Wed.May 17, 2023

article thumbnail

Microsoft Secure Boot Bug

Schneier on Security

Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure Boot protections, allowing for the execution of malicious code before your PC begins loading Windows and its many security protections. Secure Boot has been enabled by default for over a decade on most Windows PCs sold by companies like Dell, Lenovo, HP, Acer, and others.

Media 312
article thumbnail

PaperCut vulnerability abused by several threat actors could impact 70,000 organizations

Tech Republic Security

Get technical details about how the cybercriminals are targeting this vulnerability, who is impacted, and how to detect and protect against this security threat. The post PaperCut vulnerability abused by several threat actors could impact 70,000 organizations appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals

The Last Watchdog

Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an onerous business expense? Related: Security sea-change wrought by ‘CMMC’ This would fit nicely with the ‘ stronger together ’ theme heralded at RSA Conference 2023. WithSecure is one cybersecurity vendor that is certainly on this path.

article thumbnail

Malicious Microsoft VSCode extensions steal passwords, open remote shells

Bleeping Computer

Cybercriminals are starting to target Microsoft's VSCode Marketplace, uploading three malicious Visual Studio extensions that Windows developers downloaded 46,600 times. [.

Passwords 141
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Security breaches push digital trust to the fore

CSO Magazine

As digital transactions with customers, employees, suppliers, and other stakeholders grow, digital trustworthiness is set to become one of the most important enterprise-wide initiatives with the biggest potential impact (both negative and positive), even though it often has the smallest budget allocation. “Organizations are focusing on security and privacy, but if your customers don’t trust you, they will go elsewhere,” says Mark Thomas president of Escoute Consulting, which specializes in compl

136
136
article thumbnail

Architecture Matters When it Comes to SSE

CyberSecurity Insiders

by John Spiegel, Director of Strategy, Axis Security Gartner just released the 2023 version of their “Magic Quadrant” for Secure Service Edge or SSE. Cheers are being heard from the companies who scored upper righthand and jeers being shouted for those companies who did not enjoy where they landed on Gartner’s matrix. Over the next few months, there will be a lot of noise coming from all the vendors.

LifeWorks

More Trending

article thumbnail

Ransomware – Stop’em Before They Wreak Havoc

Thales Cloud Protection & Licensing

Ransomware – Stop’em Before They Wreak Havoc madhav Thu, 05/18/2023 - 06:03 Cybercriminals have been making a run on your data with ransomware attacks over the last decade in increasing frequency. They wreak havoc by bringing critical infrastructures, supply chains, hospitals, and city services to a grinding halt. Cybersecurity Ventures predicts by 2031 ransomware will cost victims $265 billion annually, and it will affect a business, consumer, or device every 2 seconds.

article thumbnail

Navigating the complex world of Cybersecurity compliance

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Cyberattacks have become increasingly common, with organizations of all types and sizes being targeted. The consequences of a successful cyberattack can be devastating.

article thumbnail

FBI confirms BianLian ransomware switch to extortion only attacks

Bleeping Computer

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) have published a joint advisory to inform organizations of the latest tactics, techniques, and procedures (TTPs) and known indicators of compromise (IOCs) of the BianLian ransomware group. [.

article thumbnail

US offers $10m bounty for Russian ransomware suspect outed in indictment

Naked Security

"Up to $10 million for information that leads to the arrest and/or conviction of this defendant.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Defending Your Organization Against Ransomware

Security Boulevard

Every day, coordinated cybercriminal groups are developing more advanced skills to hack organizations’ networks. The number of ransomware attacks has increased significantly, and it’s getting easier for sophisticated cybercriminal gangs to access companies’ data. As ransomware attacks become more refined and organizations are under rising threat, the stakes are high.

article thumbnail

How to reduce your devops tool sprawl

InfoWorld on Security

After spending the last decade investing in devops , many companies are experiencing a hangover of sorts: tool sprawl. While their software delivery processes have become more streamlined, more efficient, and more reliable, they also have many more tools to license, maintain, and manage. Tool sprawl is often seen as a natural result of the flexibility and empowerment of dev teams to choose their own tools, but organizations now understand the need for a single, streamlined system.

Software 114
article thumbnail

We’re Teaming Up With Snyk to Strengthen Developer Security!

Security Boulevard

The new partnership enables Snyk and GitGuardian to build, integrate and go to market together to help development and security teams scale their security programs and significantly reduce their applications' attack surface at every stage of the code-to-cloud lifecycle. The post We’re Teaming Up With Snyk to Strengthen Developer Security! appeared first on Security Boulevard.

Marketing 114
article thumbnail

Technology based acquisition news trending on Google

CyberSecurity Insiders

IBM has made a smart move to address the issue of cloud data protection by acquiring Polar Security, a company specializing in automated data protection. The tech giant has officially announced that this new acquisition will assist companies in tackling problems related to shadow data and software-as-a-service application data. With the increasing adoption of cloud technology by companies, organizations are struggling to manage the influx of information from cloud apps.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

State-Sponsored Sidewinder Hacker Group's Covert Attack Infrastructure Uncovered

The Hacker News

Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in Pakistan and China. This comprises a network of 55 domains and IP addresses used by the threat actor, cybersecurity companies Group-IB and Bridewell said in a joint report shared with The Hacker News.

Phishing 113
article thumbnail

Meet “AI”, your new colleague: could it expose your company’s secrets?

We Live Security

Before rushing to embrace the LLM-powered “hire”, make sure your organization has safeguards in place to avoid putting its business and customer data at risk The post Meet “AI”, your new colleague: could it expose your company’s secrets?

Risk 112
article thumbnail

How Poker Skills Help Guide Ransomware Payment Decisions

Security Boulevard

A ransomware attack does more than just hold your data hostage. It can create situations that end up crippling your organization’s ability to move forward or make good, effective decisions quickly. Even those companies that have a ransomware response plan in place may wonder whether their decision to pay—or not to pay—a ransom is the. The post How Poker Skills Help Guide Ransomware Payment Decisions appeared first on Security Boulevard.

article thumbnail

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

The Hacker News

A hacking group dubbed OilAlpha with suspected ties to Yemen's Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Russian scientists develop new communication medium through quantum teleportation

CyberSecurity Insiders

Scientists from Russia, working for Don State Technical University, have developed a new medium of communication through the technology of Quantum Teleportation. The researchers argue that the invention will play a vital role in protecting information from being stolen by hackers. Olga Safaryan, a professor at the Information Systems Cybersecurity Department, explained the theory with a small example.

article thumbnail

ScanSource says ransomware attack behind multi-day outages

Bleeping Computer

Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and customer portals. [.

article thumbnail

The Transformative Power of Artificial Intelligence Across Industries

CyberSecurity Insiders

The pervasive influence of Artificial Intelligence (AI) is propelling a remarkable wave of transformation across diverse sectors. As AI technologies become increasingly integrated, industries are witnessing unprecedented changes that enhance productivity, streamline operations, and optimize decision-making processes. The growing adoption of AI-driven solutions is catalyzing a profound shift across multiple sectors, ushering in a new era of work and driving innovation.

article thumbnail

Researchers show ways to abuse Microsoft Teams accounts for lateral movement

CSO Magazine

With organizations increasingly adopting cloud-based services and applications, especially collaboration tools, attackers have pivoted their attacks as well. Microsoft services consistently rank at the top of statistics when it comes to malicious sign-in attempts, and Microsoft Teams is one application that recently seems to have attracted attackers' interest.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Is this the answer to Google Drive spam?

Graham Cluley

There's good news if you're plagued by shared Google Drive files from strangers. Google Drive is getting a spam folder.

105
105
article thumbnail

OpenAI CEO concerned that ChatGPT could compromise US elections 2024

CyberSecurity Insiders

OpenAI CEO Sam Altman has expressed his concerns to the Senate that the use of AI without any limitations is a big cause for concern regarding the integrity of election processing to be held in November 2024. ChatGPT is turning into a significant area of concern as it evolves, said Sam in a briefing to the congressional committee inquiring about the boundless use of technology in related fields.

article thumbnail

Microsoft pulls Defender update fixing Windows LSA Protection bug

Bleeping Computer

Microsoft has pulled a recent Microsoft Defender update that was supposed to fix a known issue triggering persistent restart alerts and Windows Security warnings that Local Security Authority (LSA) Protection is off. [.

103
103
article thumbnail

The US Post Office Is Spying on the Mail. Senators Want to Stop It

WIRED Threat Level

The USPS carries out warrantless surveillance on thousands of parcels every year. Lawmakers want it to end—right now.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs

The Hacker News

The second generation version of Belkin's Wemo Mini Smart Plug has been found to contain a buffer overflow vulnerability that could be weaponized by a threat actor to inject arbitrary commands remotely.

IoT 101
article thumbnail

Attacker uses the Azure Serial Console to gain access to Microsoft VM

CSO Magazine

Financially motivated threat actor UNC3944 is using phishing and SIM swapping attacks to take over Microsoft Azure admin accounts and gain access to virtual machines (VM), according to cybersecurity firm Mandiant. Using access to virtual machines the attackers employed malicious use of the Serial Console on Azure Virtual Machines to install third-party remote management software within client environments, Mandiant said in a blog.

article thumbnail

Critical Flaws in Cisco Small Business Switches Could Allow Remote Attacks

The Hacker News

Cisco has released updates to address a set of nine security flaws in its Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to run arbitrary code or cause a denial-of-service (DoS) condition.

article thumbnail

KeePass vulnerability allows attackers to access the master password

Malwarebytes

KeePass is a free open source password manager , which helps you to manage your passwords and stores them in encrypted form. In fact, KeePass encrypts the whole database, i.e. not only your passwords, but also your user names, URLs, notes, etc. That encrypted database can only be opened with the master password. You absolutely do not want an attacker to get hold of your master password, since that is basically the key to your kingdom—aka “all your passwords are belong to us.” H

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!