Fri.Aug 12, 2022

article thumbnail

Weekly Update 308

Troy Hunt

It was all a bit last minute today after travel, office works and then a quick rebuild of desk and PC before doing this livestream (didn't even have time to comb my hair!) So yes, I took a shortcut with the description of this video, but it all worked out well in the end IMHO with plenty of content that wasn't entirely data breach related, but yeah, that does seem to be a bit of a recurring theme in these vids.

article thumbnail

Twitter Exposes Personal Information for 5.4 Million Accounts

Schneier on Security

Twitter accidentally exposed the personal information—including phone numbers and email addresses—for 5.4 million accounts. And someone was trying to sell this information. In January 2022, we received a report through our bug bounty program of a vulnerability in Twitter’s systems. As a result of the vulnerability, if someone submitted an email address or phone number to Twitter’s systems, Twitter’s systems would tell the person what Twitter account the submitted em

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best penetration testing tools: 2022 buyer’s guide

Tech Republic Security

Security professionals need penetration testing tools to understand the security posture of every software environment. Check out our list of the best penetration testing tools in 2022. The post Best penetration testing tools: 2022 buyer’s guide appeared first on TechRepublic.

article thumbnail

A Taxonomy of Access Control

Schneier on Security

My personal definition of a brilliant idea is one that is immediately obvious once it’s explained, but no one has thought of it before. I can’t believe that no one has described this taxonomy of access control before Ittay Eyal laid it out in this paper. The paper is about cryptocurrency wallet design, but the ideas are more general. Ittay points out that a key—or an account, or anything similar—can be in one of four states: safe Only the user has access, loss No one has

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Almost 2,000 data breaches reported for the first half of 2022

Tech Republic Security

Though the number of breaches reported in the first half of 2022 were lower than those for the same period in 2021, Flashpoint expects the final numbers to be similar. The post Almost 2,000 data breaches reported for the first half of 2022 appeared first on TechRepublic.

article thumbnail

UK NHS Hit with Ransomware Attack

Heimadal Security

There are concerns that patient data may have been the target of a ransomware attack on a software supplier that affected the NHS throughout the UK. The UK business Advanced, which was the target of the attack last week, announced that it was cooperating with law enforcement in the wake of the event, including the […]. The post UK NHS Hit with Ransomware Attack appeared first on Heimdal Security Blog.

LifeWorks

More Trending

article thumbnail

5 Misconceptions about Mobile Application Security Testing

Appknox

All app development companies are aware of the importance of mobile application security testing. Despite this, the app stores are full of potentially vulnerable apps.

Mobile 122
article thumbnail

What is Magento? Everything You Need To Know

SecureBlitz

In the modern world of e-commerce, there are a huge number of different online platforms for every taste. But if. Read more. The post What is Magento? Everything You Need To Know appeared first on SecureBlitz Cybersecurity.

article thumbnail

Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

The State of Security

Ransomware is to blame for the closure of all 175 7-Eleven stores in Denmark on Monday. The retailer closed all of its stores in Denmark after its cash registers and payment systems were brought down in the attack. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face

Security Boulevard

Cisco got hacked by a ransomware gang—a broker for the UNC2447 threat actor, which has “a nexus to Russia.”. The post Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How A PDF Can Contain Malware

SecureBlitz

A PDF is one of the most frequently used file formats for sending documents, commonly used everywhere, a successful replacement. Read more. The post How A PDF Can Contain Malware appeared first on SecureBlitz Cybersecurity.

Malware 105
article thumbnail

Cloudflare Thwarts Cyberattack with Hardware Security Keys

SecureWorld News

Internet infrastructure company Cloudflare recently announced it successfully defended against a cyberattack targeting employees with the use of one of its own security products. The company said that thanks to its Cloudflare One products and the hardware security keys issued to every employee, which are needed to access all its applications, a phishing campaign failed to compromise any systems, despite some employees falling for the scam.

Phishing 103
article thumbnail

6 Ways To Optimize Your DevOps Team Productivity

SecureBlitz

Every DevOps team benefits significantly from the optimization that maximizes the performance of the individual members of the group. There. Read more. The post 6 Ways To Optimize Your DevOps Team Productivity appeared first on SecureBlitz Cybersecurity.

article thumbnail

Black Hat 2022? Cyberdefense in a global threats era

We Live Security

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind. The post Black Hat 2022‑ Cyberdefense in a global threats era appeared first on WeLiveSecurity.

102
102
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The US offers a $10M rewards for info on the Conti ransomware gang’s members

Security Affairs

The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The U.S. State Department announced a $10 million reward for information on five prominent members of the Conti ransomware gang. The government will also reward people that will provide details about Conti and its affiliated groups TrickBot and Wizard Spider.

article thumbnail

Chinese criminals scam kids desperate to play games for more than three hours a week

Graham Cluley

Scammers are stealing money from children, with the alluring but bogus promise that China's tough restrictions on online gaming can be subverted. Read more in my article on the Hot for Security blog.

Scams 99
article thumbnail

Patch Madness: Vendor Bug Advisories Are Broken, So Broken

Dark Reading

Duston Childs and Brian Gorenc of ZDI take the opportunity at Black Hat USA to break down the many vulnerability disclosure issues making patch prioritization a nightmare scenario for many orgs.

99
article thumbnail

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

The Hacker News

A security feature bypass vulnerability has been uncovered in three signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypass of the UEFI Secure Boot feature.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Anonymous poop gifting site hacked, customers exposed

Bleeping Computer

ShitExpress, a web service that lets you send a box of feces along with a personalized message to friends and enemies, has been breached after a "customer" spotted a vulnerability. [.].

Hacking 98
article thumbnail

Researchers found one-click exploits in Discord and Teams

Malwarebytes

A group of security researchers have discovered a series of vulnerabilities in Electron, the software underlying popular apps like Discord, Microsoft Teams, and many others, used by tens of millions of people all over the world. Electron is a framework that allows developers to create desktop applications using the languages used to build websites: HTML5, CSS, and JavaScript.

article thumbnail

Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass

Bleeping Computer

Some signed third-party bootloaders for the Unified Extensible Firmware Interface (UEFI) used by Windows could allow attackers to execute unauthorized code in an early stage of the boot process, before the operating system loads. [.].

article thumbnail

How to Clear Security Obstacles and Achieve Cloud Nirvana

Dark Reading

Back-end complexity of cloud computing means there's plenty of potential for security problems. Here's how to get a better handle on SaaS application security.

98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Experts warn of mass exploitation of an RCE flaw in Zimbra Collaboration Suite

Security Affairs

Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass affecting Zimbra Collaboration Suite, tracked as CVE-2022-27925, is actively exploited to hack ZCS email servers worldwide. Zimbra is an email and collaboration platform used by more than 200,000 businesses from over 140 countries.

article thumbnail

A Single Flaw Broke Every Layer of Security in MacOS

WIRED Threat Level

An injection flaw allowed a researcher to access all files on a Mac. Apple issued a fix, but some machines may still be vulnerable.

Hacking 98
article thumbnail

Xiaomi Phones with MediaTek Chips Found Vulnerable to Forged Payments

The Hacker News

Security flaws have been identified in Xiaomi Redmi Note 9T and Redmi Note 11 models, which could be exploited to disable the mobile payment mechanism and even forge transactions via a rogue Android app installed on the devices.

Mobile 98
article thumbnail

Cybersecurity News Round-Up: Week of August 8, 2022

Security Boulevard

The UK feeling pained following a ransomware attack on the NHS, 18 tech & cyber companies launch new security standard for sharing cybersecurity information. The post Cybersecurity News Round-Up: Week of August 8, 2022 appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Facebook Testing Default End-to-End Encryption and Encrypted Backup in Messenger

The Hacker News

Social media company Meta said it will begin testing end-to-end encryption (E2EE) on its Messenger platform this week for select users as the default option, as the company continues to slowly add security layers to its various chat services.

article thumbnail

Pay with just your palm at Whole Foods

Security Boulevard

Amazon is rolling out its Amazon One payment service to 65 Whole Foods stores in California. The service uses high-tech checkout devices that allow customers to pay simply by scanning their palms. Customers sign up for Amazon One by registering their palmprint with a connected credit card and phone number at special kiosks in participating stores. Once registered, customers can pay for their groceries by hovering their bare hand above the checkout device.

article thumbnail

Cisco Patches High-Severity Vulnerability Affecting ASA and Firepower Solutions

The Hacker News

Cisco on Wednesday released patches to contain multiple flaws in its software that could be abused to leak sensitive information on susceptible appliances. The issue, assigned the identifier CVE-2022-20866 (CVSS score: 7.

article thumbnail

Anti-tracking tool tells you if you're being followed

Malwarebytes

If there is one thing we know about the people around us, even the perfect strangers, it's that they almost all have smartphones. And those smartphones aren't merely passive receivers, they're broadcasting constantly, looking for things you might want to connect to. Advertisers have exploited the electronic noise that smartphones make for years, using it to track people in places like shopping malls.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!