Wed.Aug 31, 2022

article thumbnail

Final Thoughts on Ubiquiti

Krebs on Security

Last year, I posted a series of articles about a purported “breach” at Ubiquiti. My sole source for that reporting was the person who has since been indicted by federal prosecutors for his alleged wrongdoing – which includes providing false information to the press. As a result of the new information that has been provided to me, I no longer have faith in the veracity of my source or the information he provided to me.

254
254
article thumbnail

High-School Graduation Prank Hack

Schneier on Security

This is a fun story, detailing the hack a group of high school students perpetrated against an Illinois school district, hacking 500 screens across a bunch of schools. During the process, the group broke into the school’s IT systems; repurposed software used to monitor students’ computers; discovered a new vulnerability (and reported it ); wrote their own scripts; secretly tested their system at night; and managed to avoid detection in the school’s network.

Hacking 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

URGENT! Apple quietly slips out zero-day update for older iPhones

Naked Security

Patch as soon as you can - that recent WebKit zero-day affecting new iPhones is apparently being used against older models, too.

Spyware 138
article thumbnail

China was spying on Australian defense servers for months

CyberSecurity Insiders

In what seems to be a startling revelation made by Cybersecurity firm Proofpoint, China has been conducting espionage on Australian defense and energy servers for months, thus stealing intelligence and spying on the activities conducted by the officials. It was a well-planned attack conducted by a hacking group named Red Ladon, say experts from the security firm.

Phishing 133
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

CVSS Vulnerability Scores Can Be Misleading: Security Researchers

eSecurity Planet

Vulnerability management systems based on the Common Vulnerability Scoring System (CVSS) v2 scoring system may be misguided, as a new report found that roughly half of the most critical vulnerabilities may be scored incorrectly. “Looking at the past 10 years, in the same midyear period, we see that on average, 51.5 percent of all known 10.0 scored vulnerabilities are unspecified,” Flashpoint noted in its mid-year 2022 Report. “This means organizations could be prioritizing hund

Risk 130
article thumbnail

Student Loan Breach Exposes 2.5M Records

Threatpost

2.5 million people were affected, in a breach that could spell more trouble down the line.

130
130

LifeWorks

More Trending

article thumbnail

GDPR certification is here at last – here’s why it’s a game changer

BH Consulting

Since the EU General Data Protection Regulation came into force in May 2018, there hasn’t yet been a way to prove compliance with it. Until now. Luxembourg’s GDPR-CARPA is the first officially recognised certification scheme to be adopted under the regulation. It’s surprising that such a significant development hasn’t received more attention, given the discourse around GDPR certification schemes.

article thumbnail

Chrome patches 24 security holes, enables “Sanitizer” safety system

Naked Security

24 existing bugs fixed. And, we hope, numerous potential future bugs prevented.

126
126
article thumbnail

NHS Ransomware Attacks leading to accumulation of medical records

CyberSecurity Insiders

A few days ago, the IT Managed Services provider ‘Advanced’ suffered a ransomware attack that almost crippled the entire emergency network of NHS UK to the core. To keep going, the healthcare services provider resorted to the pen and paper services in order to bring the situation under control. But because of the disruption of the network of NHS 111, patient check-ins, medical notes and emergency services such as ambulance came to a severe halt, as many of such services were being managed with p

article thumbnail

Two-Factor Authentication Evaluation Guide

Tech Republic Security

By verifying your users’ identities before they access your network, two-factor authentication protects your applications and data against unauthorized access. It works by requiring multiple factors to be confirmed before permitting access versus just an email and a password. Authentication factors can be something you know, like a password; something you have, like your device.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Know Thyself: 10 Ways to Discover Your Work Environment Needs and What It’s Really Like to Work at Cisco

Cisco Security

Self-awareness goes a long way in determining your next professional steps. While job searching, it’s critical to identify how to leverage your transferable skills and network, while also evaluating what environmental factors of work and work culture matter to you most. Learn what it’s like to work at Cisco and the top 10 ways to suss out a workplace that suits your needs from leaders at Cisco Secure, Cisco Talos and Duo Security. 1.

Marketing 112
article thumbnail

Fortinet Transportation and Logistics Cybersecurity Solution

Tech Republic Security

Transportation and logistics companies are also implementing omnichannel marketing and engagement techniques to offer innovative services and improve customer experiences. Reducing the risk of these strategically important initiatives is essential to justifying the large capital and resource allocations that these projects require. Fortinet is committed to providing cybersecurity solutions for the transportation and logistics industry.

article thumbnail

Agenda, a New Golang Ransomware, Is on the Loose

Heimadal Security

A new type of ransomware has been identified. Agenda is written in Go language (or Golang), a language more and more used by hackers because it’s stand-alone, integrating all the necessary libraries for running. The malware strain using the double extortion technique is targeting healthcare and education companies in Indonesia, Saudi Arabia, South Africa, and […].

article thumbnail

Duo Helps Organizations with ACSC Mitigation Strategies

Tech Republic Security

Cyberattacks in Australia continue to rise year after year. Over the 2020-21 financial year, Australia saw a 13% increase in reported cybercrime. This is the equivalent of a cyberattack being reported every 8 minutes, with self-reported losses from cybercrime totalling more than $33 billion. These facts are provided by the Australian Cyber Security Centre (ACSC).

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Women in cybersecurity form non-profit organization The Forte Group

CSO Magazine

A group of over 90 women working in cybersecurity roles have formed The Forte Group, a non-profit organization for the education and advocacy of women in the cybersecurity industry. The voluntary group is headquartered in California but is offering a global membership. The group was formed informally earlier during the pandemic. Members would meet once a month to share their experiences, and also use their collective voice as a means for change.

article thumbnail

Duo Helps Organisations with ACSC Mitigation Strategies

Tech Republic Security

Cyberattacks in Australia continue to rise year after year. Over the 2020-21 financial year, Australia saw a 13% increase in reported cybercrime. This is the equivalent of a cyberattack being reported every 8 minutes, with self-reported losses from cybercrime totalling more than $33 billion. These facts are provided by the Australian Cyber Security Centre (ACSC).

article thumbnail

Coffee with the Council Podcast: Internet of Things Security in Payment Environments

PCI perspectives

Welcome to our podcast series, Coffee with the Council. I'm Alicia Malone, Senior Manager of Public Relations for the PCI Security Standards Council. Recently, our organization teamed up with the Consumer Technology Association to issue a joint bulletin on a very important topic, security surrounding the Internet of Things, or IoT. Joining me today for this episode are Andrew Jamieson, Vice President of Solution Standards at PCI Security Standards Council, and Mike Bergman, Vice President of Tec

Internet 107
article thumbnail

Duo Passwordless: Expert Tips and Your Questions Answered

Tech Republic Security

In this webinar, you will learn: How passwordless authentication can benefit organizations of every size, not just enterprises The technical requirements for Duo’s Passwordless solution, and what use cases are (or aren’t!) supported What current preview customers are saying about Duo’s Passwordless solution, and tips you can use for when you try it yourself And.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Threat actors breached the network of the Italian oil company ENI

Security Affairs

Italian oil giant Eni was hit by a cyber attack, attackers compromised its computer networks, but the consequences appear to be minor. Italian oil giant company Eni disclosed a security breach, threat actors gained access to its network, but according to the company the intrusion had minor consequences because it was quickly detected. “The internal protection systems have detected unauthorized access to the corporate network in recent days,” a spokesperson for the company told Reuter

article thumbnail

The Inevitability of Cloud Breaches: Tales of Real-World Cloud Attacks

Dark Reading

While cloud breaches are going to happen, that doesn't mean we can't do anything about them. By better understanding cloud attacks, organizations can better prepare for them. (First of two parts.

106
106
article thumbnail

Fortinet Cloud Security Report

Tech Republic Security

Organizations continue to shift workloads to the cloud at a rapid pace to achieve faster time to market, increased responsiveness, and cost reductions. With the majority of organizations expected to have more than half their workloads in the cloud within the next 12-18 months, it is no surprise that cloud security continues to remain a. The post Fortinet Cloud Security Report appeared first on TechRepublic.

Marketing 106
article thumbnail

Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users

The Hacker News

Five imposter extensions for the Google Chrome web browser masquerading as Netflix viewers and others have been found to track users' browsing activity and profit of retail affiliate programs.

Retail 106
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Bad Practices Leading To Cybersecurity Breach

SecureBlitz

Here, I will show you bad practices leading to cybersecurity breach… More businesses, government agencies, nonprofits, retailers, corporations, and small businesses operate online than ever before. In the meantime, hacker groups are forming all across the globe. Cyberattacks have become commonplace on the World Wide Web. Regardless if it is an iPhone, laptop, personal computer, […].

article thumbnail

James Webb Telescope Images Loaded With Malware Are Evading EDR

Dark Reading

New Golang cyberattacks use deep space images and a new obfuscator to target systems — undetected.

Malware 100
article thumbnail

You’re Not Stringer Bell, but You May Still Need a Burner Phone

WIRED Threat Level

Prepaid phones are looking good as privacy worries peak.

99
article thumbnail

Experts spotted five malicious Google Chrome extensions used by 1.4M users

Security Affairs

Researchers spotted 5 malicious Google Chrome extensions used to track users’ browsing activity and profit of retail affiliate programs. McAfee researchers discovered five malicious Google Chrome extensions with a total install base of over 1,400,000. The malicious Google Chrome extensions were masquerading as Netflix viewers, website coupons, and apps for taking screenshots of a website.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to take control over your digital legacy

We Live Security

Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services. The post How to take control over your digital legacy appeared first on WeLiveSecurity.

98
article thumbnail

China-linked APT40 used ScanBox Framework in a long-running espionage campaign

Security Affairs

Experts uncovered a cyber espionage campaign conducted by a China-linked APT group and aimed at several entities in the South China Sea. Proofpoint’s Threat Research Team uncovered a cyber espionage campaign targeting entities across the world that was orchestrated by a China-linked threat actor. The campaign aimed at entities in Australia, Malaysia, and Europe, as well as organizations that operate in the South China Sea.

article thumbnail

How to set up an iPhone for your kids

Malwarebytes

Thanks to Thomas Reed for his expertise and guidance. This is it. After much hemming and hawing, you've finally given in and bought your child their first smartphone, which you plan to give to them before the school year starts. But before you give it to them, it's worth sitting them down to talk to them about things like what apps and sites they shouldn’t use or visit, what online behaviors to avoid engaging in, and what scams they need to look out for.

article thumbnail

Google Fixes 24 Vulnerabilities With New Chrome Update

Dark Reading

But one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version 105 of Chrome.

98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!