Tue.Apr 25, 2023

article thumbnail

Cyberweapons Manufacturer QuaDream Shuts Down

Schneier on Security

Following a report on its activities , the Israeli spyware company QuaDream has shut down. This was QuadDream: Key Findings Based on an analysis of samples shared with us by Microsoft Threat Intelligence , we developed indicators that enabled us to identify at least five civil society victims of QuaDream’s spyware and exploits in North America, Central Asia, Southeast Asia, Europe, and the Middle East.

article thumbnail

Newsweek Op-Ed: Banning Tik Tok And Other Chinese Apps Is Distracting Us From The Bigger Danger China Poses To American CyberSecurity

Joseph Steinberg

It is hardly a secret that, for nearly 30 years, I have been warning about the danger posed to US national security by the simultaneous combination of our growing reliance on Chinese technology, and our general indifference to China’s huge technological “leaps forward” in the realm of cybersecurity. At the same time, I do use Tik Tok, an app that many American officials would like to ban due to the app being owned and operated by a Chinese concern.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Turning full attention to locking down the security of ‘open source’

The Last Watchdog

Software composition analysis — SCA – is a layer of the security stack that, more so than ever, plays a prominent role in protecting modern business networks. Related: All you should know about open-source exposures This is especially true as software developers increasingly rely on generic open source and commercial components to innovate in hyperkinetic DevOps and CI/CD mode.

Software 201
article thumbnail

RSA: Cisco launches XDR, with focus on platform-based cybersecurity

Tech Republic Security

Cisco took the stage at RSA 2023 to tout extended detection and response as key to a unified cross-domain security platform, plus new Duo MFA features. The post RSA: Cisco launches XDR, with focus on platform-based cybersecurity appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

FINALLY! Google Makes 2FA App Useable — BUT There’s a Catch

Security Boulevard

2FA OTP ASAP? Google Authenticator app now syncs your secrets: No stress if you break your phone. The post FINALLY! Google Makes 2FA App Useable — BUT There’s a Catch appeared first on Security Boulevard.

article thumbnail

Quad nations unite to fight Cyber Attacks on Critical Public Infrastructure

CyberSecurity Insiders

The Quad nations comprising India, Japan, Australia, and the United States will reach an agreement on how to create a collective approach to blocking cyber attacks on critical public infrastructure, such as the power and communication sectors. The Quad countries have devised a plan to meet next month in Australia to reach an agreement on how to involve, deal with, and address state-funded attacks on national infrastructure.

LifeWorks

More Trending

article thumbnail

Is the fear of AI being overblown

CyberSecurity Insiders

Artificial intelligence (AI) is a buzzword that has gained significant traction over the past decade. Many experts predict that AI will transform industries and change the way we live and work. However, there is also a growing fear that AI will lead to the destruction of jobs, the concentration of wealth in the hands of a few, and even the end of humanity itself.

article thumbnail

CISOs Rethink Data Security with Info-Centric Framework

Dark Reading

The Data Security Maturity Model ditches application, network, and device silos when it comes to architecting a data security strategy.

CISO 115
article thumbnail

New SLP Vulnerability to play catalyst to 2000x DDoS attacks

CyberSecurity Insiders

A DDoS Attack is the bombardment of fake internet traffic onto an application server, thus disrupting its operations, leading to its unavailability to genuine traffic. Now, imagine what will happen if the intensity of such attacks increases by 2000 times if/when hackers exploit a vulnerability to amplify the attack resulting in a high scale denial of service attack.

DDOS 113
article thumbnail

Attackers Use Containers for Profit via TrafficStealer

Trend Micro

We found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

TP-Link Archer WiFi router flaw exploited by Mirai malware

Bleeping Computer

The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate devices into DDoS (distributed denial of service) swarms. [.

Malware 111
article thumbnail

Why App Security Teams Need to Understand GDPR Compliance

Security Boulevard

If you are part of an app and security team, or work with sensitive data, especially those in the tech industries, or have a global consumer base, then GDPR compliance needs to be on your radar. The General Data Protection Regulation (GDPR) is a set of regulations designed to protect the privacy of European Union […] The post Why App Security Teams Need to Understand GDPR Compliance appeared first on Security Boulevard.

111
111
article thumbnail

Amazon, Facebook, Twitter on EU list of companies facing DSA content rules

CSO Magazine

The EU Commission has announced 19 large online platforms and search engines that will face new content moderation rules under the Digital Services Act. The legislation, passed last year, introduced a specific regime for Very Large Online Platforms (VLOPs) and Very Large Online Search Engines (VLOSEs), all of which have more than 45 million users in the EU.

article thumbnail

HiddenLayer Nabs Most Innovative Startup Crown at RSAC

Dark Reading

The judges appreciated the scale of the problem the startup set out to solve: protecting the integrity of AI systems.

109
109
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Google Authenticator now backs up your 2FA codes to the cloud

Bleeping Computer

The Google Authenticator app has received a critical update for Android and iOS that allows users to back up their two-factor authentication one-time passwords (OTPs) to their Google Accounts and have multi-device support. [.

article thumbnail

Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active Exploitation

Trend Micro

Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals.

106
106
article thumbnail

'Good' AI Is the Only Path to True Zero-Trust Architecture

Dark Reading

Ultimately AI will protect the enterprise, but it's up to the cybersecurity community to protect 'good' AI in order to get there, RSA's Rohit Ghai says.

article thumbnail

New DDoS amplification vector could enable massive attacks

CSO Magazine

Security researchers sounded the alert about a vulnerability in an UDP-based network service called the Service Location Protocol (SLP) that can be abused to amplify DDoS attacks. Tens of thousands of systems and devices have this service exposed to the internet. Attackers could use them to generate massive attacks, and cleaning them up will likely take a very long time.

DDOS 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

PaperCut Flaw Exploited to Hijack Servers, Fix Released

Heimadal Security

Attackers are taking advantage of critical flaws in the widely used PaperCut MF/NG print management software to install Atera remote management software and take control of servers. The software is used by more than 100 million people from over 70,000 businesses worldwide. CVE-2023-27350 and CVE-2023-27351 can be exploited by remote attackers to bypass authentication and […] The post PaperCut Flaw Exploited to Hijack Servers, Fix Released appeared first on Heimdal Security Blog.

Software 105
article thumbnail

DDoS, Not Ransomware, Is Top Business Concern for Edge Networks

Dark Reading

A study found that ransomware threats are viewed as having the lowest overall perceived likelihood of attack on the edge.

article thumbnail

3CX Supply Chain Attack Compromises Critical Infrastructure

SecureWorld News

With hackers becoming more sophisticated and security measures evolving to protect against traditional forms of cyberattacks, supply chain attacks have emerged as a new and increasingly prevalent method of attack. These types of attacks involve targeting third-party vendors or suppliers, which are typically less secure and easier to breach than the primary target.

article thumbnail

VMware fixes critical zero-day exploit chain used at Pwn2Own

Bleeping Computer

VMware has released security updates to address zero-day vulnerabilities that could be chained to gain code execution systems running unpatched versions of the company's Workstation and Fusion software hypervisors. [.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks

The Hacker News

Details have emerged about a high-severity security vulnerability impacting Service Location Protocol (SLP) that could be weaponized to launch volumetric denial-of-service attacks against targets.

DDOS 99
article thumbnail

A new Mirai botnet variant targets TP-Link Archer A21

Security Affairs

Mirai botnet started exploiting the CVE-2023-1389 vulnerability (aka ZDI-CAN-19557/ZDI-23-451 ) in TP-Link Archer A21 in recent attacks. Last week, the Zero Day Initiative (ZDI) threat-hunting team observed the Mirai botnet attempting to exploit the CVE-2023-1389 vulnerability (aka ZDI-CAN-19557/ZDI-23-451, CVSS v3: 8.8) in TP-Link Archer AX21 Wi-Fi routers.

DDOS 98
article thumbnail

IoT Solutions are Radically Changing the Face of Supply Chain Management

GlobalSign

Read how IoT is revolutionizing every facet of supply chain management and how logistics companies are capitalizing on IoT benefits.

IoT 98
article thumbnail

VMware addressed two zero-day flaws demonstrated at Pwn2Own Vancouver 2023

Security Affairs

VMware addressed zero-day flaws that can be chained to achieve arbitrary code execution on Workstation and Fusion software hypervisors. VMware released security updates to address two zero-day vulnerabilities ( CVE-2023-20869, CVE-2023-20870 ) that were chained by the STAR Labs team during the Pwn2Own Vancouver 2023 hacking contest against Workstation and Fusion software hypervisors.

Hacking 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CrowdStrike Allies With Google to Secure ChromeOS at the Edge

Security Boulevard

At the RSA Conference 2023 event, CrowdStrike and Google today announced they are collaborating on an effort to better secure instances of ChromeOS being used at the network edge. It will be delivered via CrowdStrike Falcon Insight detection and response services starting in June 2023. Raj Rajamani, chief product officer for data, identity, cloud and.

article thumbnail

Peugeot leaks access to user information in South America

Security Affairs

Peugeot, a French brand of automobiles owned by Stellantis, exposed its users in Peru, a South American country with a population of nearly 34 million. A brand, best known for its lion roaring for over a century, has leaked access to its user data in Peru. And while the country is not that big of a market for the car maker, this discovery is yet another example of how big and well-known brands fail to secure sensitive data.

article thumbnail

Lazarus Subgroup Targeting Apple Devices with New RustBucket macOS Malware

The Hacker News

A financially-motivated North Korean threat actor is suspected to be behind a new Apple macOS malware strain called RustBucket. "[RustBucket] communicates with command and control (C2) servers to download and execute various payloads," Jamf Threat Labs researchers Ferdous Saljooki and Jaron Bradley said in a technical report published last week.

Malware 98
article thumbnail

Google Authenticator App now supports Google Account synchronization

Security Affairs

Google announced that its Authenticator app for Android and iOS now supports Google Account synchronization. Google announced that its Google Authenticator app for both iOS and Android now supports Google Account synchronization that allows to safely backup users one-time codes to their Google Account. The company states that users over the years have faced the complexity of dealing with lost or stolen devices that had Google Authenticator installed.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!