Fri.Sep 23, 2022

article thumbnail

Leaking Screen Information on Zoom Calls through Reflections in Eyeglasses

Schneier on Security

Okay, it’s an obscure threat. But people are researching it : Our models and experimental results in a controlled lab setting show it is possible to reconstruct and recognize with over 75 percent accuracy on-screen texts that have heights as small as 10 mm with a 720p webcam.” That corresponds to 28 pt, a font size commonly used for headings and small headlines. […].

353
353
article thumbnail

BSides Tallinn 2022

Javvad Malik

I love myself a good Security BSides, and I’ve never been to Tallin in Estonia. So when I saw the CFP was open I submitted and was delighted to be selected. View of Riga, Latvia. Unable to find a reliable direct flight to Tallin, and horrendously long connecting flights – I opted for the scenic route which involved flying into Riga in Latvia, and then driving across the border to Tallinn in the fastest car ever made… a rental car.

Phishing 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Account takeover attacks on the rise, impacting almost 25% of people in the US

Tech Republic Security

Losses triggered by account takeovers have averaged $12,000 per incident, according to data cited by SEON. The post Account takeover attacks on the rise, impacting almost 25% of people in the US appeared first on TechRepublic.

article thumbnail

Corrupting files is easy than spreading Ransomware

CyberSecurity Insiders

Cyderes, a Cybersecurity Risk Management firm from Missouri, has discovered that corrupting files are proving cheaper, is faster and is less likely to be detected by security solutions. For this reason, some hacking groups who were into ransomware attacks have set up a separate sect of threat actors who are being assigned the job of target corporate networks and corrupt files.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

LogicGate Risk Cloud: Product review

Tech Republic Security

Now you can see your institution's fraud and security risks in a new way, with LogicGate Risk Cloud. Read our review here. The post LogicGate Risk Cloud: Product review appeared first on TechRepublic.

Risk 146
article thumbnail

Software Supply Chain Security Guidance for Developers

eSecurity Planet

Whether it’s package hijacking, dependency confusing, typosquatting, continuous integration and continuous delivery ( CI/CD ) compromises, or basic web exploitation of outdated dependencies , there are many software supply chain attacks adversaries can perform to take down their victims, hold them to ransom , and exfiltrate critical data. It’s often more efficient to attack a weak link in the chain to reach a bigger target, like what happened to Kaseya or SolarWinds in the last couple of years.

Software 141

LifeWorks

More Trending

article thumbnail

Morgan Stanley fined millions for selling off devices full of customer PII

Naked Security

Critical data on old disks always seems inaccessible if you really need it. But when you DON''T want it back, guess what happens.

article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

For years, the U.S. Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the SEC has drafted rules to require more formal cybersecurity reporting and disclosure. This requirement copies the strategies of previous legislation that dramatically improved financial reporting for both public and private companies.

article thumbnail

Optus Falls Victim to Security Breach

Heimadal Security

Australian mobile operator Optus is investigating a security breach after they spotted “unauthorized access” to former and current customers’ personal data. Optus immediately shut down the attack and is currently working with the Australian Cyber Security Center to mitigate any risks to customers. An official statement issued on Optus’ website informed users of the mobile […].

Mobile 128
article thumbnail

Researchers Uncover Years-Long Mobile Spyware Campaign Targeting Uyghurs

The Hacker News

A new wave of a mobile surveillance campaign has been observed targeting the Uyghur community as part of a long-standing spyware operation active since at least 2015, cybersecurity researchers disclosed Thursday.

Spyware 124
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Healthcare Industry Leads the Way in Fixing Software Flaws

Veracode Security

The healthcare industry is transforming patient care through software, from 24/7 digital patient portals, to AI-fueled medical research, and everything in between. As innovation reaches new heights, how does healthcare stack up against other sectors in terms of software security flaws and the ability to remediate them? Our latest State of Software Security Report found that 77 percent of applications in this sector have vulnerabilities – a slight uptick from last year’s 75 percent – with 21 perc

article thumbnail

Multi-Million Dollar Global Credit Card Scam Exposed

Heimadal Security

A massive global multi-million dollar scam, operating since 2019, has been uncovered. The number of victims is in the range of tens of thousands. Thought to be originated from Russia, the gang operates an extensive network of fake dating and customer support websites, using them to charge credit cards bought on the dark web. By […]. The post Multi-Million Dollar Global Credit Card Scam Exposed appeared first on Heimdal Security Blog.

Scams 119
article thumbnail

Overheard at the SANS Security Awareness Summit 2022

The State of Security

People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about […]… Read More.

article thumbnail

Morgan Stanley Sanctioned for Exposing Information of 15 Million Customers

Heimadal Security

On Tuesday, September 20, 2022, The Securities and Exchange Commission (SEC) revealed that Morgan Stanley financial services corporation will be sanctioned with a $35M fine. Morgan Stanley Smith Barney, the wealth & asset management division of Morgan Stanley, was accused of “extensive failures” in protecting important data that led to the exposure of 15 million […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

NSA shares guidance to help secure OT/ICS critical infrastructure

Bleeping Computer

The National Security Agency (NSA) and CISA have issued guidance on how to secure operational technology (OT) and industrial control systems (ICSs) part of U.S. critical infrastructure. [.].

article thumbnail

Best 10 SIEM Tools to Fuel Up Your Threat-Hunting Grind

Heimadal Security

Threat-hunting has proven to be the most efficient, field-proven countermeasure against cyber threats. Action items based on intelligence gathered via (automatic) threat-hunting tools can aid your effort in drafting up in-depth defense strategies and battle cards to fit numerous threat scenarios. In this article, we’re going to talk about some of the best SIEM tools […].

article thumbnail

Morgan Stanley Fined $35M for Failing to Safeguard Customer Data

SecureWorld News

Everybody makes mistakes, especially in cybersecurity. Most jobs in cyber are challenging and require a certain level of detail, so a mistake is bound to come up every now and then. But a $35 million mistake? That doesn't happen everyday. Morgan Stanley has agreed to pay $35 million to settle charges from the U.S. Securities and Exchange Commission (SEC) emerging from the financial institution's failure to protect the personal identifying information (PII) of its roughly 15 million customers.

article thumbnail

Microsoft Exchange servers hacked via OAuth apps for phishing

Bleeping Computer

Microsoft says a threat actor gained access to cloud tenants hosting Microsoft Exchange servers in credential stuffing attacks, with the end goal of deploying malicious OAuth applications and sending phishing emails. [.].

Phishing 103
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

5 tips to help children navigate the internet safely

We Live Security

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits? The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity.

Internet 102
article thumbnail

Microsoft adds 'systemd' to the Windows Subsystem for Linux

Bleeping Computer

Microsoft and Canonical have teamed up to add systemd support to the Windows Subsystem for Linux, allowing a larger number of compatible apps to be installed. [.].

103
103
article thumbnail

Firing Your Entire Cybersecurity Team? Are You Sure?

The Hacker News

What on earth were they thinking? That's what we – and other security experts – were wondering when content giant Patreon recently dismissed its entire internal cybersecurity team in exchange for outsourced services. Of course, we don't know the true motivations for this move.

article thumbnail

A first look at the builder for LockBit 3.0 Black

Malwarebytes

A few months after the LockBit gang released version 3.0 of its ransomware, LockBit 3.0 Black, the builder for it has been leaked by what seems to be a disgruntled developer. LockBit has been by far the most widely used ransomware in 2022 and the appearance of the builder could make things worse. It is likely to be popular, so we could see new gangs appear that aren't affiliated with the LockBit group but use its software, for example.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Anonymous claims to have hacked the website of the Russian Ministry of Defense

Security Affairs

The popular collective Anonymous claims to have hacked the website of the Russian Ministry of Defense and leaked data of 305,925 people. The #OpRussia ( #OpRussia ) launched by Anonymous on Russia after the criminal invasion of Ukraine continues, the popular collective claims to have hacked the website of the Russian Ministry of Defense. The group of hacktivists has leaked the data of 305,925 people who are likely to be mobilized in the first of three waves of mobilization announced by President

Hacking 98
article thumbnail

As Cyberattacks Intensify, Orgs Don’t Report Incidents

Security Boulevard

It comes as no surprise that most IT security leaders believe that cyberattacks will intensify in the next year. What is surprising (and troubling) is that many keep attacks to themselves while others don’t invest in the cybersecurity tools needed to protect their organizations in the first place. That’s according to Keeper Security’s second annual.

article thumbnail

Australian Telecoms company Optus discloses security breach

Security Affairs

Australian telecoms company Optus disclosed a data breach, threat actors gained access to former and current customers. Optus , one of the largest service providers in Australia, disclosed a data breach. The intruders gained access to the personal information of both former and current customers. The company is a subsidiary of Singtel with 10.5 million subscribers as of 2019. “Following a cyberattack, Optus is investigating the possible unauthorised access of current and former customers’

article thumbnail

The pandemic turned out to be a boon for public-private cybersecurity cooperation

Security Boulevard

The shift to remote work punched holes in government networks. But it also fostered a transformation in public-private cooperation, one NSA official noted at LABScon. . The post The pandemic turned out to be a boon for public-private cybersecurity cooperation appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

AttachMe: a critical flaw affects Oracle Cloud Infrastructure (OCI)

Security Affairs

A critical vulnerability in Oracle Cloud Infrastructure (OCI) could be exploited to access the virtual disks of other Oracle customers. Wiz researchers discovered a critical flaw in Oracle Cloud Infrastructure (OCI) that could be exploited by users to access the virtual disks of other Oracle customers. An attacker can trigger the flaw to exfiltrate sensitive data or conduct more destructive attacks by manipulating executable files.

Hacking 98
article thumbnail

Hackers Using Fake CircleCI Notifications to Hack GitHub Accounts

The Hacker News

GitHub has put out an advisory detailing what may be an ongoing phishing campaign targeting its users to steal credentials and two-factor authentication (2FA) codes by impersonating the CircleCI DevOps platform. The Microsoft-owned code hosting service said it learned of the attack on September 16, 2022, adding the campaign impacted "many victim organizations.

article thumbnail

CISA adds Zoho ManageEngine flaw to its Known Exploited Vulnerabilities Catalog

Security Affairs

CISA added a security flaw in Zoho ManageEngine, tracked as CVE-2022-35405, to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a recently disclosed security flaw in Zoho ManageEngine, tracked as CVE-2022-35405 (CVSS score 9.8) , to its Known Exploited Vulnerabilities Catalog. According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address t

article thumbnail

So Your Identity Was Stolen: What To Do and How To Recover

Security Boulevard

If your identity was stolen, you’re not alone. Over 1.4 million cases of identity theft were reported to the Federal Trade Commission in 2021. And unfortunately, it’s only becoming more common. Identity theft is the fastest-growing crime in the United States, leaving more people and companies at risk than ever before. If you’ve been a. The post So Your Identity Was Stolen: What To Do and How To Recover appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!