Fri.Oct 14, 2022

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the World Ethical Data Forum , online, October 26-28, 2022. I’m speaking at the 24th International Information Security Conference in Madrid, Spain, on November 17, 2022. The list is maintained on this page.

article thumbnail

Zero trust: Data-centric culture to accelerate innovation and secure digital business

Tech Republic Security

Zero trust is one of the most used buzzwords in cybersecurity, but what exactly does this approach entail? The post Zero trust: Data-centric culture to accelerate innovation and secure digital business appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Indian Energy Company Tata Power's IT Infrastructure Hit By Cyber Attack

The Hacker News

Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a cyberattack. The intrusion on IT infrastructure impacted "some of its IT systems," the company said in a filing with the National Stock Exchange (NSE) of India.

article thumbnail

Google Next ’22: A new era of built-in cloud services

Tech Republic Security

At this week's event, Google presented its latest solutions as it tries to overtake Amazon and Microsoft in the cloud market. The post Google Next ’22: A new era of built-in cloud services appeared first on TechRepublic.

Marketing 187
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

WIP19, a new Chinese APT targets IT Service Providers and Telcos

Security Affairs

Chinese-speaking threat actor, tracked as WIP19, is targeting telecommunications and IT service providers in the Middle East and Asia. SentinelOne researchers uncovered a new threat cluster, tracked as WIP19, which has been targeting telecommunications and IT service providers in the Middle East and Asia. The experts believe the group operated for cyber espionage purposes and is a Chinese-speaking threat group.

article thumbnail

April is the end of Exchange 2013: Here’s what you need to know

Tech Republic Security

With the end of support looming, you need to plan to replace Exchange Server 2013 in the next few months, but there are more options than just upgrading. The post April is the end of Exchange 2013: Here’s what you need to know appeared first on TechRepublic.

Backups 187

LifeWorks

More Trending

article thumbnail

Protect your digital life with SplashID Pro password manager

Tech Republic Security

The SplashID Pro password manager helps you securely store and manage your important digital data. Get it for more than 70% off today. The post Protect your digital life with SplashID Pro password manager appeared first on TechRepublic.

article thumbnail

Mirai Botnet Hits Wynncraft Minecraft Server with 2.5 Tbps DDoS Attack

The Hacker News

Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps distributed denial-of-service (DDoS) attack launched by a Mirai botnet. Characterizing it as a "multi-vector attack consisting of UDP and TCP floods," researcher Omer Yoachimik said the DDoS attack targeted the Minecraft server Wynncraft in Q3 2022. "The entire 2.

DDOS 136
article thumbnail

Signal to remove SMS support from Android

Tech Republic Security

Signal is phasing out SMS support from Android to enable it to focus on developing a more secure and reliable platform. The post Signal to remove SMS support from Android appeared first on TechRepublic.

Mobile 148
article thumbnail

Alchimist Attack Framework Targeting Windows, Linux, and macOS Systems

Heimadal Security

A new attack and C2 framework called “Alchimist” was discovered recently by cybersecurity researchers having actively targeted Windows, Linux, and macOS systems. The framework and all of its files are 64-bit executables created in the programming language GoLang, which greatly facilitates cross-compatibility between various operating systems. How Alchimist Works?

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Microsoft Office 365 email encryption could expose message content

Bleeping Computer

Security researchers at WithSecure have discovered it's possible to partially or fully infer the contents of encrypted messages sent through Microsoft Office 365, highlighting an intrinsic weakness in the encryption scheme used. [.].

article thumbnail

Care and Feeding of the SOC's Most Powerful Tool: Your Brain

Dark Reading

Once overloaded, our brains can't process information effectively, performance decreases, and even the simplest of tasks seem foreign.

132
132
article thumbnail

CISA releases open-source 'RedEye' C2 log visualization tool

Bleeping Computer

The U.S. Cybersecurity and Infrastructure Security (CISA) agency has announced RedEye, an open-source analytic tool for operators to visualize and report command and control (C2) activity. [.].

article thumbnail

Cybersecurity News Round-Up: Week of October 10, 2022

Security Boulevard

Australian police secret agents exposed in Colombian data leak, White House to roll out Energy Star-like ratings for IoT, a new data breach at Toyota. The post Cybersecurity News Round-Up: Week of October 10, 2022 appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Experts released PoC exploit code for critical bug CVE-2022-40684 in Fortinet products

Security Affairs

Experts released the PoC exploit code for the authentication bypass flaw CVE-2022-40684 in FortiGate firewalls and FortiProxy web proxies. A proof-of-concept (PoC) exploit code for the authentication bypass vulnerability CVE-2022-40684 (CVSS score: 9.6) in FortiGate firewalls and FortiProxy web proxies has been released online. The vulnerability impacts FortiOS versions from 7.0.0 to 7.0.6 and from 7.2.0 to 7.2.1.

article thumbnail

Apple's Constant Battles Against Zero-Day Exploits

Dark Reading

Such exploits sell for up to $10 million, making them the single most valuable commodity in the cybercrime underworld.

article thumbnail

This Week in Malware – Over 50 Packages Discovered

Security Boulevard

This week in malware, we discovered and analyzed nearly five dozen packages flagged as malicious, suspicious, or dependency confusion attacks in npm and PyPI registries. The post This Week in Malware – Over 50 Packages Discovered appeared first on Security Boulevard.

Malware 124
article thumbnail

Concerns Over Fortinet Flaw Mount; PoC Released, Exploit Activity Grows

Dark Reading

The authentication bypass flaw in FortiOS, FortiProxy and FortiSwitchManager is easy to find and exploit, security experts say.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Serious Security: Microsoft Office 365 attacked over feeble encryption

Naked Security

How 2022 is your encryption?

article thumbnail

Top Features to Look for When Choosing Endpoint Security Tools

Heimadal Security

In an ever-changing cyberthreat scenario, endpoint security software with the correct mix of endpoint protection features can help protect your company’s critical resources. Here are the essential features of advanced endpoint security tools you need to look for! 10 Essential Features of Advanced Endpoint Security Tools It’s true that there are so many choices available […].

Software 122
article thumbnail

Web3 Cybersecurity: Are Things Getting Out of Control?

eSecurity Planet

In a BNB Chain blog post in early October, the authors announced that about two million BNB crypto tokens were stolen. The value? It was over a whopping $560 million. At the time, the BNB Chain had $5.45 billion in DeFi (decentralized finance) assets. The platform is a part of Binance, the world’s largest cryptocurrency. The vulnerability was in the cross-chain bridge.

article thumbnail

Police tricks DeadBolt ransomware out of 155 decryption keys

Bleeping Computer

The Dutch National Police, in collaboration with cybersecurity firm Responders.NU, tricked the DeadBolt ransomware gang into handing over 155 decryption keys by faking ransom payments. [.].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Is the Answer to Vulnerabilities Patch Management as a Service?

eSecurity Planet

Patch management is all about helping organizations manage the process of patching software and applications. It encompasses functions such as testing patches, prioritizing them, deploying them, verifying that they are installed in all endpoints, and in general looking after every aspect of patching. But patching can be a time-consuming – and ineffective – task.

Backups 120
article thumbnail

Magniber Ransomware Strikes Again Via Fake Windows Security Updates

Heimadal Security

Magniber Ransomware finds its way again into Windows home users’ computers, this time through false security updates, as shown in a recent report released by HP’s threat intelligence team. In September, the threat actors built websites that advertised false antivirus and security updates for Windows 10. The malicious files that were downloaded (ZIP archives) contained […].

article thumbnail

How To Build a Career as a Freelance Cybersecurity Analyst — From Scratch

The Hacker News

With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some of the most sought-after technology professionals in the world. And there are nowhere near enough of them to meet the demand. At last count, there were over 3.5 million unfilled cybersecurity jobs worldwide — and that number is still growing.

article thumbnail

Fake Windows Defender Alerts Used in Recent Tech Support Scam

Heimadal Security

Phishing sites displaying a fake Windows Defender alert are the main threat in a new tech support scam. They pretend to be Microsoft support sites and might seem legitimate when offering a support service via a fake helpline number. Once the victim has contacted the helpline, the scammer gains access to their machine and can perform malicious activities.

Scams 119
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft 365 Message Encryption Can Leak Sensitive Info

Dark Reading

The default email encryption used in Microsoft Office's cloud version is leaky, which the company acknowledged but said it wouldn't fix.

article thumbnail

New Chinese Cyberespionage Group Targeting IT Service Providers and Telcos

The Hacker News

Telecommunications and IT service providers in the Middle East and Asia are being targeted by a previously undocumented Chinese-speaking threat group dubbed WIP19. The espionage-related attacks are characterized by the use of a stolen digital certificate issued by a Korean company called DEEPSoft to sign malicious artifacts deployed during the infection chain to evade detection.

article thumbnail

ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe

We Live Security

More than a dozen organizations operating in various verticals were attacked by the threat actor. The post ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

111
111
article thumbnail

What Is Cyber Resilience Strategy?

Heimadal Security

As careful as we are in our cybersecurity strategy, and as up-to-date as we struggle to be nowadays, the imminence of an incident can’t be denied. In 2021 the number of cyberattacks per company grew by 30% since the previous year, as shown by an Accenture report. A sort of cyberattack will affect you, you […]. The post What Is Cyber Resilience Strategy?

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!