Thu.Jan 26, 2023

article thumbnail

Securing IoT with Microsoft Defender for IoT sensors

Tech Republic Security

Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post Securing IoT with Microsoft Defender for IoT sensors appeared first on TechRepublic.

IoT 183
article thumbnail

Microsoft urges admins to patch on-premises Exchange servers

Bleeping Computer

Microsoft urged customers today to keep their on-premises Exchange servers patched by applying the latest supported Cumulative Update (CU) to have them always ready to deploy an emergency security update. [.

144
144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Job scams impersonate companies still hiring following tech layoffs

Security Boulevard

Summary In the midst of significant layoffs hitting the previously immune tech industry, scammers have mobilized and doubled down on targeting job seekers with various employment scams. Stealing personal information and extorting victims for money, these scams leverage fake job postings, sites or portals, and forms, wrapped in social engineering to attract job seekers.

Scams 131
article thumbnail

Bitwarden password vaults targeted in Google ads phishing attack

Bleeping Computer

Bitwarden and other password managers are being targeted in Google ads phishing campaigns to steal users' password vault credentials. [.

Passwords 142
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

RIP Perimeter Security: Critical Infrastructure Breaches Demand New Approach

Security Boulevard

The ongoing spate of breaches against critical infrastructure and government entities underscores the vulnerability of this sector. In July 2022, officials announced the federal court system had experienced a major data breach via its document filing system – back in 2020. In September 2022, the IRS admitted that a data leak exposed the personal info.

article thumbnail

Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA

The Hacker News

Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in the Windows CryptoAPI that the U.S. National Security Agency (NSA) and the U.K. National Cyber Security Centre (NCSC) reported to Microsoft last year. Tracked as CVE-2022-34689 (CVSS score: 7.

127
127

LifeWorks

More Trending

article thumbnail

Threat Groups Distributing Malware via Google Ads

eSecurity Planet

Security researchers are warning that Google Ads are being actively leveraged to distribute malware to unsuspecting victims searching for software downloads. On January 20, CronUp researcher Germán Fernández warned that the DEV-0569 ransomware group is using Google Ads to distribute Gozi/Ursnif malware, RedLine stealer, and Royal ransomware. “For deployment, they use Add-MpPreference to configure exclusions in Windows Defender (extensions, paths and processes), NSudo to launch binaries wit

Malware 122
article thumbnail

Yandex denies hack, blames source code leak on former employee

Bleeping Computer

A Yandex source code repository allegedly stolen by a former employee of the Russian technology company has been leaked as a Torrent on a popular hacking forum. [.

Hacking 122
article thumbnail

Why your data is more valuable than you may realize

We Live Security

The data trail you leave behind whenever you're online is bigger – and more revealing – than you may think The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity

122
122
article thumbnail

Dutch suspect locked up for alleged personal data megathefts

Naked Security

Undercover Austrian "controlled data buy" leads to Amsterdam arrest and ongoing investigation. Suspect is said to steal and sell all sorts of data, including medical records.

122
122
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

9 API security tools on the frontlines of cybersecurity

CSO Magazine

Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current form without APIs holding everything together or managing much of backend functionality.

article thumbnail

Data Privacy Laws Organizations Cannot Ignore in 2023

Appknox

Data privacy has become a hot-button issue in recent times, leading to the implementation of stringent laws governing who can collect information and how it is accessed. Governments across the world are increasingly turning their attention towards ensuring data protection for citizens.

article thumbnail

A DevOps Security Tutorial for Digital Business Leaders (Clone)

Security Boulevard

DevOps is a great approach to improve the speed and efficiency of software development, but there is an even better way to approach the process with security in mind. Find out what approach works for best digital business leaders and how to implement these changes in your organization. The post A DevOps Security Tutorial for Digital Business Leaders (Clone) appeared first on Security Boulevard.

Software 114
article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

Zacks Investment is the first firm that has hit the headlines of Google regarding data compromise and sources add that a single hack that took place between 2021 and 2022 result in the leak of information belonging to 820,000 customers. The company made an official announcement on this note and added that its security staff found the digital invasion on December 28th of 2022 and details such as phone numbers, addresses names, email addresses and passwords stored on an older database and those us

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

7 Insights From a Ransomware Negotiator

Dark Reading

The rapid maturation and rebranding of ransomware groups calls for relentless preparation and flexibility in response, according to one view from the trenches.

article thumbnail

S3 Ep119: Breaches, patches, leaks and tweaks! [Audio + Text]

Naked Security

Lastest episode - listen now! (Or read the transcript.

DNS 113
article thumbnail

German Government, Airports, Banks Hit With Killnet DDoS Attacks

Dark Reading

After Berlin pledged tanks for Ukraine, some German websites were knocked offline temporarily by Killnet DDoS attacks.

DDOS 112
article thumbnail

Hive ransomware disrupted after FBI hacks gang's systems

Bleeping Computer

Today, the Hive ransomware Tor payment and data leak sites were seized as part of an international law enforcement operation involving the US Department of Justice, FBI, Secret Service, Europol, and Germany's BKA and Polizei. [.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

What Is an SEO Poisoning Attack and How Does It Affect Network Security?

Heimadal Security

SEO poisoning attacks have been on the rise in recent years, as more and more people are using search engines to find information online. Attackers are constantly coming up with new ways to exploit SEO vulnerabilities, so it’s important to be aware of the risks and take steps to protect yourself. In this article, I’ll explain […] The post What Is an SEO Poisoning Attack and How Does It Affect Network Security?

article thumbnail

The Week in Security: After breach, ‘unusual activity’ detected in GoTo and LastPass dev environments

Security Boulevard

Welcome to the latest edition of The Week in Security , which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond. This week: IT management firm GoTo says a 2022 breach was much worse than reported. Also: a hacktivist found the FBI's No Fly list on a publicly-accessible airline server.

article thumbnail

Canonical security subscriptions for Ubuntu Linux now available

InfoWorld on Security

Canonical’s Ubuntu Pro , a Linux security maintenance subscription service covering thousands of applications and toolchains in the open-source ecosystem, is generally available as of January 26. Released in beta in October, Ubuntu Pro helps users of Linux desktops and servers get CVE (common vulnerabilities and exposures) patches, harden their systems at scale, and stay compliant with standards such as FedRAMP, HIPPA, PCI-DSS.

111
111
article thumbnail

Killnet Russian Hacking Group Launches DDoS Attacks on German Websites

Heimadal Security

On January 25th, Killnet Russian activist threat group put several German websites offline after performing a DDoS attack. The hackers claimed they targeted government websites, banks, and airports as a reaction to Germany`s decision to supply Ukraine with 2 Leopard tanks. According to Germany’s BSI cyber agency, the attack campaign had low, short-term effects: Currently, […] The post Killnet Russian Hacking Group Launches DDoS Attacks on German Websites appeared first on Heimdal Security

DDOS 105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Child's Garden of Cybersecurity

Dark Reading

Whether you dream of your child growing into a CISO or just want them to improve their security hygiene, consider this roundup of literary geekery.

CISO 103
article thumbnail

Researchers Uncover Connection b/w Moses Staff and Emerging Abraham's Ax Hacktivists Group

The Hacker News

New research has linked the operations of a politically motivated hacktivist group known as Moses Staff to another nascent threat actor named Abraham's Ax that emerged in November 2022.

102
102
article thumbnail

ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if convicted

Graham Cluley

A 22-year-old suspected of being "Seyzo", a member of the ShinyHunters cybercrime gang, has been extradited from Morocco to the United States, where - if convicted - he could face up to 116 years in prison. The ShinyHunters gang became notorious in 2020, following a series of data breaches that impacted over 60 companies - including Microsoft. Read more in my article on the Tripwire State of Security blog.

article thumbnail

The Best Personal Safety Devices, Apps, and Alarms (2023)

WIRED Threat Level

Your smartphone or wearable could help you out in a truly dangerous situation. Here are some options to consider.

99
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hive Ransomware Tor leak site apparently seized by law enforcement

Security Affairs

The leak site of the Hive ransomware gang was seized due to an international operation conducted by law enforcement in ten countries. The Tor leak site used by Hive ransomware operators has been seized as part of an international operation conducted by law enforcement in 10 countries. “The Federal Bureau of Investigation seized this site as part of a coordinated law enforcement action taken against Hive Ransomware.” reads the message displayed in English and Russian on the Hive ranso

article thumbnail

5 Trends Shaping ‘Industry 4.0’ Using IIoT Technology

GlobalSign

Here are five key ways that IIoT technology will have a major impact on the development of Industry 4.0.

article thumbnail

Experts warn of a surge of attacks exploiting a Realtek Jungle SDK RCE (CVE-2021-35394)

Security Affairs

Experts warn of a spike in the attacks that between August and October 2022 attempted to exploit a Realtek Jungle SDK RCE (CVE-2021-35394). Palo Alto Networks researchers reported that between August and October 2022 the number of attacks that attempted to exploit a Realtek Jungle SDK RCE ( CVE-2021-35394 ) (CVSS score 9.8) accounted for more than 40% of the total number of attacks. “Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called ‘MP Daemon’ th

DDOS 98
article thumbnail

5 facts about Vice Society, the ransomware group wreaking havoc on the education sector

Malwarebytes

Move over Lockbit , there's a new ransomware-as-a-service (RaaS) player in town attacking the education sector—and its name is Vice Society. Vice Society is believed to be a Russian-based intrusion, exfiltration, and extortion group. And their ideal prey? You guessed it: universities, colleges, and K-12 schools. The Federal Bureau of Investigation (FBI) has even released a joint Cybersecurity Advisory (CSA) after observing that Vice Society has disproportionately targeted the education sec

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!