Fri.Feb 24, 2023

article thumbnail

Putting Undetectable Backdoors in Machine Learning Models

Schneier on Security

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. Delegation of learning has clear benefits, and at the same time raises serious concerns of trust. This work studies possible abuses of power by untrusted learners.We show how a malicious learner can plant an undetectable backdoor into a classifier.

356
356
article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies , which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital forensics and incident response: The most common DFIR incidents

Tech Republic Security

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR incidents appeared first on TechRepublic.

article thumbnail

‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels

Security Boulevard

Google doesn’t want you to know what your Android apps do with your data. That seems to be the conclusion from a Mozilla study into the Play Store. The post ‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

DLL sideloading and CVE attacks show diversity of threat landscape

Tech Republic Security

Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software. The post DLL sideloading and CVE attacks show diversity of threat landscape appeared first on TechRepublic.

Media 198
article thumbnail

Brave browser to block “open in app” prompts, pool-party attacks

Bleeping Computer

Brave Software, the developer of the privacy-focused web browser, has announced some plants for the upcoming version 1.49 that will block everyday browsing annoyances like "open in app" prompts and add better protections against pool-party attacks, [.

Software 144

LifeWorks

More Trending

article thumbnail

Dish Network goes offline after likely cyberattack, employees cut off

Bleeping Computer

American TV giant and satellite broadcast provider, Dish Network has mysteriously gone offline with its websites and apps ceasing to function over the past 24 hours. [.

140
140
article thumbnail

'New Class of Bugs' in Apple Devices Opens the Door to Complete Takeover

Dark Reading

With the right kind of exploit, there's hardly any function, app, or bit of data an attacker couldn't access on your Mac, iPad, or iPhone.

136
136
article thumbnail

Dish Network goes down in a mysterious outage, employees cut off

Bleeping Computer

American TV giant and satellite broadcast provider, Dish Network has mysteriously gone offline with its websites and apps ceasing to function over the past 24 hours. [.

139
139
article thumbnail

How to address growing API security vulnerabilities in 2023

IT Security Guru

In many ways, considered the “new battleground for cybersecurity” in 2023, APIs can make – or break – a business in the coming year. The fact that they’re connectors, that they underpin and pull together the majority of digital services we use daily, makes them prime targets for hacks. The holy grail of a hacker is the ultimate low-risk, high-payout option.

Risk 130
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Microsoft tells Exchange admins to revert previously recommended antivirus exclusions

CSO Magazine

Microsoft is advising Exchange Server administrators to remove some of the endpoint antivirus exclusions that the company's own documentation recommended in the past. The rules are no longer needed for server stability and their presence could prevent the detection of backdoors deployed by attackers. "Times have changed, and so has the cybersecurity landscape," the Exchange Server team said in a blog post.

Antivirus 127
article thumbnail

Debunking Three Common Threat Modeling Myths

Security Boulevard

The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to an organization’s system, but it also creates a framework for informed decision-making, ensuring the best use of limited resources. Despite threat modeling existing as a proven way to mitigate risk, in 2021, we saw a. The post Debunking Three Common Threat Modeling Myths appeared first on Security Boulevard.

Risk 126
article thumbnail

A year of wiper attacks in Ukraine

We Live Security

ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022 The post A year of wiper attacks in Ukraine appeared first on WeLiveSecurity

Malware 126
article thumbnail

Traveling Abroad: 5 Safety Tips When Connecting To Wi-Fi Overseas

SecureBlitz

In this post, I will show you 5 safety tips when connecting to Wi-Fi overseas. Today, due to the widespread availability of WI-FI, the majority of restaurants, hotels, and shopping centers, provide their clients with free access to public networks. Access to the internet nowadays is more crucial than ever, especially when traveling. However, fraudsters […] The post Traveling Abroad: 5 Safety Tips When Connecting To Wi-Fi Overseas appeared first on SecureBlitz Cybersecurity.

Internet 116
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Edgio adds advanced DDoS protection with other WAAP enhancements

CSO Magazine

Content delivery network ( CDN ) service provider Edgio has added a new Distributed Denial of Service ( DDoS ) scrubbing ability along with improved Web Application and API Interface (WAAP) to its network security offering. Designed to reduce severe damages from sophisticated DDoS attacks, Edgio’s scrubbing solution impersonates the customer’s network by routing the customer’s IP traffic through its scrubbing point-of-presence (PoP) and only sending the “clean” traffic back to the customer’s inf

DDOS 115
article thumbnail

TikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount

Dark Reading

Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security.

article thumbnail

CISA Sounds Alarm on Cybersecurity Threats Amid Russia's Invasion Anniversary

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber vigilance, as Russia's military invasion of Ukraine officially enters one year.

article thumbnail

Okta Report Surfaces Progress on Shift to Zero-Trust

Security Boulevard

A report published this week by Okta suggested that organizations have significantly shifted allocation of budgets to ensure higher levels of security. Based on an anonymized analysis of how Okta customers allocated their cybersecurity budgets, the report found just under a quarter (22%) have deployed one or more zero-trust configurations. Chris Niggel, regional chief security.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Tackling Software Supply Chain Issues With CNAPP

Dark Reading

The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.

Software 111
article thumbnail

Google Teams Up with Ecosystem Partners to Enhance Security of SoC Processors

The Hacker News

Google said it's working with ecosystem partners to harden the security of firmware that interacts with Android. While the Android operating system runs on what's called the application processor (AP), it's just one of the many processors of a system-on-chip (SoC) that cater to various tasks like cellular communications and multimedia processing.

Firmware 110
article thumbnail

BrandPost: Connectivity and Cloud: A Chance for Zero Trust

CSO Magazine

While Zero Trust is a term that is often misunderstood as well as misused, it is an approach that has real value in helping to reduce systematic cyber risk and improve resiliency. Organizations of all sizes understand that they require a resilient cybersecurity strategy that can support and enable the business even during a crisis, but when it comes to Zero Trust, most organizations struggle to understand it and figure out the right place to start.

article thumbnail

CISA: Beware of DDoS, Web Defacements on Anniversary of Russian Invasion of Ukraine

Dark Reading

The Cybersecurity and Infrastructure Security Agency advises US and European nations to prepare for possible website attacks marking the Feb. 24 invasion of Ukraine by Russia.

DDOS 109
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

News Corp says state hackers were on its network for two years

Bleeping Computer

Mass media and publishing giant News Corporation (News Corp) says that attackers behind a breach disclosed in 2022 first gained access to its systems two years before, in February 2020. [.

Media 107
article thumbnail

KPI Examples for Patch and Vulnerability Management

Heimadal Security

Vulnerability and patch management are vital cogs in an organization’s cyber-hygiene plan. According to a recent Verizon cyber-safety report, more than 40% of all data breaches recorded in 2022 stem from unpatched (i.e. vulnerable) Internet-facing applications. Moreover, the rate of attack specifically targeting application coding bugs have increased by 15% over the past five years. […] The post KPI Examples for Patch and Vulnerability Management appeared first on Heimdal Security Blog.

article thumbnail

BrandPost: What Executives Should Know About Shift-Left Security

CSO Magazine

The term “shift left” is a reference to the Software Development Lifecycle (SDLC) that describes the phases of the process developers follow to create an application. Often, this lifecycle is depicted as a horizontal timeline with the conceptual and coding phases “starting” the cycle on the left side, so to move any process earlier in the cycle is to shift it left.

Software 104
article thumbnail

Access-as-a-Service: How to Keep Access Brokers Away from Your Organization

Heimadal Security

An attacker’s access to the network is often traced back to a succession of events, which network defenders must unravel. This is done by asking specific questions such as: How did the attackers enter the network? How did they gain access to the network? What actions did they take once inside that allowed them to […] The post Access-as-a-Service: How to Keep Access Brokers Away from Your Organization appeared first on Heimdal Security Blog.

105
105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to Use AI in Cybersecurity and Avoid Being Trapped

The Hacker News

The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat detection, incident response, fraud detection, and vulnerability management. According to a report by Juniper Research, the use of AI for fraud detection and prevention is expected to save businesses $11 billion annually by 2023.

article thumbnail

US warns of cyberattacks by Russia on anniversary of Ukraine war

CSO Magazine

The US Cybersecurity and Infrastructure Security Agency has issued an advisory urging organizations to increase cybersecurity vigilance today, the anniversary of Russia’s invasion of Ukraine, in the wake of a cyberattack against several Ukrainian government websites. "The United States and European nations may experience disruptive and defacement attacks against websites in an attempt to sow chaos and societal discord," the CISA advisory said.

article thumbnail

Canadian Telecom Firm Telus Reportedly Investigating Breach

Dark Reading

A threat actor has leaked data — purportedly, samples of Telus employee payroll data and source code — on a hacker site.

103
103
article thumbnail

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

We Live Security

With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected? The post One year on, how is the war playing out in cyberspace?

102
102
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!