Thu.May 05, 2022

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Ransomware? I think you may have heard of it, isn’t the news full of it? Well, the stats are even scarier with over 50% increase in ransomware attacks in 2021, compared to 2020. Related: Make it costly for cybercriminals. The media paid close attention to ransomware attacks last year, as they had a significant impact on Colonial Pipeline, the nation’s largest fuel distributor, and JBS, the nation’s largest meat distributor.

article thumbnail

15.3 Million Request-Per-Second DDoS Attack

Schneier on Security

Cloudflare is reporting a large DDoS attack against an unnamed company “operating a crypto launchpad.” While this isn’t the largest application-layer attack we’ve seen , it is the largest we’ve seen over HTTP S. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure TLS encrypted connection.

DDOS 244
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone

Tech Republic Security

Adopting a new authentication method from the FIDO Alliance, the three major OS vendors will let you use encrypted credentials stored on your phone to automatically sign you into your online accounts. The post Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone appeared first on TechRepublic.

Mobile 167
article thumbnail

Announcing the public availability of the Cisco Cloud Controls Framework (CCF)

Cisco Security

Customers globally are requesting – and often requiring – SaaS providers to demonstrate their commitment to security, availability, confidentiality, and privacy. While attaining global security certifications has become table-stakes for many to do business, it’s no easy feat. Many organizations struggle to keep pace with this resource- and time-intensive process.

Marketing 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

UNC3524: The nearly invisible cyberespionage threat sitting on network appliances

Tech Republic Security

A stealthy cybercriminal operation targeting companies involved in mergers and acquisitions has been discovered, and it's run by a threat actor who is particularly cautious about not being detected. Read more about this threat and how to protect yourself. The post UNC3524: The nearly invisible cyberespionage threat sitting on network appliances appeared first on TechRepublic.

148
148
article thumbnail

Tor project upgrades network speed performance with new system

Bleeping Computer

The Tor Project has published details about a newly introduced system called Congestion Control that promises to eliminate speed limits on the network. [.].

143
143

LifeWorks

More Trending

article thumbnail

$43 billion stolen through Business Email Compromise since 2016, reports FBI

The State of Security

The FBI's Internet Crime Complaint Center (IC3) has issued updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of criminals. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Check Point vs Palo Alto: Comparing EDR software

Tech Republic Security

Check Point and Palo Alto are providers of effective endpoint detection and response tools to allow you to surpass detection-based cyber defense and improve your organization’s ability to manage cybersecurity risk. But which tool is best for you? The post Check Point vs Palo Alto: Comparing EDR software appeared first on TechRepublic.

Software 148
article thumbnail

World Password Day – the 1960s just called and gave you your passwords back

Naked Security

Yes, passwords are going away. No, it won't happen tomorrow. So it's still worth knowing the basics of picking proper passwords.

Passwords 125
article thumbnail

How to use KDE Plasma’s Konsole SSH plugin

Tech Republic Security

Looking for an incredibly easy tool to manage your SSH connections? KDE's terminal application has a handy trick up its sleeve. The post How to use KDE Plasma’s Konsole SSH plugin appeared first on TechRepublic.

144
144
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Cisco Issues Patches for 3 New Flaws Affecting Enterprise NFVIS Software

The Hacker News

Cisco Systems on Wednesday shipped security patches to contain three flaws impacting its Enterprise NFV Infrastructure Software (NFVIS) that could permit an attacker to fully compromise and take control over the hosts.

Software 121
article thumbnail

CrowdStrike vs FireEye: Compare EDR software

Tech Republic Security

See what features you can expect from CrowdStrike and FireEye to decide which EDR solution is right for you. The post CrowdStrike vs FireEye: Compare EDR software appeared first on TechRepublic.

Software 142
article thumbnail

Chinese State-Sponsored APT Naikon Resurfaces with New Tactics, Techniques, and Procedures (TTPs).

Heimadal Security

Naikon, a Chinese-state-sponsored Advanced Persistent Threat (APT) undergoes scrutiny once again following the discovery of a new set of TTPs (Tactics, Techniques, and Procedures). Although the group’s motivation remains unknown, the recovered data and (attack) artifacts tend to suggest that Naikon may be stagging a surveillance operation against Southeast Asian military and governmental HVTs (High-Value […].

article thumbnail

5 Advantages of Fraud Scoring

CyberSecurity Insiders

As a business, fraud is something to be aware of and to put preventative measures in place where possible. Just like cybercrime, online fraud can happen to anyone – it doesn’t discriminate regardless of whether you’re a big or small company. . Fraud scoring is a useful way of helping understand how risky a user action is and whether or not to trust it as a legitimate action.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins

Heimadal Security

For about six months, more than 100 National Health Service (NHS) employees in the United Kingdom had their email accounts used in various phishing attacks, some of which intended to steal Microsoft logins. Malicious actors began using authentic NHS email accounts in October 2021 after hacking them, and they continued to do so until at […]. The post UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins appeared first on Heimdal Security Blog.

article thumbnail

Smashing Security podcast #273: Password blips, and who’s calling the airport?

Graham Cluley

We find out why calls to Dublin airport's noise complaints line have soared, and Carole quizzes Graham to celebrate World Password Day. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast, with computer security veterans Graham Cluley and Carole Theriault. And don't miss our special featured interview with Clint Dovholuk of NetFoundry.

Passwords 105
article thumbnail

One Identity Guest Blog – The password checklist

IT Security Guru

By Dan Conrad, Security team lead at One Identity . It is not a secret that passwords are not a particularly secure method of protection, furthermore in a world where multifactor authentication is becoming the norm, talking about password hygiene seems a little dated but still, according to the Verizon 2021 Data Breach Investigations Report , credentials are the route to data breaches in 61% of incidents. . ?

Passwords 104
article thumbnail

BIG-IP RCE Bug Could Allow Device Takeover

Heimadal Security

F5 Networks is a leading provider of enterprise networking gear, with software and hardware customers like governments, Fortune 500 firms, banks, internet service providers, and largely known consumer brands (Microsoft, Oracle, and Facebook). What Happened? The vulnerability has been assigned the name CVE-2022-1388 and has a CVSS v3 severity rating of 9.8, making it a […].

Banking 103
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Friday Five 5/6

Digital Guardian

Read up on how passwords may soon be a thing of the past, how your mental health data may be at risk, how business email compromise cost organizations billions in the past five years, and much more—all in this week’s Friday Five!

Passwords 102
article thumbnail

F5 Warns of a New Critical BIG-IP Remote Code Execution Vulnerability

The Hacker News

Cloud security and application delivery network (ADN) provider F5 on Wednesday released patches to contain 43 bugs spanning its products. Of the 43 issues addressed, one is rated Critical, 17 are rated High, 24 are rated Medium, and one is rated low in severity. Chief among the flaws is CVE-2022-1388, which carries a CVSS score of 9.

99
article thumbnail

How to Protect Your Digital Privacy if Roe v. Wade Falls

WIRED Threat Level

Reproductive rights are still largely guaranteed in the United States. Here are some key privacy concepts to adopt in the event that they're not.

98
article thumbnail

Researchers Disclose 10-Year-Old Vulnerabilities in Avast and AVG Antivirus

The Hacker News

Two high-severity security vulnerabilities, which went undetected for several years, have been discovered in a legitimate driver that's part of Avast and AVG antivirus solutions.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Critical Cisco VM-Escape Bug Threatens Host Takeover

Dark Reading

The vendor also disclosed two other security vulnerabilities that would allow remote, unauthenticated attackers to inject commands as root and snoop on sensitive user information.

98
article thumbnail

FTC to force ISP to deploy fiber for 60K users to match speed claims

Bleeping Computer

The Federal Trade Commission (FTC) today proposed an order requiring Connecticut-based internet service provider Frontier Communications to stop "lying" to its customers and support its high-speed internet claims. [.].

article thumbnail

Every ISP in the US Must Block These 3 Pirate Streaming Services

WIRED Threat Level

The 96 internet service providers were told to enforce the orders “by any technological means available.”.

article thumbnail

Vendor Email Compromise (VEC) Explained

Heimadal Security

You may know what BEC (Business Email Compromise) is, but have you heard of VEC (Vendor Email Compromise)? If your business transacts with vendors to supply products or services, VEC is a sophisticated cyberthreat you need to know about. Vendor Email Compromise (also known as Vendor Impersonation Fraud) is a relatively new type of email […]. The post Vendor Email Compromise (VEC) Explained appeared first on Heimdal Security Blog.

Scams 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity

Security Boulevard

The World Forum for Harmonization of Vehicle Regulations (WP.29) of the United Nations Economic Commission for Europe (UNECE) is a global regulatory forum within the UNECE Inland Transportation Committee. WP.29 drafted a regulation, No. 155 , addressing vehicle cybersecurity and cybersecurity management systems (CSMS). The post SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity appeared first on Security Boulevard.

article thumbnail

Google addresses actively exploited Android flaw in the kernel

Security Affairs

Google released the May security bulletin for Android, 2022-05-05 security patch level, which fixed an actively exploited Linux kernel flaw. Google has released the second part of the May Security Bulletin for Android, which includes a fix for an actively exploited Linux kernel vulnerability tracked as CVE-2021-22600. The CVE-2021-22600 is a privilege escalation issue that resides in the Linux kernel, an attacker can trigger it via local access.

Hacking 98
article thumbnail

Cybersecurity Insights with Contrast Security CISO David Lindner | 5/6

Security Boulevard

Insight #1. "If your website authentication form prevents users from pasting in their password, or from using their password manager you need to fix it immediately. You are enabling and encouraging users to create and use poor passwords.". . Insight #2. "Do a search for the top 200 most common passwords in your favorite search engine. If any of your passwords are in this list, change them.". .

CISO 98
article thumbnail

A couple of 10-Year-Old flaws affect Avast and AVG antivirus?

Security Affairs

Researcher discovered a couple of high-severity security flaws that affect a driver used by Avast and AVG antivirus solutions. SentinelOne researcher Kasif Dekel discovered two high-severity security vulnerabilities, tracked as CVE-2022-26522 and CVE-2022-26523, that affect a driver used by Avast and AVG antivirus solutions. The bugs reside in the anti-rootkit kernel driver named aswArPot.sys which is the “Avast anti-rootkit,” digitally signed by AVAST Software.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!