Thu.Feb 16, 2023

article thumbnail

ChatGPT Is Ingesting Corporate Secrets

Schneier on Security

Interesting : According to internal Slack messages that were leaked to Insider , an Amazon lawyer told workers that they had “already seen instances” of text generated by ChatGPT that “closely” resembled internal company data. This issue seems to have come to a head recently because Amazon staffers and other tech workers throughout the industry have begun using ChatGPT as a “ coding assistant ” of sorts to help them write or improve strings of code, the report

363
363
article thumbnail

Weekly Update 335

Troy Hunt

No cyber. It's literally a "cyber-free" week, as least far as the term relates to security things. Instead, I'm unboxing an armful of Insta360 goodies and lamenting the state of IoT whilst putting even more IoT things into our massive garage renovation. I'm enjoying it though. Honestly. I think. References The Ubiquiti AI Bullet camera with license plate recognition is.

IoT 260
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cryptocurrency users in the US hit by ransomware and Clipper malware

Tech Republic Security

Learn how to protect your business and staff from the MortalKombat ransomware and Laplas Clipper malware. The post Cryptocurrency users in the US hit by ransomware and Clipper malware appeared first on TechRepublic.

article thumbnail

Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack

Trend Micro

We discovered a new backdoor which we have attributed to the advanced persistent threat actor known as Earth Kitsune, which we have covered before. Since 2019, Earth Kitsune has been distributing variants of self-developed backdoors to targets, primarily individuals who are interested in North Korea.

145
145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Security warning: Beep malware can evade detection

Tech Republic Security

Find out how Beep malware can evade your security system, what it can do and how to protect your business. The post Security warning: Beep malware can evade detection appeared first on TechRepublic.

Malware 184
article thumbnail

Hackers backdoor Microsoft IIS servers with new Frebniis malware

Bleeping Computer

Hackers are deploying a new malware named 'Frebniss' on Microsoft's Internet Information Services (IIS) that stealthily executes commands sent via web requests. [.

Malware 129

LifeWorks

More Trending

article thumbnail

Oakland Declares State of Emergency Following Ransomware Attack

SecureWorld News

How would you feel to wake up one day and find that your city's IT systems are offline? That's the reality the City of Oakland, California, is facing after a ransomware attack last week. The incident has caused enough damage that the city has declared a state of emergency to expedite orders, materials, and equipment procurement, and to activate emergency workers when needed, highlighting the real-world consequences of cyberattacks.

article thumbnail

ChatGPT Empowers Millions of Potential Cyberattackers

Security Boulevard

The recently-released ChatGPT, a chatbot developed by OpenAI, is garnering attention for its ability to provide information and answers on a wide range of topics and its potential to revolutionize a variety of industries through its ability to generate content, songs, code and tutorials. ChatGPT and similar chatbots have the potential to be game-changers, but.

article thumbnail

Malware authors leverage more attack techniques that enable lateral movement

CSO Magazine

A new study of over a half-million malware samples collected from various sources in 2022 revealed that attackers put a high value on lateral movement, incorporating more techniques that would allow them to spread through corporate networks. Several of the most prevalent tactics, as defined by the MITRE ATT&CK framework, that were identified in the dataset aid lateral movement, including three new ones that rose into the top 10.

Malware 120
article thumbnail

Cloudflare Blocks Record DDoS Attack as Threats Surge

eSecurity Planet

Cloudflare mitigated dozens of hyper-volumetric DDoS attacks last weekend, most of them ranging from 50 to 70 million requests per second (RPS) – and the largest one exceeding 71 million RPS. “This is the largest reported HTTP DDoS attack on record, more than 35 percent higher than the previous reported record of 46 million RPS in June 2022,” Cloudflare’s Omer Yoachimik, Julien Desgats and Alex Forster wrote.

DDOS 117
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to protect backup servers from ransomware

CyberSecurity Insiders

We all know that backup servers are only the sole saviors to an organization when a ransomware incident strikes their IT infrastructure. So, to avoid such troubles from file encrypting malware, the following are the steps to follow to protect backups from being corrupted with encryption- Update- It is a known fact that back-up systems are the first to receive OS updates and so admins should subscribe to automatic updates for backup software.

Backups 116
article thumbnail

BrandPost: Aligning security and business strategies

CSO Magazine

Some economists predict that we could soon face a global recession. Looking at history, this does not bode well for levels of cybercrime. However, there is some evidence that macroeconomic conditions can impact cybercrime. In times of economic downturn, for example, cybercrime may increase as people turn to illegal activities to make money. During the 2008–2009 Global Financial Crisis (GFC) and subsequent recession, researchers noted that cybercrime rates increased dramatically.

article thumbnail

These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia

We Live Security

ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search results The post These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia appeared first on WeLiveSecurity

Malware 115
article thumbnail

The DPRK Is the NKOTB of Healthcare Ransomware

SecureWorld News

A joint Cybersecurity Advisory (CSA) has revealed that the Democratic People's Republic of Korea (DPRK) is doing its best to become the New Kids on the Block (NKOTB) of ransomware. A Feb. 9, 2023, alert issued by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) provides an overview of the DPRK's state-sponsored ransomware and "updates the July 6, 2022, joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New Mirai malware variant infects Linux devices to build DDoS botnet

Bleeping Computer

A new Mirai botnet variant tracked as 'V3G4' targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS (distributed denial of service) attacks. [.

DDOS 114
article thumbnail

Evolving cyberattacks, alert fatigue creating DFIR burnout, regulatory risk

CSO Magazine

The evolution of cybercrime is weighing heavily on digital forensics and incident response (DFIR) teams, leading to significant burnout and potential regulatory risk. That’s according to the 2023 State of Enterprise DFIR survey by Magnet Forensics , a developer of digital investigation solutions. The firm surveyed 492 DFIR professionals in North America and Europe, the Middle East, and Africa working in organizations in industries such as technology, manufacturing, government, telecommunications

Risk 111
article thumbnail

US, UK Join Forces to Sanction Trickbot Leaders

Security Boulevard

In a first for the UK—and de rigueur for the U.S.—the U.S. Department of the Treasury’s Office of Foreign Assets Control and the U.K.’s Foreign, Commonwealth and Development Office, National Crime Agency and His Majesty’s Treasury sanctioned leadership of the notorious Russian cybergang Trickbot. The mutual action took aim at seven of the group’s top.

Risk 105
article thumbnail

Oakland Issues State of Emergency After Ransomware Attack

Heimadal Security

As a result of the ransomware attack that occurred on February 8, 2023, the city of Oakland has declared a local state of emergency. The ransomware attack against the City of Oakland was publicly disclosed last week; the date of the initial security breach was February 8, 2023. The City of Oakland has taken down […] The post Oakland Issues State of Emergency After Ransomware Attack appeared first on Heimdal Security Blog.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft Exchange ProxyShell flaws exploited in new crypto-mining attack

Bleeping Computer

A new malware dubbed 'ProxyShellMiner' exploits the Microsoft Exchange ProxyShell vulnerabilities to deploy cryptocurrency miners throughout a Windows domain to generate profit for the attackers. [.

article thumbnail

Security Alert: New Fake Customs Invoicing Smishing Campaign Targeting Romanian Telecom Users  

Heimadal Security

Heimdal® has recently launched an investigation into a massive smishing campaign, deliberately targeting Romanian telecom customers. The data collected so far reveals that the threat actor or APT behind the fake customs invoicing smishing campaign is attempting to maliciously collect user PII by redirecting them to a cloned website via an SMS-delivered crafted URL.

article thumbnail

Researchers Hijack Popular NPM Package with Millions of Downloads

The Hacker News

A popular npm package with more than 3.5 million weekly downloads has been found vulnerable to an account takeover attack. "The package can be taken over by recovering an expired domain name for one of its maintainers and resetting the password," software supply chain security company Illustria said in a report.

Passwords 104
article thumbnail

Royal Mail Refuses LockBit Ransomware Demand

SecureWorld News

Royal Mail, one of the United Kingdom's largest postal service providers, recently made headlines for its refusal to pay a ransom demanded by the notorious Russian-linked Lockbit cyber gang. The criminal group targeted the company's IT systems with ransomware and demanded a payment of $80 million, a number the gang thought to be 0.5% of the organization's annual revenue, to return control of the affected systems.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Crypto Buyers Beware: 1 in 4 New Tokens of Any Value Is a Scam

WIRED Threat Level

And according to tracing firm Chainalysis, one very prolific scammer ran at least 264 of those scams in 2022 alone.

Scams 103
article thumbnail

Window Snyder's Start-up Launches Security Platform for IoT Device Makers

Dark Reading

Thistle's technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says.

IoT 102
article thumbnail

Critical RCE Vulnerability Discovered in ClamAV Open Source Antivirus Software

The Hacker News

Cisco has rolled out security updates to address a critical flaw reported in the ClamAV open source antivirus engine that could lead to remote code execution on susceptible devices. Tracked as CVE-2023-20032 (CVSS score: 9.8), the issue relates to a case of remote code execution residing in the HFS+ file parser component. The flaw affects versions 1.0.0 and earlier, 0.105.

Antivirus 102
article thumbnail

Security amidst a global frost

We Live Security

No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield The post Security amidst a global frost appeared first on WeLiveSecurity

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hackers Using Google Ads to Spread FatalRAT Malware Disguised as Popular Apps

The Hacker News

Chinese-speaking individuals in Southeast and East Asia are the targets of a new rogue Google Ads campaign that delivers remote access trojans such as FatalRAT to compromised machines.

Malware 100
article thumbnail

Microsoft: February updates break some Windows Server 2022 VMs

Bleeping Computer

Microsoft says some Windows Server 2022 virtual machines might not boot up after installing updates released during this month's Patch Tuesday. [.

99
article thumbnail

Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs

The Hacker News

Security researchers have disclosed two new vulnerabilities affecting Schneider Electric Modicon programmable logic controllers (PLCs) that could allow for authentication bypass and remote code execution. The flaws, tracked as CVE-2022-45788 (CVSS score: 7.5) and CVE-2022-45789 (CVSS score: 8.1), are part of a broader collection of security defects tracked by Forescout as OT:ICEFALL.

article thumbnail

Arris router vulnerability could lead to complete takeover

Malwarebytes

Security researcher Yerodin Richards has found an authenticated remote code execution (RCE) vulnerability in Arris routers. This is the type of router that ISPs typically provide in loan for customers’ telephony and internet access. After responsible disclosure Richards has published a Proof-of-Concept (PoC) that demonstrates how he, ironically used the verification against itself.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!