course of 2023. Two-factor authentication (2FA) makes accounts safer by adding an extra step that requires entering a one-time code during the login process. Takeovers of user accounts on GitHub can result in the […].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How SAST and Mayhem Work Together for Comprehensive Application Security Testing

Security Boulevard

Learn how SAST and Mayhem can work together to identify both known-unknown and unknown-unknown risks. The post How SAST and Mayhem Work Together for Comprehensive Application Security Testing appeared first on Security Boulevard.

Risk 112
article thumbnail

Insider Cyber Threats rise by Tech Layoffs

CyberSecurity Insiders

Technology companies in recent times have asked most of their employees to stay home because of the fast-approaching recession or by other factors. But security analysts say that such kind of knee-jerk reactions could spell trouble for the organizations as employees leaving the firm could turn into insider cyber threat out of frustration or anger. Twitter, Facebook, Amazon, HP, Wipro, Oracle, RingCentral, Intel, Microsoft and Cisco have shown the door to most of their senior level employees in t

article thumbnail

How AI/ML Can Thwart DDoS Attacks

Dark Reading

When properly designed and trained, artificial intelligence and machine learning can help improve the accuracy of DDoS detection and mitigation.

DDOS 112
article thumbnail

Equifax Data Breach Settlement of $20,000 per Victim

CyberSecurity Insiders

In the year 2017, Equifax experienced a massive data breach leading to the leak of social security numbers, DOBs, addresses, contact info, and other details of nearly 150 million people. The data leak was investigated and the financial service offering firm stated it was ready to offer a one-year free credit monitoring service to all the victims. Additionally, in February 2022, after facing a dozen of lawsuits, the American credit monitoring company also agreed to pay the victims a stipulated am

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The Matter Standard: Strengthening Smart Home Security

Security Boulevard

One of the many perks touted about the Internet of Things (IoT) is a potential smart home revolution. This revolution sees homes potentially being transformed into futuristic communication networks powered by network-connected smart devices, monitors, sensors and appliances. In the smart home, these devices can all speak to each other and optimize your home environment.

IoT 98
article thumbnail

How to enable event collection in Windows Server

CSO Magazine

Event logs register information about software and hardware events that occur in a system, and they are a key weapon in the arsenal of computer security teams. Windows Server has offered Windows Event Forwarding (WEF) for aggregating system event logs from disparate systems to a central event log server for several versions now. High end security information and event management (SIEM) or security, orchestration, automation, and response (SOAR) systems are the ideal in an enterprise environment

article thumbnail

MVP App Development: The Secret Essence of 7 Successful Apps that Grew from an MVP

Security Boulevard

Even the most successful corporations didn’t get to where they are now instantly. It took multiple revisions, feedback, and growth to realize a final full-fledged. Read More. The post MVP App Development: The Secret Essence of 7 Successful Apps that Grew from an MVP appeared first on ISHIR | Software Development India. The post MVP App Development: The Secret Essence of 7 Successful Apps that Grew from an MVP appeared first on Security Boulevard.

article thumbnail

Raspberry Robin worm drops fake malware to confuse researchers

Bleeping Computer

The Raspberry Robin malware is now trying its hand at some trickery by dropping a fake payload to confuse researchers and evade detection when it detects it's being run within sandboxes and debugging tools. [.].

Malware 97
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Why Visibility is Crucial to Successful Cloud Data Protection

Security Boulevard

Storing data on the cloud can bring a range of benefits, but is your business securing it? Here’s why visibility is critical to cloud data protection. The post Why Visibility is Crucial to Successful Cloud Data Protection appeared first on Security Boulevard.

98
article thumbnail

Microsoft pushes emergency fix for Windows Server Hyper-V VM issues

Bleeping Computer

Microsoft has released emergency out-of-band (OOB) Windows Server updates to address a known issue breaking virtual machine (VM) creation on Hyper-V hosts after installing this month's Patch Tuesday updates. [.].

96
article thumbnail

The Equifax Breach Settlement Offer is Real, For Now

Security Boulevard

Millions of people likely just received an email or snail mail notice saying they're eligible to claim a class action payment in connection with the 2017 megabreach at consumer credit bureau Equifax. Given the high volume of reader inquiries about this, it seemed worth pointing out that while this particular offer is legit (if paltry), scammers are likely to soon capitalize on public attention to the settlement money.

article thumbnail

Russian Hackers Targeted Petroleum Refinery in NATO Country During Ukraine War

The Hacker News

The Russia-linked Gamaredon group attempted to unsuccessfully break into a large petroleum refining company within a NATO member state earlier this year amid the ongoing Russo-Ukrainian war. The attack, which took place on August 30, 2022, is just one of multiple attacks orchestrated by the advanced persistent threat (APT) that's attributed to Russia's Federal Security Service (FSB).

95
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Your Guide to IAM – and IAM Security in the Cloud

Security Boulevard

A look at how IAM works and how CIEM enhances IAM security in the cloud. The post Your Guide to IAM – and IAM Security in the Cloud appeared first on Ermetic. The post Your Guide to IAM – and IAM Security in the Cloud appeared first on Security Boulevard.

98
article thumbnail

UAC-0142 APT targets Ukraine’s Delta military intelligence program

Security Affairs

Ukraine’s CERT-UA revealed the national Delta military intelligence program has been targeted with a malware-based attack. On December 17, 2022, the Center for Innovations and Development of Defense Technologies of the Ministry of Defense of Ukraine informed the Government Computer Emergency Response Team of Ukraine (CERT-UA) of being targeted by a malware-based attack.

Malware 95
article thumbnail

2023 Cloud Native Predictions

Security Boulevard

As we wrap 2022 and look to 2023, here are a round up of cloud native and Kubernetes predictions by the Fairwinds team: Bill Ledingham, Andy Suderman, Robert Brennan and Kendall Miller. The post 2023 Cloud Native Predictions appeared first on Security Boulevard.

98
article thumbnail

Epic Games to Pay $520 Million for Violating Children’s Privacy Laws

Heimadal Security

The Federal Trade Commission (FTC) announced that gaming giant Epic Games would have to pay $520 million in fines for using “design tricks…to dupe millions of players into making unintentional purchases” in Fortnite. While downloading and playing Fortnite are both free, Epic charges for in-game stuff like dance moves and outfits. The FTC estimates that […].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.