Fri.Mar 10, 2023

article thumbnail

Weekly Update 338

Troy Hunt

I'm going lead this post with where I finished the video because it brought the biggest smile to Charlotte's and my faces this week: This. Is. Amazing 😍 pic.twitter.com/wOl4kpK841 — Troy Hunt (@troyhunt) March 3, 2023 When I talked about the McLaren in this week's video, Frits made the comment "the smile on your face says it all", which absolutely nailed it.

265
265
article thumbnail

Elephant Hackers

Schneier on Security

An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.

Hacking 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud security, hampered by proliferation of tools, has a “forest for trees” problem

Tech Republic Security

C-Suites executives have cybersecurity insecurities around cloud development, deployment and visibility, a Palo Alto Networks survey finds. The post Cloud security, hampered by proliferation of tools, has a “forest for trees” problem appeared first on TechRepublic.

article thumbnail

‘Extraordinary, Egregious’ Data Breach at House and Senate

Security Boulevard

Capitol Trouble: Senators, representatives and staffers suffer PII leak. Could it finally kickstart some action? The post ‘Extraordinary, Egregious’ Data Breach at House and Senate appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

AT&T informs 9M customers about data breach

CSO Magazine

AT&T is informing customers about a data breach at a vendor’s system that allowed threat actors to gain access to AT&T’s Customer Proprietary Network Information (CPNI). The incident came to light after customers posted the email communication from AT&T on community forums to know if it was legitimate or email fraud. “We recently determined that an unauthorized person breached a vendor’s system and gained access to your ‘Customer Proprietary Network Information’ (CPNI),” AT&T sai

article thumbnail

SHEIN shopping app goes rogue, grabs price and URL data from your clipboard

Naked Security

It's not exactly data theft, but it's worrying close to "unintentional treachery" - apparently because it's great for marketing purposes

Marketing 127

LifeWorks

More Trending

article thumbnail

ChatGPT: A new danger in the cybersecurity realm.

Security Boulevard

ChatGPT has taken the world by storm with over 100 million monthly users in January, setting the record for the fastest growing app since its launch at the end of 2022. This AI Chatbot has a wide range of uses, from writing essays to penning a business plan, it can even generate code. But [.] The post ChatGPT: A new danger in the cybersecurity realm. appeared first on Security Boulevard.

article thumbnail

Common WhatsApp scams and how to avoid them

We Live Security

Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.

Scams 120
article thumbnail

How Cybersecurity Delays Critical Infrastructure Modernization

Security Boulevard

Cybersecurity concerns relating to the protection of data are having a significant impact on the modernization (or lack thereof) of critical and public utility infrastructure, with many utility companies failing to adopt new tools and technology available to them. However, it is possible to integrate advanced tools in these areas while still maintaining a high.

article thumbnail

Xenomorph Android malware now steals data from 400 banks

Bleeping Computer

The Xenomorph Android malware has released a new version that adds significant capabilities to conduct malicious attacks, including a new automated transfer system (ATS) framework and the ability to steal credentials for 400 banks. [.

Banking 119
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Dark Pink APT Group Strikes Government Entities in South Asian Countries

Security Boulevard

Executive Summary In February 2023, EclecticIQ researchers identified multiple KamiKakaBot malwares which are very likely used to target government entities in ASEAN (Association of Southeast Asian Nations) countries. The latest attacks, which took place in February 2023, were almost identical to previous attacks reported by Group-IB on January 11, 2023 ( 1 ).

article thumbnail

BlackMamba PoC Malware Uses AI to Avoid Detection

eSecurity Planet

HYAS researchers recently developed proof-of-concept (PoC) malware that leverages AI both to eliminate the need for command and control (C2) infrastructure and to generate new malware on the fly in order to evade detection algorithms. The malware, dubbed “BlackMamba,” is the latest example of exploits that can evade even the most sophisticated cybersecurity products.

Malware 113
article thumbnail

Why You Need a Cybersecurity Analyst on Your Pentesting Team

Security Boulevard

Enterprises and government agencies conduct penetration testing (or pentesting) to simulate various attacks and discover how real cybercriminals can access their infrastructure. While the pentesters search for vulnerabilities and demonstrate possible attack vectors, there is one more project member whose role may be unclear to the customer: A cybersecurity analyst.

article thumbnail

CISA funding to top $3 billion under Biden's FY 2024 budget

CSO Magazine

President Biden released his FY 2024 budget proposal that seeks a bigger budget for the Cybersecurity and Infrastructure Security Agency (CISA) and greater cyber investigative capabilities for the FBI. The budget also calls for increasing the federal government's IT modernization efforts, exploring cybersecurity efforts surrounding gender-based cybercrimes, expanding efforts to counter China's problematic behaviors, and helping Ukraine better defend itself on the digital front.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

GrammaTech Makes Finding Vulnerabilities in Binaries Simpler

Security Boulevard

GrammaTech this week updated its CodeSentry software composition analysis (SCA) tool to make it simpler to identify specific types of vulnerabilities within application binaries. In addition, the company is also now making CodeSentry 4.2 available in three editions, starting with a software bill of materials (SBOM) edition that is available for free for a limited.

Software 115
article thumbnail

Mental health provider Cerebral alerts 3.1M people of data breach

Bleeping Computer

Healthcare platform Cerebral is sending data breach notices to 3.18 million people who have interacted with its websites, applications, and telehealth services. [.

article thumbnail

Orca Security Adds Attack Path Analysis to Cloud Security Platform

Security Boulevard

Orca Security this week added attack path analysis capabilities to its cloud security platform as part of an effort to make it easier to identify weaknesses that cybercriminals might exploit, including threats spanning multiple accounts and cloud service providers. Company CEO Avi Shua said this latest addition to the Orca Cloud Security Platform is intended.

article thumbnail

CISA warns of critical VMware RCE flaw exploited in attacks

Bleeping Computer

CISA has added a critical severity vulnerability in VMware's Cloud Foundation to its catalog of security flaws exploited in the wild. [.

110
110
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Deep Web vs. Dark Web: What is Each and How Do They Work

Heimadal Security

You may have heard these concepts being thrown around, but you don’t really know what they are, except that they sound ominous. You may suspect that it’s a place (or places) where malicious hackers roam. You may have also heard of the so-called ‘intellectual dark web’, but that just makes matters even more confusing. So, […] The post Deep Web vs.

article thumbnail

Security researchers targeted with new malware via job offers on LinkedIn

Bleeping Computer

A suspected North Korean hacking group is targeting security researchers and media organizations in the U.S. and Europe with fake job offers that lead to the deployment of three new, custom malware families. [.

Malware 105
article thumbnail

Camelot Launches Cybersecurity Service Augmented by ML

Security Boulevard

Camelot this week launched a Secure360 cybersecurity platform that enables its cybersecurity team to leverage machine learning algorithms to perform vulnerability and assessments, cyberthreat hunting and cyberthreat intelligence analysis. Camelot CEO Stanford Oliver said the overall goal is to identify and remediate issues before a cybersecurity incident occurs.

article thumbnail

Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant

The Hacker News

A new variant of the Android banking trojan named Xenomorph has surfaced in the wild, the latest findings from ThreatFabric reveal. Named "Xenomorph 3rd generation" by the Hadoken Security Group, the threat actor behind the operation, the updated version comes with new features that allow it to perform financial fraud in a seamless manner.

Banking 102
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New variant of the IceFire ransomware targets Linux enterprise systems

CSO Magazine

A novel Linux version of the IceFire ransomware that exploits a vulnerability in IBM's Aspera Faspex file-sharing software has been identified by SentinelLabs, a research division of cybersecurity company Sentinel One. The exploit is for CVE-2022-47986 , a recently patched Aspera Faspex vulnerability. Known up to now to target only Windows systems, the IceFire malware detected by SentinelLabs uses an iFire extension, consistent with a February report from MalwareHunterTeam — a group of indepen

article thumbnail

Latest version of Xenomorph Android malware targets 400 banks

Security Affairs

A new version of the Xenomorph Android malware includes a new automated transfer system framework and targets 400 banks. The author of the Xenomorph Android malware, the Hadoken Security Group, continues to improve their malicious code. In February 2022, researchers from ThreatFabric first spotted the Xenomorph malware, which was distributed via the official Google Play Store reaching over 50,000 installations.

Banking 98
article thumbnail

Malware targeting SonicWall devices could survive firmware updates

Malwarebytes

Researchers at Mandiant have identified a malware campaign targeting SonicWall SMA 100 Series appliances, thought to be of Chinese origin. The malware was likely deployed in 2021, and was able to persist on the appliances tenaciously, even surviving firmware upgrades. The malware was able to steal user credentials and provide shell access. The SMA 100 Series is an access control system that lets remote users log in to company resources.

article thumbnail

AT&T is notifying millions of customers of data breach after a third-party vendor hack

Security Affairs

AT&T is warning some of its customers that some of their information was exposed after the hack of a third-party vendor’s system. AT&T is notifying millions of customers that some of their information was exposed after a third-party vendor was hacked. CPNI is information related to the telecommunications services purchased by the customers, including the number of lines for each account or the wireless plan to which customers are subscribed. “We recently determined that an un

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Top 5 Must-Watch XDR Videos from Heimdal®

Heimadal Security

As we have seen in our previous articles, news, and webinars, in this increasingly complex threat landscape, malicious actors employ more and more sophisticated techniques to exploit traditional security parameters, safeguards, and countermeasures implemented to safeguard corporate data and infrastructure. Given the current situation, enterprises may find it challenging to protect their vulnerable digital assets […] The post Top 5 Must-Watch XDR Videos from Heimdal® appeared first on Heimd

article thumbnail

Law enforcement seized the website selling the NetWire RAT and arrested a Croatian man

Security Affairs

An international law enforcement operation seized the infrastructure associated with the NetWire RAT and resulted in the arrest of its administrator. A coordinated international law enforcement operation resulted in the seizure of the infrastructure associated with the NetWire RAT, the police also arrested its administrator. Busted! A coordinated #lawenforcement action has taken down the #Netwire Remote Access Trojan infrastructure.

Malware 98
article thumbnail

5 Ways Heimdal® Protects Your Endpoints

Heimadal Security

In the book about cybersecurity, protecting your endpoints must be the first and one of the most important chapters. Once an endpoint is breached, there is no way of telling what a cybercriminal will do next. Hackers can decide to encrypt your data, steal valuable information, infect the entire network, send malicious emails, and so […] The post 5 Ways Heimdal® Protects Your Endpoints appeared first on Heimdal Security Blog.

article thumbnail

The Importance of a Multi-Layered Approach to Cybersecurity

GlobalSign

This article explores the definition and benefits of multi-layered security, along with how you can implement this approach.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!