Fri.Feb 17, 2023

article thumbnail

Defending against AI Lobbyists

Schneier on Security

When is it time to start worrying about artificial intelligence interfering in our democracy? Maybe when an AI writes a letter to The New York Times opposing the regulation of its own technology. That happened last month. And because the letter was responding to an essay we wrote, we’re starting to get worried. And while the technology can be regulated, the real solution lies in recognizing that the problem is human actors—and those we can do something about.

article thumbnail

Mobile device management: Problems and solutions

Tech Republic Security

Explore the MDM market with the CEO of Kolide to learn its challenges and the possible solutions for enterprises and end users. The post Mobile device management: Problems and solutions appeared first on TechRepublic.

Mobile 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Serious’ Ransomware Emergency in Oakland, Calif. — Legacy FAIL

Security Boulevard

Oakland is still reeling from last week’s ransomware attack. San Francisco’s poorer neighbor is asking for help. The post ‘Serious’ Ransomware Emergency in Oakland, Calif. — Legacy FAIL appeared first on Security Boulevard.

article thumbnail

EU parliamentary committee says 'no' to EU-US data privacy framework

CSO Magazine

The European Parliament’s Committee on Civil Liberties, Justice and Home Affairs has recommended that the European Commission reject the proposed EU-US Data Privacy Framework, which would govern the way in which the personal information of EU citizens is handled by US companies. The committee's decision — formally, a draft motion for a resolution— represents a rejection of the European Commission’s recommendation, announced in December , that the data privacy framework should be adopted.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

FBI is investigating a cybersecurity incident on its network

Bleeping Computer

The U.S. Federal Bureau of Investigation (FBI) is reportedly investigating malicious cyber activity on the agency's network. [.

article thumbnail

Cyber Attack on Succession Wealth and NHS Staff Data Leaked

CyberSecurity Insiders

Succession Wealth, a financial wealth management service offering company, has released a press statement that a cyber attack targeted its servers and it can only reveal details after the investigation gets concluded. Prima Facie revealed that hackers accessed no client data in the attack. However, a confirmation on this note can only be given after a detailed inquiry gets concluded.

LifeWorks

More Trending

article thumbnail

Check Point Boosts AppSec Focus With CNAPP Enhancements

Dark Reading

Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.

article thumbnail

Overwhelm impacts 90% of payment compliance teams as they combat record levels of fraud

IT Security Guru

Payment company compliance teams are being pushed to their limit as new research from regulatory intelligence specialists VIXIO reveals 90 percent are frequently overwhelmed. The impact of Russia’s invasion of Ukraine, paired with poor economic conditions in the wake of the Covid-19 pandemic, has left many payment companies in a precarious position.

Banking 120
article thumbnail

Data Breaches: The Complete WIRED Guide

WIRED Threat Level

Everything you need to know about the past, present, and future of data security—from Equifax to Yahoo—and the problem with Social Security numbers.

article thumbnail

Skillhub’s Experts Reveal: Here Are 7 Things You Must Have On Your Resume to Stand Out

SecureBlitz

Your resume will be the most essential document in your job search. This is your only chance to introduce yourself to potential employers properly. The average time recruiters and hiring managers spend looking at resumes is six to seven minutes. This means that it’s crucial to maximize every second. Strong resumes will help you stand […] The post Skillhub’s Experts Reveal: Here Are 7 Things You Must Have On Your Resume to Stand Out appeared first on SecureBlitz Cybersecurity.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New Mirai botnet variant V3G4 targets Linux servers, IoT devices

CSO Magazine

A new variant of Mirai — the botnet malware used to launch massive DDoS attacks —has been targeting 13 vulnerabilities in IoT devices connected to Linux servers, according to researchers at Palo Alto Network’s Unit 42 cybersecurity team. Once the vulnerable devices are compromised by the variant, dubbed V3G4, they can fully controlled by attackers and become part of a botnet, capable of being used to conduct further campaigns, including DDoS attacks.

IoT 115
article thumbnail

Is OWASP at Risk of Irrelevance?

Dark Reading

A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.

Risk 115
article thumbnail

BrandPost: Securing Applications: Questions to Consider for Your Roadmap

CSO Magazine

As organizations continue to pursue and even accelerate their digital transformation, successfully executing the applications part of the journey is critical to their success. This is no easy task as applications now can reside anywhere — from the physical and virtual data center to hybrid and multi-clouds to edge compute instances. In light of this development, organizations moving applications into the cloud are confronted with even more security and operational challenges than ever and requir

article thumbnail

Seven German Airports Hit by Suspected Cyber Attack

Heimadal Security

The ADV airport association reported that the websites of seven German airports were hit by a suspected cyber attack on Thursday. Düsseldorf, Nuremberg, and Dortmund airports were among those impacted, but the websites for Germany’s three busiest airports: Frankfurt, Munich, and Berlin—were all functioning normally. Once again, airports fell victim to large-scale DDoS attacks. (…) […] The post Seven German Airports Hit by Suspected Cyber Attack appeared first on Heimdal Security Blog

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Image Sharpening: Best Tools For Enhancing Your Pictures

SecureBlitz

In this post, I will talk about image sharpening. When it comes to photo sharpness, it means removing blurry elements from your shots and improving details. When you find the images too blurry, you probably get disappointed and think that the shot is irretrievably ruined. But some images are unique and cannot be re-shot. In […] The post Image Sharpening: Best Tools For Enhancing Your Pictures appeared first on SecureBlitz Cybersecurity.

article thumbnail

Nation-State Actors and Cyberattacks in the Emerging 5G Ecosystem

Security Boulevard

There are advanced and persistent security threats and cyberattacks coming from nation-states. The intent behind these threats is not just financial. It’s to disrupt the public perception that our infrastructure is secure. The default attitude of most Americans is that the systems we rely on every day—the energy grid, transportation, banking system and water supplies—are.

Banking 105
article thumbnail

Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks

Dark Reading

The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.

105
105
article thumbnail

Multi-Cloud Strategy is Appealing, but Security Confidence Lags 

Security Boulevard

The use of multi-cloud architectures continues to grow among organizations, but many businesses are not well prepared to meet the security risks that come with multi-cloud strategies. In addition, few companies have the tech talent and confidence they need to put in place a comprehensive security infrastructure across multiple clouds, according to a Valtix report.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

New Mirai Botnet Variant 'V3G4' Exploiting 13 Flaws to Target Linux and IoT Devices

The Hacker News

A new variant of the notorious Mirai botnet has been found leveraging several security vulnerabilities to propagate itself to Linux and IoT devices. Observed during the second half of 2022, the new version has been dubbed V3G4 by Palo Alto Networks Unit 42, which identified three different campaigns likely conducted by the same threat actor.

IoT 105
article thumbnail

CISA Warns About Four New Vulnerabilities Exploited as Zero-Days

Heimadal Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four new vulnerabilities, exploited as zero-day vulnerabilities, to its KEV (Known Exploited Vulnerabilities) catalog. The vulnerabilities affect Windows and iOS devices. New Vulnerabilities Discovered As also mentioned by BleepingComputer, two of the vulnerabilities that impact Microsoft products are CVE-2023-21823, which allows attackers to gain remote […] The post CISA Warns About Four New Vulnerabilities Exploit

article thumbnail

What Is Managed Detection and Response? Guide to MDR

eSecurity Planet

Managed detection and response (MDR) goes beyond other managed security services by essentially giving organizations their own expert security analyst team to help identify and respond to cyber threats. The emergence of MDR was in many ways inevitable. Security has become so time-consuming and complex that many organizations have realized, vital though the function is, that it lies well beyond their core competency and has become a distraction to their regular business model.

article thumbnail

Search ads abused to spread malware – Week in security with Tony Anscombe

We Live Security

Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites The post Search ads abused to spread malware – Week in security with Tony Anscombe appeared first on WeLiveSecurity

Malware 102
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity, DEI & Sustainability: Your Way to Success

Jane Frankland

As a tech leader, a cybersecurity practitioner, or someone who’s simply invested in the health and wellbeing of our planet, you know that cybersecurity, DEI, and sustainability are important topics. But what does each one mean for us in business right now? This was a question I asked three leaders with expertise in cybersecurity, people management, and sustainability when I visited Cisco Live in Amsterdam last week.

article thumbnail

Fortinet fixes critical RCE flaws in FortiNAC and FortiWeb

Bleeping Computer

Cybersecurity solutions company Fortinet has released security updates for its FortiNAC and FortiWeb products, addressing two critical-severity vulnerabilities that may allow unauthenticated attackers to perform arbitrary code or command execution. [.

article thumbnail

TikTok car theft challenge: Hyundai, Kia fix flaw

Malwarebytes

Car manufacturer Hyundai, and its subsidiary Kia, began rolling out a free software update on February 14, 2023, to address a flaw in their anti-theft software, which was highlighted in a social media challenge. The release of the update came nine months after an uptick in car theft of the affected models in the US. Outside the US, victims in Australia also came forward.

article thumbnail

Fortinet fixes critical vulnerabilities in FortiNAC and FortiWeb

Security Affairs

Cybersecurity vendor Fortinet has addressed two critical vulnerabilities impacting its FortiNAC and FortiWeb products. Cybersecurity firm Fortinet has released security updates to address two critical vulnerabilities in FortiNAC and FortiWeb solutions. The two vulnerabilities, tracked as CVE-2022-39952 and CVE-2021-42756 , are respectively an external control of file name or path in Fortinet FortiNAC and a collection of stack-based buffer overflow issues in the proxy daemon of FortiWeb.

Hacking 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

iPhone calendar spam: What it is, and how to remove it

Malwarebytes

If you open up your iPhone and see a variety of messages claiming that you’ve been hacked, your phone is not protected, that viruses have damaged your phone, or, my personal favourite, “Click to get rid of annoying ads”, fear not. It’s quite possible you’ve accidentally wandered into a common form of scam: Calendar spam.

Scams 98
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 2/17

Security Boulevard

Insight #1 " It’s a great time to go through a tabletop exercise to make sure all your incident response, disaster recovery, and business continuity plans are intact and functioning. When was your last exercise?" Insight #2 " Third-party attestations are a very important part of the security posture of an organization. If you aren’t doing this today, please consider it in the near future.

CISO 98
article thumbnail

Cisco fixed critical RCE bug in ClamAV Open-Source Antivirus engine

Security Affairs

Cisco addressed a critical vulnerability in the ClamAV open source antivirus engine that can lead to remote code execution on vulnerable devices. Cisco fixed a critical flaw, tracked as CVE-2023-20032 (CVSS score: 9.8), in the ClamAV open source antivirus engine. The vulnerability resides in the residing in the HFS+ file parser component, an attacker can trigger the issue to gain remote code execution on vulnerable devices or trigger a DoS condition.

article thumbnail

Community Health Systems Breach Exposes 1 Million Patients' Data

SecureWorld News

Community Health Systems (CHS), one of the largest hospital chains in the United States, recently suffered a cyberattack that resulted in the unauthorized disclosure of patient data. The incident, which was caused by a security breach at a third-party vendor of the company, Fortra, has affected around one million individuals. Fortra provides a secure file transfer software called GoAnywhere to CHS affiliates.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!