Mon.Mar 13, 2023

article thumbnail

Artificial Intelligence in Cybersecurity: Boon or Bane? – A Free Webinar With Joseph Steinberg, Author of Cybersecurity For Dummies

Joseph Steinberg

As pretty much every professional knows, the cyber-threat landscape is constantly and rapidly evolving as hackers discover new techniques to breach organizations.

article thumbnail

GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?

The Last Watchdog

This year has kicked off with a string of high-profile layoffs — particularly in high tech — prompting organizations across all sectors to both consider costs and plan for yet another uncertain 12 or more months. Related: Attack surface management takes center stage. So how will this affect chief information security officers (CISOs) and security programs?

CISO 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Hiatus malware campaign targets routers

Tech Republic Security

A new malware dubbed HiatusRAT infects routers to spy on its targets, mostly in Europe and in the U.S. Learn which router models are primarily targeted and how to protect from this security threat. The post New Hiatus malware campaign targets routers appeared first on TechRepublic.

Malware 140
article thumbnail

White House to Regulate Cloud Security: Good Luck With That

Security Boulevard

Be careful what you wish for: Biden wants new regulations for cloud providers—but we’re not sure it’ll help. The post White House to Regulate Cloud Security: Good Luck With That appeared first on Security Boulevard.

Software 126
article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the foundational elements you need to start or validate your ERM program. He will also dive into topic definitions, governance structures, and framework components for success.

article thumbnail

How internet-facing webcams could put your organization at risk

Tech Republic Security

By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight. The post How internet-facing webcams could put your organization at risk appeared first on TechRepublic.

Internet 130
article thumbnail

Ransomware Attacks Have Entered a ‘Heinous’ New Phase

WIRED Threat Level

With victims refusing to pay, cybercriminal gangs are now releasing stolen photos of cancer patients and sensitive student records. Security Security / Cyberattacks and Hacks

More Trending

article thumbnail

Coffee with the Council Podcast: Help Elect the Council’s Next Board of Advisors

PCI perspectives

Hello and welcome to Coffee with the Council. I’m Alicia Malone, Senior Manager of Public Relations at the PCI Security Standards Council. This month, we begin the election phase of the Council’s new Board of Advisors for the 2023 to 2025 term.

105
105
article thumbnail

5 signs you’ve fallen for a scam – and what to do next

We Live Security

Here’s how to know you have fallen victim to a scam – and what to do in order to undo or mitigate the damage. The post 5 signs you’ve fallen for a scam – and what to do next appeared first on WeLiveSecurity Scams

Scams 101
article thumbnail

Fake ChatGPT browser extension is hijacking Facebook Business accounts

ZoneAlarm

A fake ChatGPT extension named “Quick access to ChatGPT” has been found to hijack Facebook business accounts.

article thumbnail

AI-Created YouTube Videos Spread Around Malware

Dark Reading

AI-generated videos pose as tutorials on how to get cracked versions of Photoshop, Premiere Pro, and more

Malware 100
article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Join this exclusive webinar with Dr. Karen Hardy, where she will explore the power of storytelling in risk communication as a core component of a resilient organization's management framework!

article thumbnail

6 reasons why your anti-phishing strategy isn’t working

CSO Magazine

Phishing attempts are typically like fishing in a barrel — given enough time, a bad actor is 100% likely to reel in a victim. Once they recognize organizations as habitually vulnerable, they will continue to target them and the barrel-fishing cycle goes on and on.

CSO 141
article thumbnail

Why You Need to Emphasize Cloud Security

Security Boulevard

In today’s digital age, businesses of all sizes rely heavily on cloud technology to store, process and access their critical data and applications.

article thumbnail

Golang-Based Botnet GoBruteforcer targets web servers

Security Affairs

A recently discovered Golang-based botnet, dubbed GoBruteforcer, is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services Researchers from Palo Alto Networks Unit 42 recently discovered a Golang-based botnet, tracked as GoBruteforcer, which is targeting web servers running FTP, MySQL, phpMyAdmin, and Postgres services.

article thumbnail

3 key insights from the Entrust Cybersecurity Institute’s “Future of Identity” Report

Security Boulevard

We surveyed 1,450 consumers globally to understand how they feel about emerging identity topics —. The post 3 key insights from the Entrust Cybersecurity Institute’s “Future of Identity” Report appeared first on Entrust Blog.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Actors of Badness Exploit NCAA March Madness

SecureWorld News

March Madness. It's NCAA basketball tournament time, and that means lots of lost hours of work as folks call in sick to watch games or huddle around the office TVs to see their favorite collegiate teams try to work their way to the Sweet 16, Final Four, and hopefully national title.

Mobile 93
article thumbnail

Let’s Stop Talking About the ‘Largest’ DDoS Attack

Security Boulevard

There have been a slew of DDoS attacks recently that are serious, but to focus on the size of the latest attack is the wrong thing to do. What we need to focus on are the impacts of these attacks. Would the CFO consider the site being down for less than an hour to be.

DDOS 97
article thumbnail

Key Points from the US National Cybersecurity Strategy 2023

Thales Cloud Protection & Licensing

Key Points from the US National Cybersecurity Strategy 2023 divya Mon, 03/13/2023 - 15:39 On March 2, the Biden administration released its 2023 National Cybersecurity Strategy, an attempt “ to secure the full benefits of a safe and secure digital ecosystem for all Americans.”

CISO 126
article thumbnail

Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. “Why are you here if you cannot decrypt our data?”

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

Employee termination policy

Tech Republic Security

PURPOSE This policy provides termination guidelines, including the process of disabling former employee access, reclaiming company equipment and finalizing payroll/benefits details.

85
article thumbnail

5 Lessons Learned From Hundreds of Penetration Tests

Dark Reading

Developers must balance creativity with security frameworks to keep applications safe. Correlating business logic with security logic will pay in safety dividends

article thumbnail

Linux gets double-quick double-update to fix kernel Oops!

Naked Security

Linux doesn't BSoD. It has oopses and panics instead. (We We show you how to make a kernel module to explore further.) BSOD Linux oops panic

83
article thumbnail

SVB Meltdown: What It Means for Cybersecurity Startups' Access to Capital

Dark Reading

The implosion of Silicon Valley Bank will impact investors, startups, and enterprise customers as they become more cautious over the near term, security experts say

Banking 84
article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content Redirects

The Hacker News

A widespread malicious cyber operation has hijacked thousands of websites aimed at East Asian audiences to redirect visitors to adult-themed content since early September 2022.

article thumbnail

200-300% Increase in AI-Generated YouTube Videos to Spread Stealer Malware

Dark Reading

Malware 82
article thumbnail

CISA adds Plex Media Server bug, exploited in LastPass attack, to Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added remote code execution vulnerability in Plex Media Server to its Known Exploited Vulnerabilities Catalog.

Media 74
article thumbnail

Brand Names in Finance, Telecom, Tech Lead Successful Phishing Lures

Dark Reading

AT&T, PayPal, and Microsoft top the list of domains that victims visit following a link in a phishing email, as firms fight to prevent fraud and credential harvesting

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

Dark Pink APT targets Govt entities in South Asia

Security Affairs

Researchers reported that Dark Pink APT employed a malware dubbed KamiKakaBot against Southeast Asian targets.

article thumbnail

Hackers Lure Cybersecurity Researchers With Fake LinkedIn Recruiter Profiles

Dark Reading

Campaign demonstrates the DPRK-backed cyberattackers are gaining tools to avoid EDR tools

article thumbnail

BrandPost: Propaganda in the digital age: How cyber influence operations erode trust

CSO Magazine

By Microsoft Security Across the domestic and international stage, nation-state actors are increasingly using sophisticated influence operations to distribute propaganda and impact public opinion.

CSO 99
article thumbnail

Kali Linux 2023.1 introduces 'Purple' distro for defensive security

Bleeping Computer

​Offensive Security has released ​Kali Linux 2023.1, the first version of 2023 and the project's 10th anniversary, with a new distro called 'Kali Purple,' aimed at Blue and Purple teamers for defensive security. [.] Security

98
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.