Sun.May 07, 2023

article thumbnail

Cloud, Workforce, Cyber and AI: NASCIO Midyear 2023

Lohrman on Security

The National Association of State Chief Information Officers held their 2023 Midyear Conference in National Harbor, Md., this past week. Here are some top takeaways from the program and state leadership conversations.

199
199
article thumbnail

New Cactus ransomware encrypts itself to evade antivirus

Bleeping Computer

A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of "large commercial entities." [.

Antivirus 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Business Owners Can Learn From the AKPK Breach

Security Boulevard

Discover the lessons learned from the AKPK breach and how it can help business owners improve their cybersecurity measures. The post What Business Owners Can Learn From the AKPK Breach appeared first on GuardRails. The post What Business Owners Can Learn From the AKPK Breach appeared first on Security Boulevard.

article thumbnail

Empire of Hackers launched by CIA targets China

CyberSecurity Insiders

It is concerning to hear about the allegations and warnings issued by China’s National Computer Virus Emergency Response Centre (CVERC) regarding the CIA’s involvement in cyber-attacks on critical infrastructure and the use of the “Empire of Hackers” group for orchestrating Peaceful Evolutions and Color Revolutions against governments across the globe.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

San Bernardino County Sheriff’s Department paid a $1.1M ransom

Security Affairs

The San Bernardino County Sheriff’s Department confirmed that it has paid a $1.1-million ransom after the April ransomware attack. The San Bernardino County Sheriff’s Department opted to pay a $1.1-million ransom after a ransomware attack infected its systems in early April. The ransomware attack forced the Police department to temporarily shut down some of its systems to prevent the threat from spreading.

article thumbnail

Meet Akira — A new ransomware operation targeting the enterprise

Bleeping Computer

The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms. [.

More Trending

article thumbnail

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

The Hacker News

An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a polyglot file, according to the Computer Emergency Response Team of Ukraine (CERT-UA). The emails, per the agency, are sent using compromised accounts and come with a ZIP archive that, in reality, is a polyglot file containing a decoy document and a JavaScript file.

Malware 84
article thumbnail

New CS:GO map bypasses Russia's censorship of Ukraine war news

Bleeping Computer

Finish newspaper Helsinin Sanomat has created a custom Counter-Strike: Global Offensive (CS:GO) map explicitly made to bypass Russian news censorship and smuggle information about the war in Ukraine to Russian players. [.

85
article thumbnail

A week in security (May 1 - 7)

Malwarebytes

Last week on Malwarebytes Labs: How to protect your small business from social engineering Microsoft: You're already using the last version of Windows 10 Is it OK to train an AI on your images, without permission? Upcoming webinar: Is EDR or MDR better for your business? Google Authenticator WILL get end-to-end encryption. Eventually. Google takes CryptBot to the wood shed Oracle WebLogic Server vulnerability added to CISA list as “known to be exploited” How to keep your ChatGPT conv

article thumbnail

Western Digital says hackers stole customer data in March cyberattack

Bleeping Computer

Western Digital has taken its store offline and sent customers data breach notifications after confirming that hackers stole sensitive personal information in a March cyberattack. [.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Uber’s ex-CSO avoids prison after data breach cover up

Graham Cluley

After covering up a data breach that impacted the personal records of 57 million Uber passengers and drivers, the company's former Chief Security Officer has been found guilty and sentenced by a US federal judge. Read more in my article on the Hot for Security blog.

article thumbnail

The Role of WAAP Platforms in the CI/CD Pipeline

Security Boulevard

A WAAP solution could play a critical role in CI/CD process. It helps protect apps and APIs from threats throughout the entire SDLC. The post The Role of WAAP Platforms in the CI/CD Pipeline appeared first on Indusface. The post The Role of WAAP Platforms in the CI/CD Pipeline appeared first on Security Boulevard.

70
article thumbnail

Data Security in Recruitment: How to Protect Candidate Privacy

SecureWorld News

Gone are the days when people used to highlight job ads in newspapers when looking for a job. In today's digital era, recruitment has transformed into e-recruitment, making the whole process a digital affair. However, this has also led to an uptick in data breaches and privacy concerns. So how can recruitment agencies and freelance recruiters ensure that they prevent data breaches and protect candidate privacy?

article thumbnail

Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks

Security Boulevard

In this episode we debunk the fearmongering surrounding “juice jacking,” a cyber attack where attackers steal data from devices that are charging via USB ports. Next, we dive into a case where a photographer tried to get his photos removed from an AI dataset, only to receive an invoice instead of having his photos taken […] The post Juice Jacking Debunked, Photographer vs.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Your Twitter Feed Sucks Now. These Free Add-Ons Can Help

WIRED Threat Level

A few simple tools can help filter out most Twitter Blue users (but still see the ones you like).

89
article thumbnail

Cloud, Workforce, Cyber and AI: NASCIO Midyear 2023

Security Boulevard

The National Association of State Chief Information Officers held their 2023 Midyear Conference in National Harbor, Md., this past week. Here are some top takeaways from the program and state leadership conversations. The post Cloud, Workforce, Cyber and AI: NASCIO Midyear 2023 appeared first on Security Boulevard.

57
article thumbnail

Ransomware Attacks Surge in 2023: What SMBs Should Know

Spinone

Ransomware attacks are on the rise again in the first quarter of 2023. No business is exempt from being a target and potentially a victim. This post is a warning of the ransomware attacks surge for small and medium-sized companies. Learn the main trends in ransomware and how to protect your data. Ransomware Attacks Surge […] The post Ransomware Attacks Surge in 2023: What SMBs Should Know first appeared on SpinOne.

article thumbnail

The Role of DAST in Meeting Regulatory Compliance Standards

Security Boulevard

Discover how DAST plays a crucial role in meeting regulatory compliance standards and ensuring the security of your web applications. The post The Role of DAST in Meeting Regulatory Compliance Standards appeared first on GuardRails. The post The Role of DAST in Meeting Regulatory Compliance Standards appeared first on Security Boulevard.

52
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ransomware Attacks Surge in 2023: What SMBs Should Know

Spinone

Ransomware attacks are on the rise again in the first quarter of 2023. No business is exempt from being a target and potentially a victim. This post is a warning of the ransomware attacks surge for small and medium-sized companies. Learn the main trends in ransomware and how to protect your data. Ransomware Attacks Surge […] The post Ransomware Attacks Surge in 2023: What SMBs Should Know first appeared on SpinOne.

article thumbnail

Securing the Grid: How Balbix Transformed a US Utility Company’s Cybersecurity Posture

Security Boulevard

Cybersecurity for Utility companies is a complex endeavor: Electric utility companies around the world are progressively adopting smart grid technologies to enhance their operations. As these advanced systems evolve, they bring with them the potential for increased cybersecurity vulnerabilities that can be exploited by malicious actors. Consequently, these companies that run large-scale electric systems are … Read More The post Securing the Grid: How Balbix Transformed a US Utility Company’s Cyb

article thumbnail

cloudtoolkit v0.1.3 releases: Cloud Penetration Testing Toolkit

Penetration Testing

cloudtoolkit Cloud Penetration Testing Toolkit Capability overview Providers Payload Supported Alibaba Cloud backdoor-user: Backdoored user can be used to obtain persistence in the Cloud environment. bucket-dump: Quickly enumerate buckets to look for loot. cloudlist:... The post cloudtoolkit v0.1.3 releases: Cloud Penetration Testing Toolkit appeared first on Penetration Testing.

article thumbnail

USENIX Enigma 2023 – Marcus Botacin – ‘Why Is Our Security Research Failing? Five Practices to Change!’

Security Boulevard

Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX Enigma 2023 – Marcus Botacin – ‘Why Is Our Security Research Failing? Five Practices to Change!’ appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Key Trends and Insights from RSAC 2023

Trend Micro

Unpacking the Future of Cybersecurity

article thumbnail

How 5G network is immune to Cyber Attacks

CyberSecurity Insiders

It is not accurate to say that 5G networks are completely immune to cyber attacks. Like any other network, 5G networks are vulnerable to various types of cyber attacks, such as distributed denial-of-service (DDoS) attacks, phishing attacks, and malware infections. However, 5G networks do offer some unique security features that can help mitigate the risks of cyber attacks.