Mon.Nov 14, 2022

article thumbnail

A Digital Red Cross

Schneier on Security

The International Committee of the Red Cross wants some digital equivalent to the iconic red cross, to alert would-be hackers that they are accessing a medical network. The emblem wouldn’t provide technical cybersecurity protection to hospitals, Red Cross infrastructure or other medical providers, but it would signal to hackers that a cyberattack on those protected networks during an armed conflict would violate international humanitarian law, experts say, Tilman Rodenhäuser, a legal adviser to

article thumbnail

Top cybersecurity threats for 2023

Tech Republic Security

Next year, cybercriminals will be as busy as ever. Are IT departments ready? The post Top cybersecurity threats for 2023 appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the 24th International Information Security Conference in Madrid, Spain, on November 17, 2022. The list is maintained on this page.

article thumbnail

MY TAKE: Can Matter 1.0 springboard us from truly smart homes to the Internet of Everything?

The Last Watchdog

Ever feel like your smart home has dyslexia? Siri and Alexa are terrific at gaining intelligence with each additional voice command. And yet what these virtual assistants are starkly missing is interoperability. Related: Why standards are so vital. Matter 1.0 is about to change that. This new home automation connectivity standard rolls out this holiday season with sky high expectations.

Internet 183
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Data encryption as a crucial step to manage data access and security

Tech Republic Security

With data breaches on the rise, encryption has never been more important for protecting companies against hackers and cyberattacks. The post Data encryption as a crucial step to manage data access and security appeared first on TechRepublic.

article thumbnail

ESET APT Activity Report T2 2022

We Live Security

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022. The post ESET APT Activity Report T2 2022 appeared first on WeLiveSecurity.

141
141

More Trending

article thumbnail

Cyber Attack on HaveIBeenPwned leaks email data to hackers

CyberSecurity Insiders

HaveIBeenPwned serves as a platform for those who can search for their email address to find whether it was accessed by hackers via a data breach. But what if the platform itself gets infiltrated and leaks the whole of its database to cyber crooks? Well, unconfirmed reports state that the entire database owned by the Microsoft Regional Director Troy Hunt was hacked by cyber criminals through an unknown vulnerability.

article thumbnail

Windows Kerberos authentication breaks after November updates

Bleeping Computer

Microsoft is investigating a new known issue causing enterprise domain controllers to experience Kerberos sign-in failures and other authentication problems after installing cumulative updates released during this month's Patch Tuesday. [.].

article thumbnail

Is the Grid Secure Enough for the Electric Vehicle Influx?

IT Security Guru

Electric vehicles have become the hottest item in the market and sales are growing year after year. This is the most fundamental transformation in road transport; however, concerns do exist. Can the US grid sustain the increased demand for electricity and how can smart grids help in this direction? Can we limit the exposure of charging stations and vehicles to cyber-attacks?

article thumbnail

No Code / Low Code for Social Engineering

Security Boulevard

The dark web is a treasure trove of information, data, and malicious software. Most people do not know about the dark web and, if they do, they don’t really know what is available on it. For both professional and personal reasons, I worry about the dark web a lot. Here's why. This past weekend, I was in the car with my kids and somehow, I can’t remember how, we got on the subject of the dark web.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Google will pay $391M to settle Android location tracking lawsuit

Bleeping Computer

Google has agreed to pay $391.5 million to settle a lawsuit filed by a coalition of attorneys general from 40 U.S. states alleging that the search giant tracked Android users' locations since at least 2014 even when they thought location tracking was disabled. [.].

109
109
article thumbnail

Cloud Security is a shared responsibility, and big CSPs are also not foolproof

CyberSecurity Insiders

With Cloud Security, there is a myth prevailing among users that only the top brands offer many security resources, making them infallible. But according to John McDonough, the Consulting Cloud Architect from Fortinet, such an assumption is a myth as even the top brands such as Microsoft can fall prey to sophisticated attacks launched these days. Users need to change their viewpoint when it comes to foreseeing cloud security.

article thumbnail

Instagram, Facebook, Twitter, YouTube suspended in Turkey after blast

Bleeping Computer

Following yesterday's deadly blast on ?stiklal Avenue in Istanbul, Turkish authorities began restricting access to social media including Instagram, Facebook, Twitter, YouTube and Telegram. [.].

Media 107
article thumbnail

New York-barred attorneys required to complete cybersecurity, privacy, and data protection training

CSO Magazine

New York-barred attorneys will be required to complete one continuing legal education (CLE) credit hour of cybersecurity, privacy, and data protection training as part of their biennial learning requirement beginning July 1, 2023. New York is the first jurisdiction to stipulate this specific requirement as the state aims to emphasize the technical competence duty of lawyers to meet professional, ethical and contractual obligations to safeguard client information.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Over 15,000 WordPress Sites Compromised in Malicious SEO Campaign

The Hacker News

A new malicious campaign has compromised over 15,000 WordPress websites in an attempt to redirect visitors to bogus Q&A portals. "These malicious redirects appear to be designed to increase the authority of the attacker's sites for search engines," Sucuri researcher Ben Martin said in a report published last week, calling it a "clever black hat SEO trick.

article thumbnail

State of Phishing Report Reveals More Than 255 Million Attacks in 2022

Security Boulevard

SlashNext analyzed billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of phishing attacks compared to 2021. The latest State of Phishing Report findings highlights that some security strategies are […].

article thumbnail

Microsoft fixes Windows DirectAccess connectivity issues

Bleeping Computer

Microsoft has resolved a known issue causing connectivity problems for Windows customers using the DirectAccess service to access their organizations remotely without using a virtual private network (VPN). [.].

VPN 98
article thumbnail

GDPR – Privacy First

Security Boulevard

GDPR – Privacy First GDPR – Privacy First Let us start this by talking about why privacy is important to the business. You want to assure your customers, especially in Europe that you take their data seriously and will develop processes to protect it. The recent companies that have been fined by the European Union […]. The post GDPR – Privacy First first appeared on SecureFLO.

98
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Google to Pay $391 Million Privacy Fine for Secretly Tracking Users' Location

The Hacker News

Internet giant Google has agreed to pay a record $391.5 million to settle with 40 states in the U.S. over charges the company misled users about the collection of personal location data.

article thumbnail

Dig Deeper into the Essentials of Microsoft Azure Security

Security Boulevard

In the next few minutes, you will explore the in-depth design of Azure services and capabilities to help you secure, manage and monitor your cloud data and infrastructure. As a managed service, Microsoft designs and operates its cloud services with security at the core and provides you with built-in controls and tools to meet your […]. The post Dig Deeper into the Essentials of Microsoft Azure Security appeared first on PeoplActive.

article thumbnail

42,000 sites used to trap users in brand impersonation scheme

Bleeping Computer

A malicious for-profit group named 'Fangxiao' has created a massive network of over 42,000 web domains that impersonate well-known brands to redirect users to sites promoting adware apps, dating sites, or 'free' giveaways. [.].

Adware 95
article thumbnail

Strata’s no-code Orchestration Recipes automate end-to-end identity use cases

Security Boulevard

BOULDER, Colo., Nov. 15, 2022 —Strata Identity, the Identity Orchestration company, today announced its first no-code Orchestration Recipes for deploying end-to-end, automated customer use cases on the Maverics multi-cloud identity orchestration platform. Why use Identity Orchestration Recipes instead of “connectors”? Traditional “connectors” merely link two identity products on a one-to-one basis, while Strata’s Orchestration Recipes.

98
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks

Security Affairs

Researchers spotted a new evasive malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak credentials. Akamai Security Research discovered a new evasive Golang-based malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak login credentials. The malware was employed in cryptocurrency mining campaigns and to launch denial-of-service (DDoS) attacks.

DDOS 93
article thumbnail

Addressing the Specialized Cybersecurity Talent Shortage

Security Boulevard

Cybersecurity threats are increasingly complex and destructive. With more devices connected to the internet than ever before, the number of exploitable vulnerabilities is expanding, and no organization is immune. One unprotected link in the security chain could enable hackers to unlock virtually limitless doors to access data. It’s become a never-ending arms race between bad.

article thumbnail

Whoosh confirms data breach after hackers sell 7.2M user records

Bleeping Computer

The Russian scooter-sharing service Whoosh has confirmed a data breach after hackers started to sell a database containing the details of 7.2 million customers on a hacking forum. [.].

article thumbnail

Why API security testing is crucial | Contrast Security

Security Boulevard

Application programming interfaces (APIs) allow businesses to package their internal resources and make them accessible in well-defined infrastructures. External-facing APIs make it possible for businesses to adopt the inverted firm model that has defined the success of every modern tech giant and countless smaller platform businesses. The post Why API security testing is crucial | Contrast Security appeared first on Security Boulevard.

98
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Quantum Cryptography Apocalypse: A Timeline and Action Plan

Dark Reading

Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.

article thumbnail

How to overcome OT security threats?

Security Boulevard

Let’s find out what gives OT security experts the creeps. Most of the times, the issues are associated with IT. The duties of the Chief Information Security Officer (CISO) change and expand along with the industrial Internet of Things (IIoT) and operational technology (OT). The CISO must eliminate threats posed by warehouse systems, networked machinery, […].

CISO 98
article thumbnail

Massive Black hat SEO campaign used +15K WordPress sites

Security Affairs

Experts warn of a malicious SEO campaign that has compromised over 15,000 WordPress websites to redirect visitors to fake Q&A portals. Since September 2022, researchers from security firm Sucuri have tracked a surge in WordPress malware redirecting website visitors to fake Q&A sites via ois[.]is. The campaign’s end goal appears to be black hat SEO aimed at increasing the reputation of the attacker’s sites.

Malware 87
article thumbnail

Is My Phone Hacked? Here’s How You Can Tell and What to Do | Lookout

Security Boulevard

{{consumer="/components/cta/consumer"}} In today’s digital world, we rely on our mobile devices to navigate much of our daily lives. Beyond making calls and sending text messages, we use our phones for online shopping, banking, work, personal reminders, photos, videos, and so much more. . The post Is My Phone Hacked? Here’s How You Can Tell and What to Do | Lookout appeared first on Security Boulevard.

Hacking 92
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.