Mon.Nov 14, 2022

article thumbnail

A Digital Red Cross

Schneier on Security

The International Committee of the Red Cross wants some digital equivalent to the iconic red cross, to alert would-be hackers that they are accessing a medical network. The emblem wouldn’t provide technical cybersecurity protection to hospitals, Red Cross infrastructure or other medical providers, but it would signal to hackers that a cyberattack on those protected networks during an armed conflict would violate international humanitarian law, experts say, Tilman Rodenhäuser, a legal adviser to

article thumbnail

Top cybersecurity threats for 2023

Tech Republic Security

Next year, cybercriminals will be as busy as ever. Are IT departments ready? The post Top cybersecurity threats for 2023 appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the 24th International Information Security Conference in Madrid, Spain, on November 17, 2022. The list is maintained on this page.

article thumbnail

MY TAKE: Can Matter 1.0 springboard us from truly smart homes to the Internet of Everything?

The Last Watchdog

Ever feel like your smart home has dyslexia? Siri and Alexa are terrific at gaining intelligence with each additional voice command. And yet what these virtual assistants are starkly missing is interoperability. Related: Why standards are so vital. Matter 1.0 is about to change that. This new home automation connectivity standard rolls out this holiday season with sky high expectations.

Internet 213
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Data encryption as a crucial step to manage data access and security

Tech Republic Security

With data breaches on the rise, encryption has never been more important for protecting companies against hackers and cyberattacks. The post Data encryption as a crucial step to manage data access and security appeared first on TechRepublic.

article thumbnail

Unscrambling Cybersecurity Acronyms – The ABCs of MDR and XDR Security

Cisco Security

In the second part of this blog series on Unscrambling Cybersecurity Acronyms , we covered Endpoint Detection and Response (EDR) and Managed Endpoint Detection and Response (MEDR) solutions, which included an overview of the evolution of endpoint security solutions. In this blog, we’ll go over Managed Detection and Response (MDR) and Extended Detection and Response (XDR) solutions in more depth. .

LifeWorks

More Trending

article thumbnail

All Cyberattacks Have This in Common

CyberSecurity Insiders

We’re all aware that cybercrime is everywhere. FUD to the max. When things become commonplace, we start to become numb to the news. We are no longer surprised or shocked that these things happen, or who they happen to. There is no instruction manual to perfect security. All businesses run differently and no product is impenetrable. Plus, humans work at our companies.

article thumbnail

ESET APT Activity Report T2 2022

We Live Security

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022. The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity.

142
142
article thumbnail

Have board directors any liability for a cyberattack against their company?

Security Affairs

Are the directors of a company hit by a cyberattack liable for negligence in failing to take steps to limit the risk. As the risk of a cyberattack grows, it is pivotal to consider whether the directors of a company hit by a ransomware attack, for example, can bear any liability for negligence in failing to take steps to limit the risk. During the past few weeks, I had the pleasure of running a presentation on how to deal with the risk of ransomware cyberattacks on corporations for the benefit of

article thumbnail

Is the Grid Secure Enough for the Electric Vehicle Influx?

IT Security Guru

Electric vehicles have become the hottest item in the market and sales are growing year after year. This is the most fundamental transformation in road transport; however, concerns do exist. Can the US grid sustain the increased demand for electricity and how can smart grids help in this direction? Can we limit the exposure of charging stations and vehicles to cyber-attacks?

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Cyber Attack on HaveIBeenPwned leaks email data to hackers

CyberSecurity Insiders

HaveIBeenPwned serves as a platform for those who can search for their email address to find whether it was accessed by hackers via a data breach. But what if the platform itself gets infiltrated and leaks the whole of its database to cyber crooks? Well, unconfirmed reports state that the entire database owned by the Microsoft Regional Director Troy Hunt was hacked by cyber criminals through an unknown vulnerability.

article thumbnail

Windows Kerberos authentication breaks after November updates

Bleeping Computer

Microsoft is investigating a new known issue causing enterprise domain controllers to experience Kerberos sign-in failures and other authentication problems after installing cumulative updates released during this month's Patch Tuesday. [.].

article thumbnail

Advanced threat predictions for 2023

SecureList

It is fair to say that since last year’s predictions , the world has dramatically changed. While the geopolitical landscape has durably shifted, cyberattacks remain a constant threat and show no signs of receding – quite the contrary. No matter where they are, people around the world should be prepared for cybersecurity incidents. A useful exercise in that regard is to try to foresee the future trends and significant events that might be coming in the near future.

Firmware 127
article thumbnail

No Code / Low Code for Social Engineering

Security Boulevard

The dark web is a treasure trove of information, data, and malicious software. Most people do not know about the dark web and, if they do, they don’t really know what is available on it. For both professional and personal reasons, I worry about the dark web a lot. Here's why. This past weekend, I was in the car with my kids and somehow, I can’t remember how, we got on the subject of the dark web.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Over 15,000 WordPress Sites Compromised in Malicious SEO Campaign

The Hacker News

A new malicious campaign has compromised over 15,000 WordPress websites in an attempt to redirect visitors to bogus Q&A portals. "These malicious redirects appear to be designed to increase the authority of the attacker's sites for search engines," Sucuri researcher Ben Martin said in a report published last week, calling it a "clever black hat SEO trick.

article thumbnail

Cloud Security is a shared responsibility, and big CSPs are also not foolproof

CyberSecurity Insiders

With Cloud Security, there is a myth prevailing among users that only the top brands offer many security resources, making them infallible. But according to John McDonough, the Consulting Cloud Architect from Fortinet, such an assumption is a myth as even the top brands such as Microsoft can fall prey to sophisticated attacks launched these days. Users need to change their viewpoint when it comes to foreseeing cloud security.

article thumbnail

Australia Is Forming a Squad for Combating Cyber Threat Groups

Heimadal Security

In the previous months, threat actors have been heavily targeting Australian companies, two of the most notorious cases being the leaking of data from Optus, the country’s second-largest telecom provider, and Medibank, the largest health insurance company in Australia. The hacker’s actions prompted the Australian government to promise its citizens retribution against threat actors.

article thumbnail

Google will pay $391M to settle Android location tracking lawsuit

Bleeping Computer

Google has agreed to pay $391.5 million to settle a lawsuit filed by a coalition of attorneys general from 40 U.S. states alleging that the search giant tracked Android users' locations since at least 2014 even when they thought location tracking was disabled. [.].

103
103
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

New York-barred attorneys required to complete cybersecurity, privacy, and data protection training

CSO Magazine

New York-barred attorneys will be required to complete one continuing legal education (CLE) credit hour of cybersecurity, privacy, and data protection training as part of their biennial learning requirement beginning July 1, 2023. New York is the first jurisdiction to stipulate this specific requirement as the state aims to emphasize the technical competence duty of lawyers to meet professional, ethical and contractual obligations to safeguard client information.

article thumbnail

Twitter’s SMS Two-Factor Authentication Is Melting Down

WIRED Threat Level

Problems with the important security feature may be some of the first signs that Elon Musk’s social network is fraying at the edges.

article thumbnail

Quantum Cryptography Apocalypse: A Timeline and Action Plan

Dark Reading

Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.

article thumbnail

Google to Pay $391 Million Privacy Fine for Secretly Tracking Users' Location

The Hacker News

Internet giant Google has agreed to pay a record $391.5 million to settle with 40 states in the U.S. over charges the company misled users about the collection of personal location data.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks

Security Affairs

Researchers spotted a new evasive malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak credentials. Akamai Security Research discovered a new evasive Golang-based malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak login credentials. The malware was employed in cryptocurrency mining campaigns and to launch denial-of-service (DDoS) attacks.

DDOS 98
article thumbnail

State of Phishing Report Reveals More Than 255 Million Attacks in 2022

Security Boulevard

SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of phishing attacks compared to 2021. The latest State of Phishing Report findings highlights that some security strategies are […].

article thumbnail

Massive Black hat SEO campaign used +15K WordPress sites

Security Affairs

Experts warn of a malicious SEO campaign that has compromised over 15,000 WordPress websites to redirect visitors to fake Q&A portals. Since September 2022, researchers from security firm Sucuri have tracked a surge in WordPress malware redirecting website visitors to fake Q&A sites via ois[.]is. The campaign’s end goal appears to be black hat SEO aimed at increasing the reputation of the attacker’s sites.

Malware 98
article thumbnail

Surfshark Incogni Black Friday Deal 2022

SecureBlitz

Read on for the Surfshark Incogni Black Friday deal for 2022. The holiday season does come with many bonuses. Many companies use it to increase sales because customers watch out for amazing offers this season. Here it is if you’ve been eyeing the Surfshark Incogni black Friday deal. Surfshark gives you a year subscription for […]. The post Surfshark Incogni Black Friday Deal 2022 appeared first on SecureBlitz Cybersecurity.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CERT-UA warns of multiple Somnia ransomware attacks against organizations in Ukraine

Security Affairs

Russian threat actors employed a new ransomware family called Somnia in attacks against multiple organizations in Ukraine. The Government Computer Emergency Response Team of Ukraine CERT-UA is investigating multiple attacks against organizations in Ukraine that involved a new piece of ransomware called Somnia. Government experts attribute the attacks to the group ‘From Russia with Love’ (FRwL) (aka Z-Team, UAC-0118), which is believed to be a group of Pro-Russia hacktivists. “F

article thumbnail

Chinese Cyberspies Responsible for BadBazaar Android Malware

Heimadal Security

A spyware tool known as BadBazaar, has been discovered targeting ethnic and religious minorities in China, mainly the Uyghurs in Xinjiang. The new Android spyware was originally discovered by MalwareHunterTeam and linked to Bahamut, a threat actor primarily active in the Middle East. Upon further analysis by Lookout, the malware was found to be new spyware using the infrastructure […].

Malware 98
article thumbnail

GDPR – Privacy First

Security Boulevard

GDPR – Privacy First GDPR – Privacy First Let us start this by talking about why privacy is important to the business. You want to assure your customers, especially in Europe that you take their data seriously and will develop processes to protect it. The recent companies that have been fined by the European Union […]. The post GDPR – Privacy First first appeared on SecureFLO.

98
article thumbnail

The Risk of Cybersecurity Threats Continues To Grow for the Auto Industry

GlobalSign

Discover the latest innovations driving the risk of cyberattacks in the auto industry, plus the primary cyber threats for automotive manufacturers.

Risk 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!