Thu.Sep 22, 2022

article thumbnail

Prompt Injection/Extraction Attacks against AI Systems

Schneier on Security

This is an interesting attack I had not previously considered. The variants are interesting , and I think we’re just starting to understand their implications.

article thumbnail

SEC fines Morgan Stanley Smith Barney $35 million over failure to secure customer data

Tech Republic Security

The financial giant hired a moving company with no experience in data destruction to dispose of hard drives with the personal data of around 15 million customers, said the SEC. The post SEC fines Morgan Stanley Smith Barney $35 million over failure to secure customer data appeared first on TechRepublic.

184
184
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unscrambling Cybersecurity Acronyms: The ABCs of EDR and MEDR Security

Cisco Security

In the first part of this blog series on Unscrambling Cybersecurity Acronyms , we provided a high-level overview of the different threat detection and response solutions and went over how to find the right solution for your organization. In this blog, we’ll do a deeper dive on two of these solutions – Endpoint Detection and Response (EDR) and Managed Endpoint Detection and Response (MEDR).

article thumbnail

Software supply chain security gets its first Linux distro, Wolfi

Tech Republic Security

A new approach to Linux offers hope to those who want to improve their security posture. The post Software supply chain security gets its first Linux distro, Wolfi appeared first on TechRepublic.

Software 180
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Multi-factor authentication fatigue attacks are on the rise: How to defend against them

CSO Magazine

Credential compromise has been one of the top causes for network security breaches for a long time, which has prompted more organizations to adopt multi-factor authentication (MFA) as a defense. While enabling MFA for all accounts is highly encouraged and a best practice, the implementation details matter because attackers are finding ways around it.

article thumbnail

350,000 open source projects at risk from Python vulnerability

Tech Republic Security

Fifteen-year-old N-day Python tarfile module vulnerability puts software supply chain under the microscope. The post 350,000 open source projects at risk from Python vulnerability appeared first on TechRepublic.

Risk 148

LifeWorks

More Trending

article thumbnail

Cloud security market forecast to surpass $123 billion by 2032

Tech Republic Security

The MRA market report reveals that the global cloud security market will experience a significant boom in the coming years, creating room for healthy competition among key players. The post Cloud security market forecast to surpass $123 billion by 2032 appeared first on TechRepublic.

Marketing 148
article thumbnail

A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder

Security Affairs

A disgruntled developer seems to be responsible for the leak of the builder for the latest encryptor of the LockBit ransomware gang. The leak of the builder for the latest encryptor of the LockBit ransomware gang made the headlines, it seems that the person who published it is a disgruntled developer. The latest version of the encryptor, version 3.0 , was released by the gang in June.

article thumbnail

How to create a Bitwarden Vault entry that can be used for AutoFill

Tech Republic Security

Jack Wallen shows you how to make it such that a Bitwarden vault entry can be used for AutoFill via the web browser extension for a simplified workflow. The post How to create a Bitwarden Vault entry that can be used for AutoFill appeared first on TechRepublic.

article thumbnail

Ransomware Groups Turn to Intermittent Encryption to Speed Attack Times

eSecurity Planet

During a cyberattack, time is of the essence for both attackers and defenders. To accelerate the ransomware encryption process and make it harder to detect, cybercriminal groups have begun using a new technique: intermittent encryption. Intermittent encryption allows the ransomware encryption malware to encrypt files partially or only encrypt parts of the files.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Learn the cybersecurity skills you need for employment

Tech Republic Security

All the cybersecurity and risk management frameworks can be found in one training course. The post Learn the cybersecurity skills you need for employment appeared first on TechRepublic.

article thumbnail

Atlassian Confluence bug CVE-2022-26134 exploited in cryptocurrency mining campaign

Security Affairs

Threat actors are targeting unpatched Atlassian Confluence servers as part of an ongoing crypto mining campaign. Trend Micro researchers warn of an ongoing crypto mining campaign targeting Atlassian Confluence servers affected by the CVE-2022-26134 vulnerability. The now-patched critical security flaw was disclosed by Atlassian in early June, at the time the company warned of a critical unpatched remote code execution vulnerability affecting all Confluence Server and Data Center supported versio

article thumbnail

BlackCat’s Ransomware Tool Gets an Upgrade

Heimadal Security

BlackCat ransomware isn’t showing signs of slowing down. The gang has released a new version of their data exfiltration tool, used for performing double-extortion attacks. The group, considered a successor to Darkside and BlackMatter, is one of the most sophisticated and technically advanced RaaS (Ransomware-as-a-Service) operations. New Features Added According to BleepingComputer, the developer of […].

article thumbnail

Unpatched 15-year old Python bug allows code execution in 350k projects

Bleeping Computer

A vulnerability in the Python programming language that has been overlooked for 15 years is now back in the spotlight as it likely affects more than 350,000 open-source repositories and can lead to code execution. [.].

132
132
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to have fun negotiating with a ransomware gang

Graham Cluley

Can negotiating your firm’s ransomware payment actually be fun? Well, if it’s a game rather than the real thing then yes! The inventive bods at the Financial Times have created an imaginative ransomware negotiation simulator which lets you imagine you’re in the hot seat at a hacked company, trying to stop cybercriminals from releasing sensitive … Continue reading "How to have fun negotiating with a ransomware gang".

article thumbnail

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Hacker Combat

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the device and shut down any connected devices, possibly disrupting the targeted business. Researchers from the industrial cybersecurity company Claroty discovered a total of seven flaws with the iBoot-PDU product, including one that might have allowed a remote, unauthenticated attacker to execute arbitrary code.

Firmware 130
article thumbnail

Security Data Lakes Emerge to Address SIEM Limitations

eSecurity Planet

Every security team craves clear visibility into the endpoints, networks, containers, applications, and other resources of the organization. Tools such as endpoint detection and response (EDR) and extended detection and response (XDR) send an increasing number of alerts to provide that visibility. Unfortunately, the high storage and processing fees for traditional security information and event management (SIEM) tools often cause security teams to limit the alerts and logs that they feed into th

article thumbnail

Ransomware: The Latest Chapter

Dark Reading

As ransomware attacks continue to evolve, beyond using security best practices organizations can build resiliency with extended detection and response solutions and fast response times to shut down attacks.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

D&O insurance not yet a priority despite criminal trial of Uber’s former CISO

CSO Magazine

The trial of former Uber CISO Joe Sullivan marks the first time a cybersecurity chief has faced potential criminal liability. Sullivan is charged with trying to conceal from federal investigators the details of a 2016 hack at Uber that exposed the email addresses and phone numbers of 57 million drivers and passengers. The two charges against Sullivan, obstruction of justice and failure to report a crime, carry potential jail time of five and three years, respectively, in a watershed case that ha

CISO 117
article thumbnail

Netflix customers suffer from Phishing Attacks

CyberSecurity Insiders

Netflix customers are being warned not to disclose any personally identifiable information on emails and SMS links sent to them by the video streaming firm, as the links and the impersonation is fake and a part of a fraudulent data harvesting campaign. According to a report published by INKY, a cloud based email security service offering firm hackers launched a phishing scheme impersonating Netflix between August 21 and August 27 and started collecting sensitive details from customers.

Phishing 117
article thumbnail

Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign

Security Affairs

Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. Redis, is a popular open source data structure tool that can be used as an in-memory distributed database, message broker or cache. The tool is not designed to be exposed on the Internet, however, researchers spotted tens thousands Redis instance publicly accessible without authentication.

article thumbnail

Unpatched Python Library Affects More Than 300,000 Open Source Projects

eSecurity Planet

Trellix security researchers have revealed a major vulnerability in the Python tarfile library that could be exploited in software supply chain attacks. The researchers believe it could be used against organizations at scale, which could lead to attacks as serious as the one that hit SolarWinds two years ago. Perhaps more troubling is that the vulnerability was first disclosed 15 years ago but remains unpatched.

Software 113
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Former Broadcom engineer gets eight months in prison for trade secrets theft

CSO Magazine

Peter Kisang Kim admitted to stealing Broadcom data related to its Trident family of network switching and cloud networking chipsets, while working for a Chinese startup.

article thumbnail

Interested in cybersecurity? Join us for Security SOS Week 2022!

Naked Security

Four one-on-one interviews with experts who are passionate about sharing their expertise with the community.

article thumbnail

Intermittent Encryption Analysis

Heimadal Security

To outwit cybersecurity measures, malicious actors are continually enhancing their attack techniques. This sometimes entails developing brand-new malware; other times, it entails iteratively modifying malware that has already been proven effective in order to make use of fresh vulnerabilities or new attack strategies to avoid and infiltrate unprepared network infrastructures.

article thumbnail

Hackers stole $160 Million from Crypto market maker Wintermute

Security Affairs

Threat actors have stolen around $160 million worth of digital assets worth from crypto trading firm Wintermute. Malicious actors continue to target organizations in the cryptocurrency industry, the last victim in order of time is crypto trading firm Wintermute. The company made the headlines after that threat actors have stolen around $160 million worth of digital assets.

Marketing 106
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Why Manufacturing Struggles With Cloud Security

Security Boulevard

Attacks targeting cloud infrastructure are on the rise, according to the Netwrix 2022 Cloud Data Security Report, and the industry that is most vulnerable to attacks on the cloud is manufacturing. Slightly more than half of manufacturing companies experienced an attack on their cloud infrastructure in the past year. What makes the cloud in manufacturing.

article thumbnail

Phishing Scams Are Targeting Netflix Users

Heimadal Security

Netflix is one of the most popular video streaming platforms in the world, with over 200 million paying subscribers. The large number of subscribers has attracted threat groups that are looking to score with a social engineering campaign. Scammers send phishing emails trying to convince Netflix users that their account is somehow in jeopardy, and […].

Scams 105
article thumbnail

Three Iranian Nationals Charged in Critical Services Scheme

Security Boulevard

A trio of Iranian nationals have been indicted for participating in what FBI director Christopher Wray called “a multi-year scheme to compromise the networks of hundreds of companies, organizations and institutions, many of which offer critical services we all rely on every day. The companies targeted in the scheme by Mansour Ahmadi, Ahmad Khatibi Aghda, The post Three Iranian Nationals Charged in Critical Services Scheme appeared first on Security Boulevard.

Malware 105
article thumbnail

A 15-Year-Old Unpatched Python bug potentially impacts over 350,000 projects

Security Affairs

More than 350,000 open source projects can be potentially affected by a 15-Year-Old unpatched Python vulnerability. More than 350,000 open source projects can be potentially affected by an unpatched Python vulnerability, tracked as CVE-2007-4559 (CVSS score: 6.8), that was discovered 15 years ago. The issue is a Directory traversal vulnerability that resides in the ‘extract’ and ‘extractall’ functions in the tarfile module in Python.

Hacking 104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!