Mon.Aug 29, 2022

article thumbnail

Levels of Assurance for DoD Microelectronics

Schneier on Security

The NSA has has published criteria for evaluating levels of assurance required for DoD microelectronics. The introductory report in a DoD microelectronics series outlines the process for determining levels of hardware assurance for systems and custom microelectronic components, which include application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs) and other devices containing reprogrammable digital logic.

317
317
article thumbnail

Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’

The Last Watchdog

Penetration testing – pen tests – traditionally have been something companies might do once or twice a year. Related : Cyber espionage is on the rise. Bad news is always anticipated. That’s the whole point. The pen tester’s assignment is to seek out and exploit egregious, latent vulnerabilities – before the bad guys — thereby affording the organization a chance to shore up its network defenses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security investment, toolchain consolidation emerge as top priorities

Tech Republic Security

A new survey from GitLab also finds that nearly three-quarters of respondents have adopted or are planning to adopt a DevOps platform within the year. The post Security investment, toolchain consolidation emerge as top priorities appeared first on TechRepublic.

174
174
article thumbnail

GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers

The Last Watchdog

Web application attacks directed at organizations’ web and mail servers continue to take the lead in cybersecurity incidents. Related: Damage caused by ‘business logic’ hacking. This is according to Verizon’s latest 2022 Data Breach Investigations Report ( DBIR ). In the report’s findings, stolen credentials and exploited vulnerabilities are the top reasons for web breaches.

Hacking 201
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Sliver offensive security framework increasingly used by threat actors

Tech Republic Security

The offensive security tool used by penetration testers is also being used by threat actors from the ransomware and cyberespionage spheres. The post Sliver offensive security framework increasingly used by threat actors appeared first on TechRepublic.

article thumbnail

LastPass source code breach – do we still recommend password managers?

Naked Security

What does the recent LastPass breach mean for password managers? Just a bump in the road, or a reason to ditch them entirely?

LifeWorks

More Trending

article thumbnail

AI robots are a threat to the HR Department

CyberSecurity Insiders

As the use of Artificial Intelligence (AI) technology is growing, apparently it is leading to a situation of job steal. According to a survey conducted by LinkedIn, over 62% of company big-heads are interested in seeking the services of Machine Learning (ML) robots to recruit people. Thus, the role of the robots might slowly and steadily steal the involvement of a human mind in recruitment and that might truly lead to an enormous threat to the HR sector or its permanent shutdown.

article thumbnail

'0ktapus' Phishing Campaign Targets Twilio, Cloudflare, 130 Others

SecureWorld News

The threat actor behind the phishing attacks that targeted employees of Twilio and Cloudflare earlier this month has now been linked to a much broader phishing campaign, according to a new report from Group-IB. Researchers say that the large-scale phishing campaign compromised 9,931 accounts at more than 130 organizations. The campaign has been nicknamed 0ktapus by Group-IB as the campaign impersonates popular Identity and Access Management (IAM) service Okta.

Phishing 117
article thumbnail

Two big Indian Companies suffer data breaches

CyberSecurity Insiders

Akasa Air, an Indian airliner that started flying services recently, is in news for wrong reasons. The airliner, that truly stands as a low-cost carrier, has suffered a data breach as per a report released to Indian Computer Emergency Response Team (CERT- In). The incident took place on August 25th, 2022, leaking details such as email addresses, gender, name, phone numbers, and contact addresses.

article thumbnail

Sorting zero-trust hype from reality

CSO Magazine

It seems as if everyone is playing “buzzword bingo” when it comes to zero trust and its implementation, and it starts with government guidance. The White House’s comments in January on the Office of Management and Budget’s (OMB’s) Federal Zero Trust Strategy for all federal agencies and departments were both pragmatic and aspirational. Their observation, citing the Log4j vulnerability as an example, sums it up nicely: “The zero-trust strategy will enable agencies to more rapidly detect, isolate,

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

FTC Sues Data Broker Over Selling Location Data for Hundreds of Millions of Phones

The Hacker News

The U.S. Federal Trade Commission (FTC) on Monday said it filed a lawsuit against Kochava, a location data broker, for collecting and selling precise geolocation data gathered from consumers' mobile devices. The complaint alleges that the U.S. company amasses a "wealth of information" about users by purchasing data from other data brokers to sell to its own clients.

Mobile 112
article thumbnail

Nine cyber-attack news headlines trending on Google

CyberSecurity Insiders

1.) From the past few hours, a news piece related to Wi-Fi vulnerability on Android phones is doing rounds on the internet and security analysts state that the threat could be larger than what is being projected. A TikTok star(tatechtips) having fascination towards technology has revealed in one of his videos that just by turning of Wi-Fi feature on an android phone doesn’t save from prying eyes.

article thumbnail

Nelnet Servicing breach exposes data of 2.5M student loan accounts

Bleeping Computer

Nelnet Serving, a Nebraska-based student loan technology services provider, has been breached by unauthorized network intruders who exploited a vulnerability in its systems. [.].

article thumbnail

Cyber Security Solutions

Security Boulevard

The post Cyber Security Solutions appeared first on Seceon. The post Cyber Security Solutions appeared first on Security Boulevard.

105
105
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

5 Security Risks On Snapchat And How To Address Them

SecureBlitz

Here, I will reveal 5 security risks on Snapchat and how to address them… In the past decade, social media has become increasingly popular. People utilize these social networking sites to reconnect with families and loved ones from afar. It also helped them to find new friends from different countries, which boosted their fondness for […].

Risk 105
article thumbnail

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Threatpost

Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.

Phishing 105
article thumbnail

Your DevOps Process Needs to Integrate API Security

Security Boulevard

If your organization relies on the cloud, you also rely on APIs. “Whatever the project of the day (application modernization, monolith to microservice digital transformation, multi-cloud service mesh enablement, to name a few), APIs have become the backbone of modern application architectures and the digital supply chains organizations rely on,” said Nick Rago, field CTO.

article thumbnail

Windows malware delays coinminer install by a month to evade detection

Bleeping Computer

A new malware campaign disguised as Google Translate or MP3 downloader programs was found distributing cryptocurrency mining malware across 11 countries. [.].

Malware 104
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular Software

The Hacker News

A Turkish-speaking entity called Nitrokod has been attributed to an active cryptocurrency mining campaign that involves impersonating a desktop application for Google Translate to infect over 111,000 victims in 11 countries since 2019. "The malicious tools can be used by anyone," Maya Horowitz, vice president of research at Check Point, said in a statement shared with The Hacker News.

Software 102
article thumbnail

Receipt for €8M iOS Zero-Day Sale Pops Up on Dark Web

Dark Reading

Documents appear to show that Israeli spyware company Intellexa sold a full suite of services around a zero-day affecting both Android and iOS ecosystems.

Spyware 101
article thumbnail

FBI Warns Investors to Take Precautions with Decentralized Financial Platforms

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) on Monday warned of cyber criminals increasingly exploiting flaws in decentralized finance (DeFi) platforms to plunder cryptocurrency. "The FBI has observed cyber criminals exploiting vulnerabilities in the smart contracts governing DeFi platforms to steal investors' cryptocurrency," the agency said in a notification.

article thumbnail

Twilio breach let attackers access Authy two-factor accounts of 93 users

Security Affairs

Threat actors behind the Twilio hack also gained access to the accounts of 93 individual users of its Authy two-factor authentication (2FA) service. Early August, the communications company Twilio discloses a data breach , threat actors had access to the data of some of its customers. The attackers accessed company systems using employee credentials obtained through a sophisticated SMS phishing attack.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Telegram-Powered News Outlet Waging Guerrilla War on Russia

WIRED Threat Level

Anti-Putin media network February Morning has become a central player in the underground fight against the Kremlin.

Media 99
article thumbnail

CISA adds 10 new flaws to its Known Exploited Vulnerabilities Catalog

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new vulnerabilities to its Known Exploited Vulnerabilities Catalog , including a high-severity security flaw ( CVE-2021-38406 CVSS score: 7.8) impacting Delta Electronics industrial automation software.

article thumbnail

New Golang-based 'Agenda Ransomware' Can Be Customized For Each Victim

The Hacker News

A new ransomware strain written in Golang dubbed "Agenda" has been spotted in the wild, targeting healthcare and education entities in Indonesia, Saudi Arabia, South Africa, and Thailand. "Agenda can reboot systems in safe mode, attempts to stop many server-specific processes and services, and has multiple modes to run," Trend Micro researchers said in an analysis last week.

article thumbnail

Crooks are increasingly targeting DeFi platforms to steal cryptocurrency

Security Affairs

The U.S. FBI warns investors that crooks are increasingly exploiting security issues in Decentralized Finance (DeFi) platforms to steal cryptocurrency. The U.S. Federal Bureau of Investigation (FBI) published a Public Service Announcement (PSA) to warn investors that cybercriminals are increasingly exploiting security flaws in Decentralized Finance (DeFi) platforms to steal cryptocurrency.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The 3 Questions CISOs Must Ask to Protect Their Sensitive Data

Dark Reading

CISOs must adopt a new mindset to take on the moving targets in modern cybersecurity.

CISO 98
article thumbnail

US FTC sued US data broker Kochava for selling sensitive and geolocation data

Security Affairs

The U.S. FTC sued US data broker Kochava for selling sensitive and precise geolocation data collected from hundreds of millions of mobile devices. The U.S. Federal Trade Commission (FTC) filed a lawsuit against the US-based data broker Kochava for selling sensitive and precise geolocation data collected from hundreds of millions of mobile devices. “Defendant’s violations are in connection with acquiring consumers’ precise geolocation data and selling the data in a format that allows entiti

Mobile 98
article thumbnail

Three Best Practices Every Security Leader Should Consider When Using Duo

Duo's Security Blog

As cybersecurity leaders have been stepping up efforts to secure all users and applications with multi-factor authentication (MFA), Duo Security is highlighting security best practices that can help deter against malicious attacks. With vulnerabilities such as PrintNightmare (CVE-2021-34527) , which have been reported by the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA), it’s important to consider and reference a defense-in-depth security strat

article thumbnail

Nitrokod crypto miner infected systems across 11 countries since 2019

Security Affairs

Researchers spotted a Turkish-based crypto miner malware campaign, tracked as Nitrokod, which infected systems across 11 countries. Check Point researchers discovered a Turkish based crypto miner malware campaign, dubbed Nitrokod, which infected machines across 11 countries. The threat actors dropped the malware from popular software available on dozens of free software websites, including Softpedia and uptodown.

Malware 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!