Thu.May 04, 2023

article thumbnail

HackerOne: How the economy is impacting cybersecurity teams

Tech Republic Security

Drawing from a recent HackerOne event, HackerOne study and GitLab survey, learn how economic uncertainties are driving budget cuts, layoffs and hiring freezes across the cybersecurity industry. The post HackerOne: How the economy is impacting cybersecurity teams appeared first on TechRepublic.

article thumbnail

Not quite an Easter egg: a new family of Trojan subscribers on Google Play

SecureList

Every once in a while, someone will come across malicious apps on Google Play that seem harmless at first. Some of the trickiest of these are subscription Trojans, which often go unnoticed until the user finds they have been charged for services they never intended to buy. This kind of malware often finds its way into the official marketplace for Android apps.

Malware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google adds passkey option to replace passwords on Gmail and other account services

Tech Republic Security

Storing passkeys directly on devices will cut down on successful phishing, Google suggests. Is it the beginning of the end for passwords? The post Google adds passkey option to replace passwords on Gmail and other account services appeared first on TechRepublic.

Passwords 193
article thumbnail

Patch now! The Mirai IoT botnet is exploiting TP-Link routers

Graham Cluley

Businesses should patch their TP-Link routers as soon as possible, after the revelation that a legendary IoT botnet is targeting them for recruitment. Read more in my article on the Tripwire State of Security blog.

IoT 137
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Ubuntu Pro now available on Amazon Web Services

Tech Republic Security

Read about the features of Ubuntu Pro, and find out how to get it on AWS. The post Ubuntu Pro now available on Amazon Web Services appeared first on TechRepublic.

Software 187
article thumbnail

World Password Day: 2 + 2 = 4

Naked Security

We've kept it short and simple, with no sermons, no judgmentalism, no tubthumping. and no BUY NOW buttons. Have a nice day!

Passwords 136

LifeWorks

More Trending

article thumbnail

SIEM Content, False Positives and Engineering (Or Not) Security

Anton on Security

As we learned , SIEM still matters in 2023. Debating SIEM in 2023, Part 1 Debating SIEM in 2023, Part 2 But since one winter day in 2002, when I wrote my first correlation rule for a now-defunct “SIM” product (probably “if 10 auth_failures, followed by 1 auth_success on the same destination, alert” or perhaps “ exploit followed by outbound connection from the same system, alert ” , but I truly don’t remember which one was first), I have been bothered with a question of what I am actually doing w

article thumbnail

Protect your business by developing valuable cybersecurity skills for just $40

Tech Republic Security

There is a shortage of cybersecurity professionals, but you or one of your employees can quickly build on your skills for crucial protection. The post Protect your business by developing valuable cybersecurity skills for just $40 appeared first on TechRepublic.

article thumbnail

Google Launches Cybersecurity Career Certificate Program

Dark Reading

Google's new program aims to offer accessible training to fill 750K open cybersecurity jobs with diverse array of talent.

article thumbnail

GDPR Compliant – Considering Security A Top Priority

Security Boulevard

Introduction With more individuals having access to the internet, the world has undergone a profound change. The situation has altered as a result of how we now communicate and complete daily duties. By entering our personal information online, we can share documents, make payments online, and buy items. But are we aware that disclosing our […] The post GDPR Compliant – Considering Security A Top Priority appeared first on Kratikal Blogs.

Internet 128
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Dallas City Systems Taken Down by Royal Ransomware

Dark Reading

Courts closed, but police, fire rescues unaffected following ransomware attack.

article thumbnail

Cisco phone adapters vulnerable to RCE attacks, no fix available

Bleeping Computer

Cisco has disclosed a vulnerability in the web-based management interface of Cisco SPA112 2-Port Phone Adapters, allowing an unauthenticated, remote attacker to execute arbitrary code on the devices. [.

126
126
article thumbnail

PSA. Don’t share your password in your app’s release notes

Graham Cluley

Cinema chain Odeon may have shared more information than it intended in the release notes accompanying its latest iOS app update.

Passwords 122
article thumbnail

A Comprehensive Guide to K-12 Cybersecurity and Safety

Security Boulevard

Whether they take the form of a targeted attack or an accidental leak, cyber incidents are a major threat to the U.S. school system. From public school districts to higher education and everywhere in between, malicious actors are chomping at the bit to get ahold of student data. Of course, hackers are just one part […] The post A Comprehensive Guide to K-12 Cybersecurity and Safety appeared first on ManagedMethods.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Researchers Discover 3 Vulnerabilities in Microsoft Azure API Management Service

The Hacker News

Three new security flaws have been disclosed in Microsoft Azure API Management service that could be abused by malicious actors to gain access to sensitive information or backend services. This includes two server-side request forgery (SSRF) flaws and one instance of unrestricted file upload functionality in the API Management developer portal, according to Israeli cloud security firm Ermetic.

121
121
article thumbnail

Creating strong, yet user?friendly passwords: Tips for your business password policy

We Live Security

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization The post Creating strong, yet user‑friendly passwords: Tips for your business password policy appeared first on WeLiveSecurity

Passwords 120
article thumbnail

Phishing Attacks Target BYOD Through Private Messaging Apps

Security Boulevard

Employees’ personal devices pose a threat to organizations as bring-your-own-device (BYOD) policies cause security headaches for IT professionals, according to a SlashNext survey of 300 tech workers and employers. The study revealed 95% of security leaders said that phishing attacks via private messaging apps are an increasing concern and 43% of employees were the target.

Phishing 119
article thumbnail

New Fleckpe Android malware installed 600K times on Google Play

Bleeping Computer

A new Android subscription malware named 'Fleckpe' has been spotted on Google Play, the official Android app store, disguised as legitimate apps downloaded over 620,000 times. [.

Malware 116
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Researchers Uncover New Exploit for PaperCut Vulnerability That Can Bypass Detection

The Hacker News

Cybersecurity researchers have found a way to exploit a recently disclosed critical flaw in PaperCut servers in a manner that bypasses all current detections. Tracked as CVE-2023-27350 (CVSS score: 9.8), the issue affects PaperCut MF and NG installations that could be exploited by an unauthenticated attacker to execute arbitrary code with SYSTEM privileges.

article thumbnail

Protecting the Future of Digital Identities

Security Boulevard

In recent years, digital identities have gained popularity and have been implemented by many national governments to serve as the basis of our modern digital society. In the near future, we can expect digital identities to be further adopted across governments and their use expanded for a range of purposes, including voting, passports and banking. The post Protecting the Future of Digital Identities appeared first on Security Boulevard.

article thumbnail

Kimsuky hackers use new recon tool to find security gaps

Bleeping Computer

The North Korean Kimsuky hacking group has been observed employing a new version of its reconnaissance malware, now called 'ReconShark,' in a cyberespionage campaign with a global reach. [.

Malware 115
article thumbnail

Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal Accounts

The Hacker News

Meta said it took steps to take down more than 1,000 malicious URLs from being shared across its services that were found to leverage OpenAI's ChatGPT as a lure to propagate about 10 malware families since March 2023.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Orca Security Integrates CNAPP With Microsoft GPT Service

Security Boulevard

Orca Security today announced it has fully integrated its cloud security platform with the Microsoft Azure OpenAI GPT-4 generative artificial intelligence (AI) service to make its simpler to, for example, identify code that can be used to remediate vulnerabilities. In addition, the company has prompted improvements to optimize remediation queries along with support for the.

article thumbnail

Cyberpress Launches Cybersecurity Press Release Distribution Platform

CyberSecurity Insiders

Dubai / May 1st 2023 / Cyberpress — Cybersecurity gets a new dedicated newswire. Cyberpress , a press release distribution platform for the cybersecurity industry, has opened its doors today. This newswire service provides an effective communications approach for cybersecurity companies, public relations agencies and marketing advisors, investment firms operating in the space and more.

article thumbnail

Identifying Compromised Data Can Be a Logistical Nightmare

Dark Reading

Being able to trace an incident backward from breach to data source is vital in restoring and improving cybersecurity.

article thumbnail

BrandPost: Mercury Financial gains a competitive advantage with zero trust

CSO Magazine

A born-in-the-cloud company, Mercury Financial upholds a competitive advantage in the financial services industry through advanced technology tools that help its customers responsibly manage their credit and offer them credit as they’ve never had before. Dedicated to continuous improvement through innovation, Mercury Financial recently transformed its traditional security architecture and built a risk-based, cloud-native security program.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

10 Effective Ways to Protect Your Privacy Online

CyberSecurity Insiders

The internet has transformed our lives in many positive ways, but it has also created a new set of challenges, such as the need to protect our privacy online. With so much personal infor-mation available on the internet, it is important to take steps to safeguard our privacy. In this article, we will discuss 10 effective ways to protect your privacy online. 1.

VPN 106
article thumbnail

Malware disguised as ChatGPT apps are being used to lure victims, Meta says

CSO Magazine

Facebook's parent company, Meta, has issued a warning that hackers are taking advantage of people’s interest in ChatGP and other generative AI applications to trick them into installing malware that pretends to provide AI functionality. Since March, Meta has discovered about 10 malware families using AI themes to compromise business accounts across the internet — including social media business accounts — and blocked over 1,000 unique ChatGPT-themed malicious URLs from being shared on its pla

Malware 106
article thumbnail

$10M Is Yours If You Can Get This Guy to Leave Russia

Security Boulevard

The U.S. government this week put a $10 million bounty on the head of a Russian man who for the past 18 years operated Try2Check, one of the cybercrime underground's most trusted services for checking the validity of stolen credit card data. U.S. authorities say 43-year-old Denis Kulkov's card-checking service made him at least $18 million, which he used to buy a Ferrari, Land Rover, and other luxury items.

article thumbnail

What is IT Asset Management (ITAM)? Definition, Benefits & Types

eSecurity Planet

IT Asset Management (ITAM) is the process of managing and tracking an organization’s IT assets throughout their lifecycle. This includes hardware like computers, servers, printers, and mobile devices, as well as software licenses, network devices, and other IT-related components. The goal of ITAM is to ensure that an organization’s IT assets are being used effectively, efficiently and securely while minimizing costs and reducing the risk of data breaches and other security incidents.

Mobile 104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!