Thu.May 11, 2023

article thumbnail

RSAC Fireside Chat: Keeping persistent email threats at bay requires deeper, cloud-layer vigilance

The Last Watchdog

Email remains by far the no.1 business communications tool. Meanwhile, weaponized email continues to pose a clear and present threat to all businesses. Related: The need for timely training At RSA Conference 2023 , I learned all about a new category of email security — referred to as integrated cloud email security ( ICES ) – that is helping companies more effectively keep email threats in check.

article thumbnail

Google offers certificate in cybersecurity, no dorm room required 

Tech Republic Security

Google adds a Cybersecurity Certificate to its Career Certificates program, which offers paths to such enterprise tech fields as data analytics, IT support and business intelligence. The post Google offers certificate in cybersecurity, no dorm room required appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WordPress Elementor plugin bug let attackers hijack accounts on 1M sites

Bleeping Computer

One of WordPress's most popular Elementor plugins, "Essential Addons for Elementor," was found to be vulnerable to an unauthenticated privilege escalation that could allow remote attacks to gain administrator rights on the site. [.

article thumbnail

New ransomware trends in 2023

SecureList

Ransomware keeps making headlines. In a quest for profits, attackers target all types of organizations, from healthcare and educational institutions to service providers and industrial enterprises, affecting almost every aspect of our lives. In 2022, Kaspersky solutions detected over 74.2M attempted ransomware attacks which was 20% more than in 2021 (61.7M).

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Multinational tech firm ABB hit by Black Basta ransomware attack

Bleeping Computer

Swiss multinational company ABB, a leading electrification and automation technology provider, has suffered a Black Basta ransomware attack, reportedly impacting business operations. [.

article thumbnail

Okta Adds Security Center to Provide Real-Time Threat Visibility

Security Boulevard

Okta this week made available Security Center, an extension of the Okta Customer Identity Cloud that provides a real-time view of authentication events, potential security incidents and threat response efficacy. Ian Hassard, senior director of product management for Okta, said Security Center will enable organizations to monitor attacks that compromise the identity of end users.

LifeWorks

More Trending

article thumbnail

Plug-and-Play Microsoft 365 Phishing Tool 'Democratizes' Attack Campaigns

Dark Reading

New "Greatness" phishing-as-a-service used in attacks targeting manufacturing, healthcare, technology, and other sectors.

Phishing 124
article thumbnail

Malicious AI Tool Ads Used to Deliver Redline Stealer

Trend Micro

We’ve been observing malicious advertisement campaigns in Google’s search engine with themes that are related to AI tools such as Midjourney and ChatGPT.

article thumbnail

Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs

Dark Reading

Two years ago, a popular ransomware-as-a-service group's source code got leaked. Now other ransomware groups are using it for their own purposes.

article thumbnail

New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe

The Hacker News

A previously undetected advanced persistent threat (APT) actor dubbed Red Stinger has been linked to attacks targeting Eastern Europe since 2020. "Military, transportation, and critical infrastructure were some of the entities being targeted, as well as some involved in the September East Ukraine referendums," Malwarebytes disclosed in a report published today.

118
118
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Akira ransomware – what you need to know

Graham Cluley

Akira is a new family of ransomware, first used in cybercrime attacks in March 2023. Read more about the threat in my article on the Tripwire State of Security blog.

article thumbnail

Your Clients Are Leaving Because Your Cybersecurity Is Trash

Security Boulevard

Cybersecurity compliance represents a major business opportunity for managed service providers (MSPs) attempting to move away from legacy IT services and toward a market that’s projected to double from $40 billion to roughly $80 billion by the end of the decade. But for the ill-equipped, it’s a potential albatross that can ultimately sink a business.

article thumbnail

Cyber Attack on Tokyo MoU compromises data

CyberSecurity Insiders

Tokyo MoU, the most active regional port control organization in the Asia Pacific, has revealed that its data was compromised for months and that hackers gained fraudulent access through a cyber attack. It is unclear how the attack has impacted the servers of the Port State Control (PSC) platform. However, authorities are deeply investigating to learn more about the facts.

article thumbnail

How to Tackle the Cybersecurity Careers Gap

Lenny Zeltser

Too many people are unsure how to enter or grow in the cybersecurity industry. It's a relatively young field, and we haven’t done a good job of defining what it means to have a career in it. Hiring managers who are worried about finding candidates because of the much-discussed cybersecurity skills gap should consider the underlying issue, which I'd like to call the cybersecurity careers gap.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Billy Corgan Paid Off Hacker Who Threatened to Leak New Smashing Pumpkins Songs

Dark Reading

Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said.

112
112
article thumbnail

Severe Security Flaw Exposes Over a Million WordPress Sites to Hijack

The Hacker News

A security vulnerability has been disclosed in the popular WordPress plugin Essential Addons for Elementor that could be potentially exploited to achieve elevated privileges on affected sites. The issue, tracked as CVE-2023-32243, has been addressed by the plugin maintainers in version 5.7.2 that was shipped on May 11, 2023.

111
111
article thumbnail

Why DevOps and CloudOps are Critical for Successful Cloud Implementations

Security Boulevard

The advent of cloud computing has transformed the way businesses operate, allowing them to access scalable resources and improve their agility. Cloud computing has enabled organizations to quickly and easily provision resources on-demand, resulting in faster time-to-market and reduced costs. However, the rapid adoption of cloud technology has led to the emergence of new challenges, […] The post Why DevOps and CloudOps are Critical for Successful Cloud Implementations appeared first on PeoplActiv

Marketing 111
article thumbnail

Israeli threat group uses fake company acquisitions in CEO fraud schemes

CSO Magazine

A group of cybercriminals based in Israel has launched more than 350 business email compromise (BEC) campaigns over the past two years, targeting large multinational companies from around the world. The group stands out with some of the techniques it uses, including email display name spoofing and multiple fake personas in the email chains, and through the abnormally large sums of money the attempt to extract from organizations.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Five Most Common Ransomware Strains

Security Boulevard

Even as cybercriminals get more sophisticated and try new methods, they’re not moving away from what’s tried and true. According to FortiGuard Labs’ analysis, 82% of financially motivated cybercrimes in 2022 included ransomware or malicious scripts. This demonstrates that the ransomware menace is still present globally and shows no signs of slowing down.

article thumbnail

Stealthier version of Linux BPFDoor malware spotted in the wild

Bleeping Computer

A new, stealthier variant of the Linux malware 'BPFDoor' has been discovered, featuring more robust encryption and reverse shell communications. [.

Malware 107
article thumbnail

Cyber Security vs Data Science: Which is best pay wise

CyberSecurity Insiders

With the increasing use of technology, the demand for professionals with expertise in Cyber Security and Data Science has also been on the rise. Both fields are known to have good career prospects and lucrative salaries. However, when it comes to comparing the two, which field pays better? In this article, we will explore the salaries of Cyber Security and Data Science pro-fessionals to help you make an informed decision.

Education 106
article thumbnail

Using Digital Guardian to Block and Gain Visibility Around ChatGPT Usage

Digital Guardian

With ChatGPT in the news almost daily these days, users should know that Digital Guardian’s data loss prevention solutions can help highlight and mitigate data loss risks associated with deep learning large language models.

Risk 105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Energy Transformation via Cyber-Resilient Smart Grid

Trend Micro

Learn more about smart grid vulnerabilities and how organizations can future-proof their enterprises.

article thumbnail

North Korean Hackers Behind Hospital Data Breach in Seoul

Dark Reading

Data on more than 830K people exposed in the 2021 cyberattack.

article thumbnail

A flaw in the Essential ‘Addons for Elementor’ WordPress plugin poses 1M sites at risk of hacking

Security Affairs

Experts warn of an unauthenticated privilege escalation flaw in the popular Essential ‘Addons for Elementor’ WordPress plugin. Essential ‘Addons for Elementor’ WordPress plugin is a collection of 90+ creative elements and extensions Enhance that allow admins to enhance Elementor page building experience. The plugin has more than one million active installations.

Hacking 98
article thumbnail

Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme

Dark Reading

Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google will provide dark web monitoring to all US Gmail users and more

Security Affairs

Google announced the opening of the dark web monitoring report security feature to all Gmail users in the United States. Google is going to offer dark web monitoring to all U.S. Gmail users, the feature allows them to search for their email addresses on the dark web. Dark web scans for Gmail address was previously only available to Google One subscribers in the US.

article thumbnail

Advice from the ISACA Ransomware Response Checklist

Security Boulevard

A decade ago, most companies realized that being hit with a data breach was inevitable—the well-known “when, not if” statement drove that idea home. The time has come to make a similar realization about ransomware. Tenacious cybercrime rings and the easy availability of ransomware toolkits, as well as the financial rewards, are why ransomware attacks.

article thumbnail

Experts share details of five flaws that can be chained to hack Netgear RAX30 Routers 

Security Affairs

Researchers disclosed the details of five vulnerabilities that can be chained to take over some Netgear router models. Industrial and IoT cybersecurity firm Claroty disclosed technical details of five vulnerabilities that be exploited to hack some Netgear router models. “Team82 disclosed five vulnerabilities in NETGEAR’s Nighthawk RAX30 routers as part of its research and participation in last December’s Pwn2Own Toronto hacking competition.” reads the advisory published by the sec

Hacking 98
article thumbnail

A Republican-Led Lawsuit Threatens Critical US Cyber Protections

WIRED Threat Level

Three states are suing to block security rules for water facilities. If they win, it may open the floodgates for challenges to other cyber rules.

Hacking 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!