Tue.Apr 11, 2023

article thumbnail

Car Thieves Hacking the CAN Bus

Schneier on Security

Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic key is nearby. News articles.

Hacking 346
article thumbnail

Microsoft (& Apple) Patch Tuesday, April 2023 Edition

Krebs on Security

Microsoft today released software updates to plug 100 security holes in its Windows operating systems and other software, including a zero-day vulnerability that is already being used in active attacks. Not to be outdone, Apple has released a set of important updates addressing two zero-day vulnerabilities that are being used to attack iPhones , iPads and Macs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protect your company data with an Ivacy VPN lifetime subscription for $18

Tech Republic Security

The service previously won the BestVPN.com Fastest VPN Award. The post Protect your company data with an Ivacy VPN lifetime subscription for $18 appeared first on TechRepublic.

VPN 167
article thumbnail

Nokoyawa ransomware attacks with Windows zero-day

SecureList

In February 2023, Kaspersky technologies detected a number of attempts to execute similar elevation-of-privilege exploits on Microsoft Windows servers belonging to small and medium-sized businesses in the Middle East, in North America, and previously in Asia regions. These exploits were very similar to already known Common Log File System (CLFS) driver exploits that we analyzed previously, but we decided to double check and it was worth it – one of the exploits turned out to be a zero-day, suppo

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

iPhones hacked via invisible calendar invites to drop QuaDream spyware

Bleeping Computer

Microsoft and Citizen Lab discovered commercial spyware made by an Israel-based company QuaDream used to compromise the iPhones of high-risk individuals using a zero-click exploit named ENDOFDAYS. [.

Spyware 144
article thumbnail

Attention gamers! Motherboard maker MSI admits to breach, issues “rogue firmware” alert

Naked Security

Stealing private keys is like getting hold of a medieval monarch's personal signet ring. you get to put an official seal on treasonous material.

Firmware 143

LifeWorks

More Trending

article thumbnail

Windows zero-day vulnerability exploited in ransomware attacks

Bleeping Computer

Microsoft has patched a zero-day vulnerability in the Windows Common Log File System (CLFS), actively exploited by cybercriminals to escalate privileges and deploy Nokoyawa ransomware payloads. [.

article thumbnail

3 overlooked cloud security attack vectors

InfoWorld on Security

A 2022 Thales Cloud Security study revealed that 88% of enterprises store a significant amount (at least 21%) of their sensitive data in the cloud. No surprise there. Indeed, I thought the percentage would be much higher. The same report showed that 45% of organizations have experienced a data breach or failed an audit involving cloud-based data and applications.

article thumbnail

Microsoft April 2023 Patch Tuesday fixes 1 zero-day, 97 flaws

Bleeping Computer

​Today is Microsoft's April 2023 Patch Tuesday, and security updates fix one actively exploited zero-day vulnerability and a total of 97 flaws. [.

130
130
article thumbnail

Attackers Hide RedLine Stealer Behind ChatGPT, Google Bard Facebook Ads

Dark Reading

The campaign shrouds the commodity infostealer in OpenAI files in a play that aims to take advantage of the growing public interest in AI-based chatbots.

124
124
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Why reporting an incident only makes the cybersecurity community stronger

CSO Magazine

Reporting an incident to the correct authorities or vulnerability clearinghouses can be an experience fraught with frustration. You pour time, energy, and resources into fighting an intrusion, all while keeping company officials and stakeholders up to date and preventing sensitive information from getting into the wild. Explaining what happened might seem just like another layer of hard work and exposure to potential embarrassment when the details are out there for all to see.

article thumbnail

Socially Engineered Into Stealing $500,000 From a Casino

Security Boulevard

A cashier at a Colorado casino is accused of stealing half a million dollars in cash after allegedly being duped by phone calls and text messages from imposters posing as her bosses. She sits in a Colorado jail while the money is long gone. It appears to be a case of creative social engineering by. The post Socially Engineered Into Stealing $500,000 From a Casino appeared first on Security Boulevard.

article thumbnail

Iranian APT group launches destructive attacks in hybrid Azure AD environments

CSO Magazine

Recent destructive attacks against organizations that masquerade as a ransomware operation called DarkBit are likely performed by an advanced persistent threat (APT) group that's affiliated with the Iranian government. During some of these operations the attackers didn't limit themselves to on-premises systems but jumped into victims' Azure AD environments where they deleted assets including entire server farms and storage accounts.

article thumbnail

Cloud security firm Ericom Software acquired by Cradlepoint

CyberSecurity Insiders

Networking firm Cradlepoint has made it official that it is going to acquire cloud security firm Ericom Software for an undisclosed sum. Trade analysts suggest that the purchase of the firm will help Cradlepoint build a secure 5G network that features zero trust, cloud security, and secure access service edge capabilities obtained from Ericom Global Cloud Platform.

Software 114
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Battle could be brewing over new FCC data breach reporting rules

CSO Magazine

On January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for telecommunications carriers. "The law requires carriers to protect sensitive consumer information but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules to protect consumers and strengthen reporting requirements," said FCC Chairwoman Jessica Rosenworcel in announcing the proceeding.

article thumbnail

What you Missed in the White House National Cybersecurity Strategy

Security Boulevard

On the heels of the White House’s National Cybersecurity Strategy, there were plenty of reactions and opinions about how cybersecurity strategies and priorities must change. But most people missed one critical callout: Enterprises and major cybersecurity providers must prioritize digital identity solutions, emphasizing a more proactive approach to security as responsibilities shift away from consumers.

article thumbnail

Cohesity aims an OpenAI-powered chatbot to secure your data sets

CSO Magazine

Generative AI is coming to both line-of-business data analysis as well as security, as Cohesity deepens its ties to Microsoft.

112
112
article thumbnail

Armorblox Report Surfaces Spike in BEC Attacks

Security Boulevard

An analysis of customer data from email protection platform provider Armorblox found business email compromise (BEC) attacks have increased 72% year-over-year. More than half of those attacks (56%) bypassed legacy security filters that many organizations rely on to thwart these attacks, the report found. The report also found 20% of BEC attacks involved a threat.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

[eBook] A Step-by-Step Guide to Cyber Risk Assessment

The Hacker News

In today's perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats, including ransomware, phishing, attacks on infrastructure, supply chain breaches, malicious insiders, and much more. Yet at the same time, security leaders are also under tremendous pressure to reduce costs and invest wisely.

article thumbnail

Coming soon from your Prime: A minimum SPRS score requirement

Security Boulevard

As if a switch has been turned on, since the beginning of 2023 more and more subcontractors throughout the Defense Industrial Base (the DIB) are reporting being asked by their primes for their SPRS scores. And many are being told a minimum score they need to achieve to keep doing business with their prime. […] The post <span style="color:#f05f2a;">Coming soon from your Prime:</span> A minimum SPRS score requirement appeared first on PreVeil.

111
111
article thumbnail

Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit

The Hacker News

It's the second Tuesday of the month, and Microsoft has released another set of security updates to fix a total of 97 flaws impacting its software, one of which has been actively exploited in ransomware attacks in the wild. Seven of the 97 bugs are rated Critical and 90 are rated Important in severity.

article thumbnail

CrowdStrike expands Falcon platform with XDR for IoT assets

CSO Magazine

Cybersecurity vendor CrowdStrike has announced the release of new extended detection and response (XDR) capabilities within its Falcon platform to secure extended internet of things (XIoT) assets including IoT, Industrial IoT, OT, and medical devices. CrowdStrike Falcon Insight for IoT delivers tailored threat prevention, rapid patch management, and interoperability across XIoT assets to help customers secure their organization with the same platform across IoT, IT endpoints, cloud workloads, id

IoT 105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

North Korean Hackers Uncovered as Mastermind in 3CX Supply Chain Attack

The Hacker News

Enterprise communications service provider 3CX confirmed that the supply chain attack targeting its desktop application for Windows and macOS was the handiwork of a threat actor with North Korean nexus. The findings are the result of an interim assessment conducted by Google-owned Mandiant, whose services were enlisted after the intrusion came to light late last month.

106
106
article thumbnail

The Top Challenges Faced by CISOs in 2023

CyberSecurity Insiders

As the world continues to face unprecedented cyber threats, Chief Information Security Officers (CISOs) are facing a growing number of challenges in their roles. In 2023, these challenges are likely to increase, and CISOs will have to be well-equipped to overcome them. In this article, we will discuss the top challenges that CISOs are expected to face in 2023.

CISO 104
article thumbnail

How Password Managers Can Get Hacked

Dark Reading

Password managers aren't foolproof, but they do help mitigate risks from weak credentials and password reuse. Following best practices can contribute to a company's defenses.

article thumbnail

10 things to look out for when buying a password manager

We Live Security

Here's how to choose the right password vault for you and what exactly to consider when weighing your options The post 10 things to look out for when buying a password manager appeared first on WeLiveSecurity

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Patches 97 CVEs, Including Zero-Day & Wormable Bugs

Dark Reading

The April 2023 Patch Tuesday security update also included a reissue of a fix for a 10-year-old bug that a threat actor recently exploited in the supply chain attack on 3CX.

101
101
article thumbnail

Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages

The Hacker News

Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that was distributed via 13 malicious NuGet packages as part of a supply chain attack targeting.NET developers.

article thumbnail

Hacked sites caught spreading malware via fake Chrome updates

Bleeping Computer

Hackers are compromising websites to inject scripts that display fake Google Chrome automatic update errors that distribute malware to unaware visitors. [.

Malware 101
article thumbnail

#IdentityManagementDay – Best Practices to Help Keep Your Organization Secure

CyberSecurity Insiders

By Chinatu Uzuegbu, CISSP, CEO/Managing Cyber Security Consultant at RoseTech CyberCrime Solutions Ltd. We kicked off the Identity and Access Management Processes from the Top-Level Management approach. The Identity and Access Management Security Steering Committee is a group of C-Suites leaders, also referred to as the respective Data and Asset Owners from the various Business Units of my organization.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!