Tue.Sep 27, 2022

New Report on IoT Security

Schneier on Security

The Atlantic Council has published a report on securing the Internet of Things: “Security in the Billions: Toward a Multinational Strategy to Better Secure the IoT Ecosystem.”

IoT 231

FIRESIDE CHAT: Why ‘digital resiliency’ has arisen as the Holy Grail of IT infrastructure

The Last Watchdog

Digital resiliency has arisen as something of a Holy Grail in the current environment. Related: The big lesson of Log4j. Enterprises are racing to push their digital services out to the far edge of a highly interconnected, cloud-centric operating environment. This has triggered a seismic transition of company networks, one that has put IT teams and security teams under enormous pressure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

FBI Helping Australian Authorities Investigate Massive Optus Data Breach: Reports

Dark Reading

Initial reports suggest a basic security error allowed the attacker to access the company's live customer database via an unauthenticated API

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

The Hacker News

WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution on vulnerable devices.

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

7 Metrics to Measure the Effectiveness of Your Security Operations

Dark Reading

SOC metrics will allow stakeholders to track the current state of a program and how it's supporting business objectives

96

Threat Trends: Vulnerabilities

Cisco CSR

Explore the nature of vulnerabilities in this episode of ThreatWise TV. It’s shaping up to be another big year for vulnerability disclosure. Already the number of Common Vulnerabilities and Exposures (CVEs) disclosed has crossed 18,000 and it’s on track to make this another record-breaking year.

Media 87

More Trending

Russia ‘Plans’ HUGE Cyberattack on Critical Infrastructure

Security Boulevard

The Ukrainian government has warned that Russia is planning a massive attack against the critical infrastructure of Ukraine and of its allies. The post Russia ‘Plans’ HUGE Cyberattack on Critical Infrastructure appeared first on Security Boulevard.

Lessons From the GitHub Cybersecurity Breach

Dark Reading

This Tech Tip outlines three steps security teams should take to protect information stored in Salesforce

Cyber Insurance and the Attribution Conundrum

Cisco CSR

Written by Martin Lee and Richard Archdeacon.

Lazarus Lures Aspiring Crypto Pros With Fake Exchange Job Postings

Dark Reading

Previously observed using fake Coinbase jobs, the North Korea-sponsored APT has expanded into using Crypo.com gigs as cover to distribute malware

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

This Chatbot Aims to Steer People Away From Child Abuse Material

WIRED Threat Level

Pornhub is trialing a new automated tool that pushes CSAM-searchers to seek help for their online behavior. Will it work? Security Security / Privacy

77

Amid Sweeping Change, Cyber Defenders Face Escalating Visibility — and Pressure

Dark Reading

Why cyber teams are now front and center for business enablement within organizations, and the significant challenges they face

83

Malicious Oauth app enables attackers to send spam through corporate cloud tenants

Tech Republic Security

Microsoft investigated a new kind of attack where malicious OAuth applications were deployed on compromised cloud tenants before being used for mass spamming. The post Malicious Oauth app enables attackers to send spam through corporate cloud tenants appeared first on TechRepublic.

107
107

4 Data Security Best Practices You Should Know

Dark Reading

There are numerous strategies to lessen the possibility and effects of a cyberattack, but doing so takes careful planning and targeted action

83

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

The Dire Warnings in the Lapsus$ Hacker Joyride

WIRED Threat Level

The fun-loving cybercriminals blamed for breaches of Uber and Rockstar are exposing weaknesses in ways others aren't. Security Security / Cyberattacks and Hacks

Microsoft Rolls Out Passwordless Sign-on for Azure Virtual Desktop

Dark Reading

Azure says cloud-native single sign-on with a passwordless option is most-requested new AVD feature in the product's history

82

U.S. Remains atop Updated National Cyber Power Index

SecureWorld News

Harvard's Belfer Center for Science and International Affairs today released its updated 2022 National Cyber Power Index (NCPI), a follow-up to its groundbreaking 2020 index that ranks 30 countries according to their capability and intent to pursue eight objectives of cyber power.

Adversaries Continue Cyberattacks with Greater Precision and Innovative Attack Methods According to NETSCOUT Report

Dark Reading

TCP-based, DNS water-torture, and carpet-bombing attacks dominate the DDoS threat landscape, while Ireland, India, Taiwan, and Finland are battered by DDoS attacks resulting from the Russia/Ukraine war

DDOS 77

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

North Korea-linked Lazarus continues to target job seekers with macOS malware

Security Affairs

North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT group continues to target macOS with a malware campaign using job opportunities as a lure.

BlackCat/ALPHV Gang Adds Wiper Functionality as Ransomware Tactic

Dark Reading

Using its "Exmatter" tool to corrupt rather than encrypt files signals a new direction for financially motivated cybercrime activity, researchers say

Mandiant identifies 3 hacktivist groups working in support of Russia

Security Affairs

Researchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked to the GRU.

DDOS 72

Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme

The Hacker News

As many as 75 apps on Google Play and 10 on Apple App Store have been discovered engaging in ad fraud as part of an ongoing campaign that commenced in 2019.

71

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

Defense firm Elbit Systems of America discloses data breach

Security Affairs

Elbit Systems of America, a subsidiary of defense giant Elbit Systems, disclosed a data breach after Black Basta ransomware gang claimed to have hacked it.

Netography Uses Labels and Tags to Provide Security Context

Security Boulevard

Netography today added support for context labels and tagging to a software-as-a-service (SaaS) platform that provides deep packet inspection capabilities to identify cybersecurity threats in near-real-time.

WhatsApp fixed critical and high severy vulnerabilities

Security Affairs

WhatsApp has addressed two severe Remote Code Execution vulnerabilities affecting the mobile version of the software.

North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs

The Hacker News

The infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware targeting Apple's macOS operating system.

Why Is ISO 27001 Important For Small Businesses?

SecureBlitz

This post will show you why ISO 27001 is important for small businesses… Information security refers to the measures taken to keep data secure from unauthorized access or changes.

New NullMixer Malware Campaign Stealing Users' Payment Data and Credentials

The Hacker News

Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called NullMixer on compromised systems.

Erbium info-stealing malware, a new option in the threat landscape

Security Affairs

The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games.

Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures

The Hacker News

The Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in the country and that of its allies.

Russian Cyber Attack acts as a wake-up call for Commercial Satellite Operators

CyberSecurity Insiders

Russia launched a cyber attack on a private satellite operator called KA-SAT Network, just after it started an invasion of Ukraine 8 months ago.

Meta dismantles massive Russian network spoofing Western news sites

Bleeping Computer

Meta says it took down a large network of Facebook and Instagram accounts pushing disinformation published on more than 60 websites that spoofed multiple legitimate news sites across Europe. [.]. Security