Sat.Nov 27, 2021

Weekly Update 271

Troy Hunt

It's been a busy week with lots of little bits and pieces demanding my attention. Coding, IoT'ing, 3D printing and a milestone academic event for Ari: Primary school - done!

IKEA hit by a cyber attack that uses stolen internal reply-chain emails

Security Affairs

Threat actors are targeting IKEA employees in an internal phishing campaign leveraging stolen reply-chain emails. According to BleepingComputer, threat actors are targeting IKEA employees in phishing attacks using stolen reply-chain emails.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Become a cybersecurity analyst for just $9

Tech Republic Security

You'll never get a better deal on self-paced courses that can teach you the skills necessary to become a cybersecurity analyst, so start training now and switch to a new career in 2022

HAEICHI-II: Interpol arrested +1,000 suspects linked to various cybercrimes

Security Affairs

HAEICHI-II: Interpol arrested 1,003 individuals charged for several cybercrimes, including romance scams, investment frauds, and online money laundering.

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

The Pentagon Has Set Up a UFO Office

WIRED Threat Level

Plus: An Apple lawsuit, a GoDaddy breach, and more of the week's top security news. Security Security / Security News

97

Italy’s Antitrust Agency fines Apple and Google for aggressive practices of data acquisition

Security Affairs

Italy’s antitrust regulator, Autorità Garante della Concorrenza e del Mercato (AGCM), has fined Apple and Google €10 million each their “aggressive” data practices.

More Trending

New Windows 10 zero-day gives admin rights, gets unofficial patch

Bleeping Computer

Free unofficial patches have been released to protect Windows users from a local privilege escalation (LPE) zero-day vulnerability in the Mobile Device Management Service impacting all Windows 10 versions from v1809 to v21H1. [.]. Security Microsoft

Mobile 100

Language Pattern Analysis to Detect Social Network Attacks

Security Boulevard

I have updated our 2006 paper on language pattern analysis to detect social network attacks. Some minor formatting changes were needed, given the last time I generated the PDF was 2011. The original post is here.

API CASB Solution for Security Issues in Cloud Computing

Spinone

The use of cloud-based applications has fundamentally transformed data protection for enterprise-grade, and small to medium-sized organizations.

52

DEFCON 29 IoT Village – Barak Hadad’s And Gal Kaufman’s ‘Reverse Supply Chain Attack’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEF CON 29 IoT Village videos on the Conferences’ YouTube channel. Permalink. The post DEFCON 29 IoT Village – Barak Hadad’s And Gal Kaufman’s ‘Reverse Supply Chain Attack’ appeared first on Security Boulevard.

IoT 60

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

Cloud Insider Threats Control for G Suite / Google Workspace

Spinone

Often in the world of cyber security, many G Guite administrators focus on outside threats that exist on the perimeter of the data center. The risks presented to organizations from outside threats are very real, whether in the form of an attacker, or a malicious bit of code trying to infiltrate vital systems. However, it is often […] The post Cloud Insider Threats Control for G Suite / Google Workspace first appeared on SpinOne.

Risk 40

DEFCON 29 IoT Village – Harshit Agrawal’s ‘Defending IoT In The Future Of High Tech Warfare’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEF CON 29 IoT Village videos on the Conferences’ YouTube channel. Permalink. The post DEFCON 29 IoT Village – Harshit Agrawal’s ‘Defending IoT In The Future Of High Tech Warfare’ appeared first on Security Boulevard.

IoT 60

Joy Of Tech® ‘Retro: A Coronavirus Thanksgiving’

Security Boulevard

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® ! Permalink. The post Joy Of Tech® ‘Retro: A Coronavirus Thanksgiving’ appeared first on Security Boulevard. Humor Security Bloggers Network Joy of Tech® Nitrozac and Snaggy Sarcasm satire Tech Sarcasm Tech Satire

60

Danish Navy Intercepts Pirates, Kills Four

Security Boulevard

56

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.