Thu.Mar 30, 2023

article thumbnail

Russian Cyberwarfare Documents Leaked

Schneier on Security

Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company’s work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU;

article thumbnail

Microsoft adds GPT-4 to its defensive suite in Security Copilot

Tech Republic Security

The new AI security tool, which can answer questions about vulnerabilities and reverse-engineer problems, is now in preview. The post Microsoft adds GPT-4 to its defensive suite in Security Copilot appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft OneNote will block 120 dangerous file extensions

Bleeping Computer

Microsoft has shared more information on what types of malicious embedded files OneNote will soon block to defend users against ongoing phishing attacks pushing malware. [.

Phishing 141
article thumbnail

Ransomware attacks skyrocket as threat actors double down on U.S., global attacks

Tech Republic Security

New studies by NCC Group and Barracuda Networks show threat actors are increasing ransomware exploits, with consumer goods and services receiving the brunt of attacks and a large percentage of victims being hit multiple times. The post Ransomware attacks skyrocket as threat actors double down on U.S., global attacks appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites

Security Boulevard

UK National Crime Agency nips it in the bud: Aims to scare straight naughty DDoS kiddies. The post Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites appeared first on Security Boulevard.

DDOS 140
article thumbnail

Report: Some IT outsourcing is moving back onshore

Tech Republic Security

While cost is generally the main consideration, the war in Ukraine and global political tensions are prompting companies to shift their IT outsourcing strategies, according to a new report. The post Report: Some IT outsourcing is moving back onshore appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

Report: Terrible employee passwords at world’s largest companies

Tech Republic Security

Find out the most commonly used weak passwords by industry and country, according to NordPass. Plus, get tips on creating strong passwords. The post Report: Terrible employee passwords at world’s largest companies appeared first on TechRepublic.

Passwords 200
article thumbnail

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

The Hacker News

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux backdoor called KEYPLUG. "RedGolf is a particularly prolific Chinese state-sponsored threat actor group that has likely been active for many years against a wide range of industries globally," Recorded Future told The Hacker News.

134
134
article thumbnail

Gamers playing with real money should be wary of scammers.

CyberSecurity Insiders

Are you one of those who play games by investing real money to earn double or triple the amount in return? If yes, then you should be wary of scammers who are indulging in various kinds of gaming frauds. Account switching, account takeover, fake identity and promo abuse, money laundering, phishing scams, and fake websites intended to steal sensitive information are some of the frauds targeting gamers these days.

Scams 133
article thumbnail

Are Women Better Equipped than Men to Handle Stressful Situations in Cybersecurity?

Jane Frankland

Do women cope better than men with stress or is gender irrelevant? This was a question I was asked by a leader the other day. It’s also something I’ve referred to often in my keynotes and media interviews. This blog answers the question. The term ‘fight or flight’ (also known as ‘the fight-flight-or-freeze-fawn response,’ ‘hyperarousal’ or ‘the acute stress response’ ) was first coined by Walter Cannon in 1932 and is generally regarded

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

The Hacker News

A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11 Wi-Fi protocol standard, impacting a wide range of devices running Linux, FreeBSD, Android, and iOS.

129
129
article thumbnail

New AlienFox toolkit steals credentials for 18 cloud services

Bleeping Computer

A new modular toolkit called 'AlienFox' allows threat actors to scan for misconfigured servers to steal authentication secrets and credentials for cloud-based email services. [.

article thumbnail

3CX DesktopApp compromised by supply chain attack

CSO Magazine

3CX is working on a software update for its 3CX DesktopApp, after multiple security researchers alerted the company of an active supply chain attack in it. The update will be released in the next few hours; meanwhile the company urges customers to use its PWA (progressive web application) client instead. “As many of you have noticed the 3CX DesktopApp has a malware in it.

Malware 123
article thumbnail

Microsoft Patches 'Dangerous' RCE Flaw in Azure Cloud Service

Dark Reading

The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform's nodes.

120
120
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner. In this article, I will share my advice on best practices that can help CISOs successfully raise awareness and secure the necessary support from their organization’

article thumbnail

Tech Leaders Call for Pause on AI Development

SecureWorld News

We've all seen a movie or TV show where, in the future, our technologies have become so advanced that machines and Artificial Intelligence begin to take over the world. In many cases, albeit fictional, the machines prosper over humanity thanks to the ever-expanding capabilities of AI. A movie like Ex Machina or a show like Westworld play out this scenario very realistically, which is a bit frightening considering the trends we have seen recently in AI.

article thumbnail

Supply chain blunder puts 3CX telephone app users at risk

Naked Security

Booby-trapped app, apparently signed and shipped by 3CX itself after its source code repository was broken into.

Risk 115
article thumbnail

S4x23 Review Part 4: Cybersecurity for Industrial IoT

Trend Micro

In this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity strategy into modernizing environment.

IoT 113
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

APT group Winter Vivern exploits Zimbra webmail flaw to target government entities

CSO Magazine

An APT group known in the security industry as Winter Vivern has been exploiting a vulnerability in the Zimbra Collaboration software to gain access to mailboxes from government agencies in several European countries. While no clear links have been established between Winter Vivern and a particular country's government, security researchers have noted that its activities closely align with the interests of Russia and Belarus.

article thumbnail

World Backup Day is here again – 5 tips to keep your precious data safe

Naked Security

The only backup you will ever regret is the one you didn't make.

Backups 106
article thumbnail

Kyndryl lays off staff in search of efficiency

CSO Magazine

The layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says.

108
108
article thumbnail

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

We Live Security

ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems The post ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine appeared first on WeLiveSecurity

Malware 106
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Unpatched Vulnerabilities Hamper IT Security Efforts

Security Boulevard

Executive leadership teams are overlooking critical gaps in vulnerability management within organizations, despite a series of high-profile breaches, according to an Action1 survey of 804 IT professionals. The study revealed that, on average, 20% of endpoints remain continuously unpatched due to laptop shutdowns or update errors, and 30% of organizations take more than a month.

article thumbnail

Cyberstorage: Leveraging the Multi-Cloud to Combat Data Exfiltration

The Hacker News

Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy for data management. "Multi-cloud by design," and its companion the supercloud, is an ecosystem in which several cloud systems work together to provide many organizational benefits, including increased scale and overall resiliency.

article thumbnail

The Human Aspect in Zero Trust Security

CyberSecurity Insiders

Zero trust security has become a buzzword in the cybersecurity world, emphasizing the need for a more robust and reliable security model. While most guides and articles focus on the technical aspects, there is a crucial element often overlooked: the human aspect and the organizational culture change required for a successful zero trust implementation.

article thumbnail

Winter Vivern hackers exploit Zimbra flaw to steal NATO emails

Bleeping Computer

A Russian hacking group tracked as TA473, aka 'Winter Vivern,' has been actively exploiting vulnerabilities in unpatched Zimbra endpoints since February 2023 to steal the emails of NATO officials, governments, military personnel, and diplomats. [.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apple acquires WaveOne that uses AI to compress videos

CyberSecurity Insiders

Apple has almost made it official that it has acquired WaveOne company that uses Artificial Intelligence technology to compress videos. Well, the tech company did not release a press statement on the issue yet. But one of the former employees of WaveOne has given the world a hint by posting on his profile that the iPhone giant is now the parent company of the Mountain View startup.

article thumbnail

Organizations Reassess Cyber Insurance as Self-Insurance Strategies Emerge

Dark Reading

Risk reassessment is shaking up the cybersecurity insurance market, leading some organizations to consider their options, including self-insurance.

Insurance 101
article thumbnail

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

The Hacker News

A new "comprehensive toolset" called AlienFox is being distributed on Telegram as a way for threat actors to harvest credentials from API keys and secrets from popular cloud service providers.

Malware 101
article thumbnail

Realtek and Cacti flaws now actively exploited by malware botnets

Bleeping Computer

Multiple malware botnets actively target Cacti and Realtek vulnerabilities in campaigns detected between January and March 2023, spreading ShellBot and Moobot malware. [.

Malware 99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!