Thu.Mar 16, 2023

article thumbnail

Why We Need To Talk About DigitALL

Jane Frankland

Last week, on March 8, many of us celebrated International Women’s Day (IWD).

Education 130
article thumbnail

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

Tech Republic Security

While the administration may look to strengthen security against cyberattackers for cloud providers, like Amazon, Microsoft and Google, experts say the onus is on the customer. The post The Biden administration may eye CSPs to improve security, but the real caveat emptor?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast

Security Boulevard

Ben is disappointed: FBI reports huge rise in cryptocurrency investment scams. Why am I not surprised? The post Scams Lost US $10 BILLION in 2022 — Crypto Fraud Grows Fast appeared first on Security Boulevard.

Scams 111
article thumbnail

Electronic communication policy

Tech Republic Security

This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications.

111
111
article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the foundational elements you need to start or validate your ERM program. He will also dive into topic definitions, governance structures, and framework components for success.

article thumbnail

Analysis: Where Next As Europol Hails Rare DoppelPaymer Ransomware Success

CyberSecurity Insiders

By John E. Dunn Two arrests for alleged ransomware crimes and some useful intel. But will the latest Europol action make any difference? Following an international operation encompassing law enforcement agencies in Germany, Ukraine, the Netherlands and the U.S.,

article thumbnail

BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion

Dark Reading

The ransomware group has already claimed 116 victim organizations so far on its site, and it continues to mature as a thriving cybercriminal business, researchers said

More Trending

article thumbnail

YouTube becomes a heaven to malware stealers

CyberSecurity Insiders

Whenever we see a YouTube video that is informative, we tend to go through the description or ‘show more’ feature and have a habit of clicking on the links. What if the link leads us to a website that is a malware dropper?

Malware 99
article thumbnail

$3B Crypto-Mixer Money Laundering Operation Seized by Cops

Dark Reading

The 'ChipMixer' cryptocurrency service for cybercriminals was shut down by law enforcement, and its alleged operator has been charged

article thumbnail

How to Protect Your Company in a ChatGPT World

Security Boulevard

With the potential to be as game-changing as the internet, smartphones and cloud computing, the emergence of generative AI tools like ChatGPT and GitHub CoPilot will undoubtedly open up new possibilities and challenges for companies.

article thumbnail

Hackers shifting cybercrime focus towards smart phones and tablets

CyberSecurity Insiders

All these days, we have seen cyber criminals infiltrating networks and taking down computers. But after the spread of the Covid-19 pandemic, the focus of hackers has shifted more towards the smart phones with more phishing and social engineering attacks recorded in a 2nd quarter of 2022.

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Join this exclusive webinar with Dr. Karen Hardy, where she will explore the power of storytelling in risk communication as a core component of a resilient organization's management framework!

article thumbnail

The Importance of Physical Access Endpoint Detection 

Security Boulevard

In our latest blog, Nozomi Networks Labs share insights into host-based threats, highlight the importance of endpoint detection sensors like Arc, and explain how these sensors can be used to protect OT/IoT assets.

IoT 96
article thumbnail

5 Ways to Fight School Ransomware Attacks

Dark Reading

The challenges are steep, but school districts can fight back with planning

article thumbnail

The Top Cybersecurity Grants for Education and How To Apply for Them

Security Boulevard

Cyber safety challenges — and the often-pricey tools designed to overcome them — are a fact of life. Sure, the cheapest cybersecurity solution is to just give up using every piece of technology that poses any sort of risk — but that would leave your school with chalkboards and paper spreadsheets.

article thumbnail

Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets

Bleeping Computer

Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung's Exynos chipsets used in mobile devices, wearables, and cars. [.] Security

Mobile 131
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

10 Network Security Threats Everyone Should Know

eSecurity Planet

Network security threats weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure.

article thumbnail

BrandPost: 1Password integrates with Okta SSO

CSO Magazine

Single Sign-On (SSO) providers like Okta protect businesses by combining all company-approved sites and services in a single dashboard. Employees can then use a single, strongly vetted identity to log in to those sites and services using a single set of credentials.

CSO 128
article thumbnail

Ethics in AI: The Missing Code

Security Boulevard

As part of its push toward artificial intelligence, Microsoft laid off more than 10,000 employees and spent billions on acquiring AI tech. Among those laid off were the seven-member team in their Office of Responsible AI.

article thumbnail

Change Is Coming to the Network Detection and Response (NDR) Market

Dark Reading

After years of relative stability and steady growth, Omdia research indicates the NDR segment is poised for rapid change

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

CISA adds Adobe ColdFusion bug to Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added an actively exploited vulnerability in Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog.

Risk 87
article thumbnail

Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks

Dark Reading

Attackers are increasingly staying under the radar by using your own tools against you. Only behavioral AI can catch these stealthy attacks

85
article thumbnail

Polish intelligence dismantled a network of Russian spies

Security Affairs

Polish intelligence dismantled a cell of Russian spies that gathered info on military equipment deliveries to Ukraine via the EU member. Polish counter-intelligence has dismantled a cell of Russian spies that gathered information on the provisioning of military equipment to Ukraine via the EU member.

Media 86
article thumbnail

Not?so?private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

We Live Security

ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds The post Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets appeared first on WeLiveSecurity ESET Research

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Baseband RCE flaws in Samsung’s Exynos chipsets expose devices to remote hack

Security Affairs

Google’s Project Zero hackers found multiple flaws in Samsung ’s Exynos chipsets that expose devices to remote hack with no user interaction.

Hacking 85
article thumbnail

S3 Ep 126: The price of fast fashion (and feature creep) [Audio + Text]

Naked Security

Worried about rogue apps? Unsure about the new Outlook zero-day? Clear advice in plain English. just like old times, with Duck and Chet! Data loss Google Microsoft Mozilla Podcast Privacy Vulnerability Cybercrime Firefox Naked Security Podcast Outlook Patch Tuesday SHEIN vulnerability

article thumbnail

Microsoft sheds light on a year of Russian hybrid warfare in Ukraine

Security Affairs

Russia-linked threat actors targeted at least 17 European nations in 2023, and 74 countries since the start of the invasion of Ukraine. Microsoft revealed that Russia-linked threat actors targeted at least 17 European nations between January and mid-February 2023.

article thumbnail

Microsoft Targets Critical Outlook Zero-Day Flaw

eSecurity Planet

Microsoft’s Patch Tuesday for March 2023 includes patches for more than 70 vulnerabilities, including zero-day flaws in Outlook and in Windows SmartScreen.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

Senator Warner on the Restrict Act and a US TikTok Ban

WIRED Threat Level

WIRED spoke with the coauthor of the Restrict Act, a bipartisan bill to crack down on tech from six “hostile” countries. Security Security / National Security Business / Social Media

Media 78
article thumbnail

Why red team exercises for AI should be on a CISO's radar

CSO Magazine

AI and machine learning (ML) capabilities present a huge opportunity for digital transformation but open yet another threat surface that CISOs and risk professionals will have to keep tabs on.

article thumbnail

Multiple threat actors exploited Progress Telerik bug to breach U.S. federal agency

Security Affairs

Multiple threat actors exploited a critical flaw in Progress Telerik to breach an unnamed US federal agency, said the US government.

article thumbnail

Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips

The Hacker News

Google is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of which could be exploited remotely to completely compromise a phone without requiring any user interaction.

108
108
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.