Mon.Apr 24, 2023

article thumbnail

UK Threatens End-to-End Encryption

Schneier on Security

In an open letter , seven secure messaging apps—including Signal and WhatsApp—point out that the UK’s Online Safety Bill could destroy end-to-end encryption: As currently drafted, the Bill could break end-to-end encryption,opening the door to routine, general and indiscriminate surveillance of personal messages of friends, family members, employees, executives, journalists, human rights activists and even politicians themselves, which would fundamentally undermine everyone’s ab

article thumbnail

Guest essay: A roadmap for how — and why — all MSSPs should embrace live patching

The Last Watchdog

Patch management has always been time-consuming and arduous. But it gets done, at least to some degree, simply because patching is so crucial to a robust cybersecurity posture. Patch programs are rarely perfect though, and imperfect patching arguably enables successful cybersecurity breaches – it’s an ever-growing concern for countless IT teams. Related: MSSPs shift to deeper help Managed Security Service Providers (MSSPs) do their best to patch their client’s systems while also juggling a long

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile device security policy

Tech Republic Security

PURPOSE This Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses and their employees. This policy can be customized as needed to fit the needs of your organization. From the policy: REQUIREMENT FOR USERS If using a company-owned device, ensure that all mobile device use.

Mobile 174
article thumbnail

VirusTotal now has an AI-powered malware analysis feature

Bleeping Computer

VirusTotal announced on Monday the launch of a new artificial intelligence-based code analysis feature named Code Insight. [.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

OT giants collaborate on ETHOS early threat and attack warning system

CSO Magazine

One of the greatest fears among government officials and security experts is a crippling cyberattack on industrial organizations that run essential services, including electricity, water, oil and gas production, and manufacturing systems. The proprietary and complex nature of the operational technology (OT) tools used in these systems, not to mention their rapid convergence with IT technology, makes securing OT systems a chronic, high-stakes challenge.

article thumbnail

Intel CPUs vulnerable to new transient execution side-channel attack

Bleeping Computer

A new side-channel attack impacting multiple generations of Intel CPUs has been discovered, allowing data to be leaked through the EFLAGS register. [.

134
134

LifeWorks

More Trending

article thumbnail

Torq Unveils Hyperautomation Security Platform Infused With GPT

Security Boulevard

Torq, today at the RSA 2023 conference, launched a hyperautomation platform for automating cybersecurity workflows and processes that includes an analytics capability enabled by a generative artificial intelligence (AI) capability. Torq co-founder and CTO Leonid Belkin said the Torq Hyperautomation Platform is distinguished from legacy security operations automation and response (SOAR) platforms in that it.

article thumbnail

Raising the Bar: Duo Redefines What Is Essential for Access Management

Duo's Security Blog

Cyber attackers are increasingly targeting gaps in weaker multi-factor authentication (MFA) implementations. That’s why Duo is bringing protection previously available only in Duo's most advanced edition to every Duo customer. Weaker MFA implementations are under attack It has been an unprecedented year of cyberattacks targeting MFA. Attackers have invested significant time, energy, and focus exploiting weak MFA.

article thumbnail

Your Vendor’s Vendor Adds Risk to the Open Source Supply Chain

Security Boulevard

Organizations rely heavily on third-party vendors and contractors. Smart companies will have a service level agreement (SLA) with each vendor which includes information about the vendor’s approach to cybersecurity—in fact, it’s a best practice to add security to the software supply chain. If only it was that simple. In the real world, the vendor supply.

Risk 114
article thumbnail

Google Authenticator now supports Google Account synchronization

Google Security

Christiaan Brand, Group Product Manager We are excited to announce an update to Google Authenticator , across both iOS and Android, which adds the ability to safely backup your one-time codes (also known as one-time passwords or OTPs) to your Google Account. Across all of your online accounts, signing in is the front door to your personal information.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Salt Security Applies Additional AI Capabilities to API Security

Security Boulevard

Salt Security has infused additional artificial intelligence (AI) capabilities into its software-as-a-service (SaaS) platform that should make it simpler to both discover APIs and triage levels of threat. Nick Rago, field CTO for Salt Security, said one of the major challenges organizations face today is that hundreds, possibly even thousands, of APIs may already be.

article thumbnail

APC warns of critical unauthenticated RCE flaws in UPS software

Bleeping Computer

APC's Easy UPS Online Monitoring Software is vulnerable to unauthenticated arbitrary remote code execution, allowing hackers to take over devices and, in a worst-case scenario, disabling its functionality altogether. [.

Software 111
article thumbnail

Double zero-day in Chrome and Edge – check your versions now!

Naked Security

Wouldn't it be handy if there were a single version number to check for in every Chromium-based browser, on every supported platform?

110
110
article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

Yellow Pages Canada reportedly fell victim to a Black Basta Ransomware attack at the end of March this year. News has emerged that the criminals siphoned sensitive details and data from the servers of the Canadian Directory services provider, including information such as tax documents, sales and purchase deals, spreadsheets related to the accounts department, and many scanned passport and driving license documents related to customers and employees.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack

The Hacker News

Threat actors are employing a previously undocumented "defense evasion tool" dubbed AuKill that's designed to disable endpoint detection and response (EDR) software by means of a Bring Your Own Vulnerable Driver (BYOVD) attack. "The AuKill tool abuses an outdated version of the driver used by version 16.

Software 109
article thumbnail

Noname Security Aligns With Intel on API Security

Security Boulevard

Noname Security announced today it is working with Intel to offload application programming interface (API) security to network integration cards (NICs) based on 4th-gen Intel Xeon Scalable processors and the Intel NetSec Accelerator Reference Design. Filip Verloy, field CTO for Noname Security, said that approach will enable cybersecurity teams to take advantage of the Intel.

article thumbnail

Qwiet AI Builds a Neural Net to Catch Coding Vulnerabilities

Dark Reading

Code property graphs and a threat feed powered by artificial narrow intelligence help developers incorporate AppSec into DevOps.

105
105
article thumbnail

Hackers Exploit Generative AI to Spread RedLine Stealer MaaS

Security Boulevard

As generative AI platforms like OpenAI’s ChatGPT and Google Bard continue to dominate the headlines—and pundits debate whether the technology has taken off too quickly without necessary guardrails—cybercriminals are showing equal interest and no hesitance in exploiting them. Not surprisingly, then, security researchers at Veriti uncovered “a new malware-as-a-service (MaaS) campaign that leverages the popularity.

Malware 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Rethinking Safer AI: Can There Really Be a 'TruthGPT'?

Dark Reading

Is Elon Musk's "maximum truth-seeking AI" achievable? Overcoming bias in artificial technologies is crucial for cybersecurity, but doing it could be a challenge.

article thumbnail

Russian Hackers Tomiris Targeting Central Asia for Intelligence Gathering

The Hacker News

The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering intelligence in Central Asia, fresh findings from Kaspersky reveal. "Tomiris's endgame consistently appears to be the regular theft of internal documents," security researchers Pierre Delcher and Ivan Kwiatkowski said in an analysis published today.

article thumbnail

Exploit released for PaperCut flaw abused to hijack servers, patch now

Bleeping Computer

Attackers are exploiting severe vulnerabilities in the widely-used PaperCut MF/NG print management software to install Atera remote management software to take over servers. [.

Software 103
article thumbnail

Hackers Exploit Outdated WordPress Plugin to Backdoor Thousands of WordPress Sites

The Hacker News

Threat actors have been observed leveraging a legitimate but outdated WordPress plugin to surreptitiously backdoor websites as part of an ongoing campaign, Sucuri revealed in a report published last week. The plugin in question is Eval PHP, released by a developer named flashpixx.

102
102
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

WIRED Threat Level

To protect its Confidential Computing cloud infrastructure and gain critical insights, Google leans on its relationships with chipmakers.

Hacking 101
article thumbnail

Cybersecurity Survival: Hide From Adversarial AI

Dark Reading

Consider adding some security-through-obscurity tactics to your organization's protection arsenal to boost protection. Mask your attack surface behind additional zero-trust layers to remove AI's predictive advantage.

article thumbnail

North Dakota turns to AI to boost effectiveness and efficiency of its cybersecurity

CSO Magazine

The recent proliferation of tools that employ artificial intelligence (AI) or machine learning (ML) to perform human-like tasks has sparked a great deal of interest in the cybersecurity community. And they’ve prompted some very hard questions about the future, not the least of which is whether ChatGPT, BardAI, Bing AI, and the dozens of other “AI” applications and tools already in use represent a threat or boon to security operations.

article thumbnail

Experts released PoC Exploit code for actively exploited PaperCut flaw

Security Affairs

Threat actors are exploiting PaperCut MF/NG print management software flaws in attacks in the wild, while researchers released PoC exploit code. Hackers are actively exploiting PaperCut MF/NG print management software flaws (tracked as CVE-2023-27350 and CVE-2023-27351 ) in attacks in the wild. The threat actors were observed installing the Atera remote management software to take over vulnerable servers.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Authenticator App Gets Cloud Backup Feature for TOTP Codes

The Hacker News

Search giant Google on Monday unveiled a major update to its 12-year-old Authenticator app for Android and iOS with an account synchronization option that allows users to back up their time-based one-time passwords (TOTPs) codes to the cloud.

article thumbnail

AuKill tool uses BYOVD attack to disable EDR software

Security Affairs

Ransomware operators use the AuKill tool to disable EDR software through Bring Your Own Vulnerable Driver (BYOVD) attack. Sophos researchers reported that threat actors are using a previously undocumented defense evasion tool, dubbed AuKill, to disable endpoint detection and response (EDR) software. The tool relies on the Bring Your Own Vulnerable Driver ( BYOVD ) technique to disable the EDR.

article thumbnail

Misconfigured Registries: Security Researchers Find 250 Million Artifacts Exposed

eSecurity Planet

Aqua Security’s cloud security research team recently found thousands of registries and artifact repositories exposed online, revealing more than 250 million artifacts and over 65,000 container images. The registries and repositories belonged to a wide range of companies, including 10 members of the Fortune 500 and two leading cybersecurity providers. “In some of these cases, anonymous user access allowed a potential attacker to gain sensitive information, such as secrets, keys, and

article thumbnail

EvilExtractor, a new All-in-One info stealer appeared on the Dark Web

Security Affairs

EvilExtractor is a new “all-in-one” info stealer for Windows that is being advertised for sale on dark web cybercrime forums. Fortinet FortiGuard Labs researchers discovered a new “all-in-one” info stealer for Windows, dubbed EvilExtractor (sometimes spelled Evil Extractor) that is available for sale on dark web cybercrime forums.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!