Tue.Apr 26, 2022

article thumbnail

GUEST ESSAY: A call to blur the lines between cybersecurity training, up-skilling and higher ed

The Last Watchdog

In a recent survey of US-based CEOs, talent shortages and cybersecurity were listed as two of the top five business concerns in 2022. Related: Cultivating ‘human sensors’ They may not entirely realize that when compounded, these two concerns could pose a critical security threat for their organization. CEOs who are looking to secure their data and build a cyber-resilient infrastructure are facing a quadruple whammy: •Expanding their digital infrastructure faster than they can secure

article thumbnail

Dualmon vs TeamViewer: Remote desktop software comparison

Tech Republic Security

Both dualmon and TeamViewer are feature-rich remote desktop software tools. We compare the tools so you can choose the right remote desktop software for your needs. The post Dualmon vs TeamViewer: Remote desktop software comparison appeared first on TechRepublic.

Software 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improvise, Adapt, Overcome: Building Security Resilience in a World of Uncertainty

Cisco Security

For my very first interview for the Security Stories podcast , I met a wonderful person called Mick Jenkins, MBE. Mick is sadly no longer with us, but his story will stay with me forever. One of Mick’s philosophies was centred around the importance of cyber resilience. “Improvise, adapt, overcome” are the words he used. This philosophy helped him when he got lost in the wilderness at age 14.

CISO 112
article thumbnail

DDoS attacks were at all-time high in Q1 2022 due to war in Ukraine

Tech Republic Security

Kaspersky found that January and February were a hotbed of cyberattacks for a number of different targeted countries. The post DDoS attacks were at all-time high in Q1 2022 due to war in Ukraine appeared first on TechRepublic.

DDOS 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How Cybersecurity Businesses Are Tackling the Ukraine War: CyberNews Exclusive Interview

Heimadal Security

Copenhagen, April 26, 2022 – To discuss what the war in Ukraine will bring to the cybersecurity industry, Heimdal™ CEO Morten Kjærsgaard sat down with CyberNews, a leading research-based online publication that educates and protects consumers around the world from complex security risks. For more insight on how cybersecurity businesses are tackling the Ukraine conflict, make sure […].

article thumbnail

Developer workflow for software supply-chain security is in high demand

Tech Republic Security

Log4j showed how easy it is to hack popular software artifacts. Open-source projects and vendors are racing to make it easier for developers to lock down their software supply chains. The post Developer workflow for software supply-chain security is in high demand appeared first on TechRepublic.

Software 117

More Trending

article thumbnail

JumpCloud vs Okta: Compare identity and access management software

Tech Republic Security

Read this feature comparison of JumpCloud and Okta, two leading IAM softwares solutions that can help secure your business. The post JumpCloud vs Okta: Compare identity and access management software appeared first on TechRepublic.

Software 114
article thumbnail

The trouble with BEC: How to stop the costliest internet scam

We Live Security

BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s long past time that organizations got a handle on these scams. The post The trouble with BEC: How to stop the costliest internet scam appeared first on WeLiveSecurity.

Scams 105
article thumbnail

The European Commission’s Standard Contractual Clauses

TrustArc

Understand how the new standard contractual clauses differ from the old SCCs and what that means for your cross-border data transfer options.

116
116
article thumbnail

Microsoft Discovers New Privilege Escalation Flaws in Linux Operating System

The Hacker News

Microsoft on Tuesday disclosed a set of two privilege escalation vulnerabilities in the Linux operating system that could potentially allow threat actors to carry out an array of nefarious activities.

98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Emotet malware now installs via PowerShell in Windows shortcut files

Bleeping Computer

The Emotet botnet is now using Windows shortcut files (.LNK) containing PowerShell commands to infect victims computers, moving away from Microsoft Office macros that are now disabled by default. [.].

Malware 98
article thumbnail

How Low-code Application Development and Identity Management Work Together

Security Boulevard

The post How Low-code Application Development and Identity Management Work Together appeared first on Strata.io. The post How Low-code Application Development and Identity Management Work Together appeared first on Security Boulevard.

98
article thumbnail

Google Play Store now forces apps to disclose what data is collected

Bleeping Computer

Google is rolling out a new Data Safety section on the Play Store, Android's official app repository, where developers must declare what data their software collects from users of their apps. [.].

article thumbnail

What You Need to Scale AppSec

Security Boulevard

Security is a dilemma for many leaders. On the one hand, it is largely recognized as an essential feature. On the other hand, it does not drive business. Of course, as we mature, security can become a business enabler. But the roadmap is unclear. With the rise of Agile practices, DevOps and the cloud, development. The post What You Need to Scale AppSec appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

New Nimbuspwn Linux vulnerability gives hackers root privileges

Bleeping Computer

A new set of vulnerabilities collectively tracked as Nimbuspwn could let local attackers escalate privileges on Linux systems to deploy malware ranging from backdoors to ransomware. [.].

article thumbnail

ONUG Group Taps TriggerMesh to Advance Cloud Security

Security Boulevard

A Cloud Security Notifications Framework (CSNF) being advanced by the Automated Cloud Governance (ACG) Working Group, an arm of the Open Network User Group (ONUG), today announced it has adopted a data format developed by TriggerMesh to make it simpler to normalize events generated by a wide range of security tools and platforms. The ONUG. The post ONUG Group Taps TriggerMesh to Advance Cloud Security appeared first on Security Boulevard.

article thumbnail

Hackers exploit critical VMware RCE flaw to install backdoors

Bleeping Computer

Advanced hackers are actively exploiting a critical remote code execution (RCE) vulnerability, CVE-2022-22954, that affects in VMware Workspace ONE Access (formerly called VMware Identity Manager). [.].

98
article thumbnail

Obama speaks at Stanford University on strengthening our democracy and reforming social media

Security Boulevard

Last week, Barack Obama delivered a keynote address at an event, “ Challenges to Democracy in the Digital Information Realm ”, co-hosted by The Stanford Cyber Policy Center and the Obama Foundation. The in-person event had more than 250,000 people in attendance, and it was also streamed online. . The post Obama speaks at Stanford University on strengthening our democracy and reforming social media appeared first on Security Boulevard.

Media 98
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Coca-Cola investigates hackers' claims of breach and data theft

Bleeping Computer

Coca-Cola, the world's largest soft drinks maker, has confirmed in a statement to BleepingComputer that it is aware of the reports about a cyberattack on its network and is currently investigating the claims. [.].

article thumbnail

GUEST ESSAY: A call to blur the lines between cybersecurity training, up-skilling and higher ed

Security Boulevard

In a recent survey of US-based CEOs, talent shortages and cybersecurity were listed as two of the top five business concerns in 2022. Related: Cultivating ‘human sensors’. They may not entirely realize that when compounded, these two concerns could pose … (more…). The post GUEST ESSAY: A call to blur the lines between cybersecurity training, up-skilling and higher ed appeared first on Security Boulevard.

article thumbnail

Anomaly Six, a US surveillance firm that tracks roughly 3 billion devices in real-time

Security Affairs

An interesting article published by The Intercept reveals the secretive business of a US surveillance firm named Anomaly Six. When we speak about the secretive business of surveillance businesses we often refer to the powerful tools developed by Israeli firms like NSO Group and Candiru , but many other firms operates in the shadow like the US company Anomaly Six (aka A6).

article thumbnail

Emotet Testing New Delivery Ideas After Microsoft Disables VBA Macros by Default

The Hacker News

The threat actor behind the prolific Emotet botnet is testing new attack methods on a small scale before co-opting them into their larger volume malspam campaigns, potentially in response to Microsoft's move to disable Visual Basic for Applications (VBA) macros by default across its products.

94
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Stormous ransomware gang claims to have hacked Coca-Cola

Security Affairs

The Stormous ransomware gang claims to have hacked the multinational beverage corporation Coca-Cola Company. The Stormous ransomware gang announced with a post on its leak site to have hacked the multinational beverage corporation Coca-Cola Company. The extortion group announced to have hacked some servers of the company and stole 161GB. The group recently launched a poll asking members of its Telegram channel to choose the next company to target and Coca-Cola was the most voted firm. “ Si

Hacking 95
article thumbnail

NPM Bug Allowed Attackers to Distribute Malware as Legitimate Packages

The Hacker News

A "logical flaw" has been disclosed in NPM, the default package manager for the Node.js JavaScript runtime environment, that enables malicious actors to pass off rogue libraries as legitimate and trick unsuspecting developers into installing them. The supply chain threat has been dubbed "Package Planting" by researchers from cloud security firm Aqua.

Malware 94
article thumbnail

American Dental Association hit by new Black Basta ransomware

Bleeping Computer

The American Dental Association (ADA) was hit by a weekend cyberattack, causing them to shut down portions of their network while investigating the attack. [.].

article thumbnail

Iran-linked APT Rocket Kitten exploited VMware bug in recent attacks

Security Affairs

The Iran-linked APT group Rocket Kitten has been observed exploiting a recently patched CVE-2022-22954 VMware flaw. Iran-linked Rocket Kitten APT group has been observed exploiting a recently patched CVE-2022-22954 VMware Workspace ONE Access flaw to deploy ‘Core Impact’ Backdoor. The CVE-2022-22954 vulnerability is a server-side template injection remote code execution issue, it was rated 9.8 in severity.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Public interest in Log4Shell fades but attack surface remains

Bleeping Computer

It's been four months since Log4Shell, a critical zero-day vulnerability in the ubiquitous Apache Log4j library, was discovered, and threat analysts warn that the application of the available fixes is still way behind. [.].

91
article thumbnail

Iranian Hackers Exploiting VMware RCE Bug to Deploy 'Core Impact' Backdoor

The Hacker News

An Iranian-linked threat actor known as Rocket Kitten has been observed actively exploiting a recently patched VMware vulnerability to gain initial access and deploy the Core Impact penetration testing tool on vulnerable systems. Tracked as CVE-2022-22954 (CVSS score: 9.

article thumbnail

Cyber Attack on French hospitals and Helsinki Hotel

CyberSecurity Insiders

A spokesperson from Nordic Hotels & Resorts released a press statement yesterday that personal details of about 15k customers belonging to Helsinki Hotel were accessed by hackers via a cyber attack as the details were compromised from a reservation system also used by Hotel Kamp and F6 Hotel. As per the prima facie, the attack took place in the second week of February and the unauthorized access was identified on April 9th, 2022.

article thumbnail

Log4j Attack Surface Remains Massive

Dark Reading

Four months after the Log4Shell vulnerability was disclosed, most affected open source components remain unpatched, and companies continue to use vulnerable versions of the logging tool.

88
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.