Fri.Jan 13, 2023

article thumbnail

Threats of Machine-Generated Text

Schneier on Security

With the release of ChatGPT, I’ve read many random articles about this or that threat from the technology. This paper is a good survey of the field: what the threats are, how we might detect machine-generated text, directions for future research. It’s a solid grounding amongst all of the hype. Machine Generated Text: A Comprehensive Survey of Threat Models and Detection Methods.

article thumbnail

Weekly Update 330

Troy Hunt

Big week! So big, in fact, that I rushed into this week's update less prepared and made it a very casual one, which is just fine 😊 It's mostly password books and kitchen equipment this week, both topics which had far more engagement than I expected but made them all the more interesting. Next week I'll get back into the pattern of switching between last thing Friday and first thing Friday so it'll be my morning again on the 20th, see you then!

Passwords 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Yikes, Control Web Panel has Critical RCE — Patch NOW

Security Boulevard

Linanto’s popular web hosting control panel, CWP, has a nasty flaw. It’s easily exploitable—in fact, it’s being exploited RIGHT NOW. The post Yikes, Control Web Panel has Critical RCE — Patch NOW appeared first on Security Boulevard.

article thumbnail

Buggy Microsoft Defender ASR rule deletes Windows app shortcuts

Bleeping Computer

Microsoft has addressed a false positive triggered by a buggy Microsoft Defender ASR rule that would delete application shortcuts from the desktop, the Start menu, and the taskbar and, in some cases, render existing shortcuts unusable as they couldn't be used to launch the linked apps. [.].

145
145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

APT group trojanizes Telegram app – Week in security with Tony Anscombe

We Live Security

StrongPity's backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists. The post APT group trojanizes Telegram app – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

131
131
article thumbnail

ManageEngine CVE-2022-47966 IOCs

Security Boulevard

Introduction The recent ManageEngine CVE-2022-47966 is a pre-authentication remote code execution vulnerability. Depending on the specific ManageEngine product, this vulnerability is exploitable if SAML single-sign-on is enabled or has ever been enabled. ManageEngine products are some of the most widely used across enterprises and perform business functions such as authentication, authorization, and identity management.

LifeWorks

More Trending

article thumbnail

Beware: Tainted VPNs Being Used to Spread EyeSpy Surveillanceware

The Hacker News

Tainted VPN installers are being used to deliver a piece of surveillanceware dubbed EyeSpy as part of a malware campaign that started in May 2022. It uses "components of SecondEye – a legitimate monitoring application – to spy on users of 20Speed VPN, an Iranian-based VPN service, via trojanized installers," Bitdefender said in an analysis.

VPN 129
article thumbnail

Royal ransomware group actively exploiting Citrix vulnerability

CSO Magazine

The Royal ransomware group is believed to be actively exploiting a critical security flaw affecting Citrix systems, according to the cyber research team at cyber insurance provider At-Bay. Announced by Citrix on November 8, 2022, the vulnerability, identified as CVE-2022-27510 , allows for the potential bypass of authentication measures on two Citrix products: the Application Delivery Controller (ADC) and Gateway.

article thumbnail

Market for Security Robots Grows, But Data Privacy Concerns Remain

Security Boulevard

Robots have been infiltrating business and industry for decades, so it’s not surprising that AI and connected technologies like streaming video are now being enlisted to perform many of the security tasks currently handled by humans. The global security robots market “was valued at USD 27.32 billion in 2021 and is expected to surpass $116.44 billion.

article thumbnail

Sneaky New Stealer Woos Corporate Workers Through Fake Zoom Downloads

Dark Reading

Rhadamanthys spreads through Google Ads that redirect to bogus download sites for popular workforce software — as well as through more typical malicious emails.

Software 126
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Data Security: This Time, it’s Personal

Security Boulevard

Security teams struggle to keep pace with data proliferation across their cloud environments. The cloud provides obvious business advantages, but the sheer volume of data moving to the cloud, the lack of visibility and the use of multiple cloud service providers all increase the threat surface exponentially. In this rush to the cloud, enterprises have.

CISO 125
article thumbnail

Malware Comes Standard With This Android TV Box on Amazon

Dark Reading

The bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted.

Malware 121
article thumbnail

How to build Secure Applications with DevSecOps

Security Boulevard

Application security was frequently neglected during the software development process. Testing typically wasn’t done until the very end. Unfortunately, when vulnerabilities were found at that point, engineers were forced to start over and rebuild a huge amount of code. This is changing as more businesses use the DevOps development technique to produce better software more […].

article thumbnail

Norton LifeLock Warns on Password Manager Account Compromises

Dark Reading

Password manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

PoC exploits released for critical bugs in popular WordPress plugins

Bleeping Computer

Three popular WordPress plugins with tens of thousands of active installations are vulnerable to high-severity or critical SQL injection vulnerabilities, with proof-of-concept exploits now publicly available. [.].

118
118
article thumbnail

Microsoft introduces voice copying AI tool

CyberSecurity Insiders

Microsoft, the technology giant of America, has achieved a new milestone in Artificial Intelligence by introducing a voice mimicking AI tool dubbed ‘Vall-E’. The tool has enough potential to copy a voice within 3 seconds and can easily create an audio content by using the same voice. Thus, like deep fake technology, where a face can be pasted onto a subject’s face in a video, Vall-E can also imitate and interpret a human voice.

article thumbnail

NortonLifeLock warns that hackers breached Password Manager accounts

Bleeping Computer

Gen Digital, formerly Symantec Corporation and NortonLifeLock, is sending data breach notifications to customers, informing them that hackers have successfully breached Norton Password Manager accounts in credential-stuffing attacks. [.].

article thumbnail

Attackers deploy sophisticated Linux implant on Fortinet network security devices

CSO Magazine

In December network security vendor Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details about a sophisticated malware implant that those attackers deployed through the flaw. Based on currently available information, the original zero-day attack was highly targeted to government-related entities.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Illicit Crypto Transactions Hit All-Time High in 2022

SecureWorld News

It shouldn't come as a surprise to many, but i llicit cryptocurrency transactions hit an all-time high in 2022, totaling $20.1 billion, according to a report by Chainalysis. Despite the massive downturn for crypto in 2022, illicit transaction volume rose for a second year in a row. Chainalysis notes that the $20.1 billion number is a "lower bound estimate," meaning the number is much higher in reality.

article thumbnail

Hacked! My Twitter user data is out on the dark web -- now what?

Zero Day

Your Twitter user data may now be out there too, including your phone number. Here's how to check and what you can do about it.

Hacking 106
article thumbnail

How the LockBit Ransomware Group Brought Royal Mail to Its Knees

Heimadal Security

A cyberattack on Royal Mail, the UK’s largest mail delivery service, has been linked to LockBit ransomware. The Royal Mail announced yesterday that it has been experiencing severe disruption to international export services as a result of a cyber incident. Royal Mail did not provide details about the cyberattack but said it works with external […].

article thumbnail

TikTok Fined $5.4 Million by French Regulator for Violating Cookie Laws

The Hacker News

Popular short-form video hosting service TikTok has been fined €5 million (about $5.4 million) by the French data protection watchdog for breaking cookie consent rules, making it the latest platform to face similar penalties after Amazon, Google, Meta, and Microsoft since 2020. "Users of 'tiktok[.

100
100
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Network Segmentation: Best Practices To Follow When Implementing

Heimadal Security

Last time, we got to know better what network segmentation means. We defined the concept, found out how it works, how to use it and what benefits its implementation can bring to your organization. You can check out the first article I wrote about network segmentation, but you’re probably here because you decided to give […]. The post Network Segmentation: Best Practices To Follow When Implementing appeared first on Heimdal Security Blog.

article thumbnail

Cybercriminals Using Polyglot Files in Malware Distribution to Fly Under the Radar

The Hacker News

Remote access trojans such as StrRAT and Ratty are being distributed as a combination of polyglot and malicious Java archive (JAR) files, once again highlighting how threat actors are continuously finding new ways to fly under the radar.

Malware 100
article thumbnail

NortonLifeLock: threat actors breached Norton Password Manager accounts

Security Affairs

Gen Digital, formerly Symantec Corporation and NortonLifeLock, warns that hackers breached Norton Password Manager accounts. Gen Digital, formerly Symantec Corporation and NortonLifeLock, informed its customers that threat actors have breached Norton Password Manager accounts in credential-stuffing attacks. The company detected an unusually large volume of failed logins to customer accounts on December 12, 2022, and launched an investigation to determine what has happened. “We quickly took

article thumbnail

Cisco Issues Warning for Unpatched Vulnerabilities in EoL Business Routers

The Hacker News

Cisco has warned of two security vulnerabilities affecting end-of-life (EoL) Small Business RV016, RV042, RV042G, and RV082 routers that it said will not be fixed, even as it acknowledged the public availability of proof-of-concept (PoC) exploit.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

LockBit ransomware operation behind the Royal Mail cyberattack

Security Affairs

The cyberattack on Royal Mail, Britain’s postal service, is a ransomware attack that was linked to the LockBit ransomware operation. Royal Mail, the British multinational postal service and courier company, this week announced that a “cyber incident” has a severe impact on its operation. The incident only impacted Royal Mail’s international export services, the company said it is temporarily unable to despatch items to overseas destinations.

article thumbnail

T95 Android TV Box Delivered to Customer with Pre-Installed Malware

Heimadal Security

A system administrator discovered that the Android TV box bought from Amazon had pre-installed malware. According to him, the box was reaching out to a whole list of active malware addresses. Daniel Milisic is the person who found the malware and announced it on GitHub. He also wrote a script and instructions to assist users […]. The post T95 Android TV Box Delivered to Customer with Pre-Installed Malware appeared first on Heimdal Security Blog.

Malware 98
article thumbnail

US Department of the Interior's passwords "easily cracked"

Malwarebytes

It's bad news for the US Department of the Interior—a Government watchdog’s security audit has revealed its passwords are simply not up to the job of warding off cracking attempts. The audit's wordy title was not kind: P@s$w0rds at the U.S. Department of the Interior: Easily Cracked Passwords, Lack of Multifactor Authentication, and Other Failures Put Critical DOI Systems at Risk.

article thumbnail

Europol Takes Down Crypto Scams-Related Call Centers Across Europe

Heimadal Security

Several crypto scams linked call centers that were functioning in multiple European countries were discovered and closed this week by Europol. Cybercriminals used these call centers to convince individuals to invest money in the “Pig Butchering” cryptocurrency scams. The cross-border investigation involved law enforcement from Bulgaria, Cyprus, Germany, and Serbia and started in June 2022. […].

Scams 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!