Mon.Nov 27, 2023

article thumbnail

Secret White House Warrantless Surveillance Program

Schneier on Security

There seems to be no end to warrantless surveillance : According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected of any crime, including victims.

article thumbnail

Google Drive users angry over losing months of stored data

Bleeping Computer

Google Drive users are reporting that recent files stored in the cloud have suddenly disappeared, with the cloud service reverting to a storage snapshot as it was around April-May 2023. [.

145
145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

We Live Security

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

Scams 127
article thumbnail

Microsoft deprecates Defender Application Guard for Office

Bleeping Computer

Microsoft is deprecating Defender Application Guard for Office and the Windows Security Isolation APIs, and it recommends Defender for Endpoint attack surface reduction rules, Protected View, and Windows Defender Application Control as an alternative. [.

128
128
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Security is an Economically Resilient Market: Strategies for Uncertain Times

Security Boulevard

Even in uncertain economic conditions, the need for safety and security create opportunities for security providers to grow. The post Security is an Economically Resilient Market: Strategies for Uncertain Times appeared first on Security Boulevard.

Marketing 127
article thumbnail

You Don’t Need to Turn Off Apple’s NameDrop Feature in iOS 17

WIRED Threat Level

Yes, your iPhone automatically turns on NameDrop with the latest software update. But you shouldn’t really be worried about it—regardless of what the police are saying.

Software 129

More Trending

article thumbnail

Meta Sued for Ignoring its Underage Kids Problem (Because Money)

Security Boulevard

Don’t be square: Newly-unsealed COPPA suit says Zuck’s mob knows full well there are loads of users under the age of 13, but did nothing. The post Meta Sued for Ignoring its Underage Kids Problem (Because Money) appeared first on Security Boulevard.

article thumbnail

Section 702 Surveillance Reauthorization May Get Slipped Into ‘Must-Pass’ NDAA

WIRED Threat Level

Congressional leaders are discussing ways to reauthorize Section 702 surveillance, including by attaching it to the National Defense Authorization Act, Capitol Hill sources tell WIRED.

article thumbnail

Ukraine’s intelligence service hacked Russia’s Federal Air Transport Agency, Rosaviatsia

Security Affairs

Ukraine’s intelligence service announced the hack of the Russian Federal Air Transport Agency, ‘Rosaviatsia.’ Ukraine’s intelligence service announced they have hacked Russia’s Federal Air Transport Agency, ‘Rosaviatsia.’ The attack is the result of a complex special cyber operation. “The Defence Intelligence of Ukraine informs that as a result of a successful complex special operation in cyberspace, a large volume of confidential documents of the

Hacking 118
article thumbnail

Ukraine says it hacked Russian aviation agency, leaks data

Bleeping Computer

Ukraine's intelligence service, operating under the Defense Ministry, claims they hacked Russia's Federal Air Transport Agency, 'Rosaviatsia,' to expose a purported collapse of Russia's aviation sector. [.

Hacking 117
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

Security Boulevard

In cybersecurity, keeping digital threats at bay is a top priority. A new ally in this battle is robotic process automation (RPA.) This technology promises to simplify tasks, boost accuracy and quicken responses. Related: Gen-A’s impact on DevSecOps Robotic process … (more…) The post GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity appeared first on Security Boulevard.

article thumbnail

Healthcare giant Henry Schein hit twice by BlackCat ransomware

Bleeping Computer

American healthcare company Henry Schein has reported a second cyberattack this month by the BlackCat/ALPHV ransomware gang, who also breached their network in October. [.

article thumbnail

Small Business Cybersecurity Hampered by Fear of Change, Judgement

Security Boulevard

Fear of making mistakes or being judged by colleagues keep SMBs from changing their cybersecurity behaviors, according to a Kaspersky survey. The post Small Business Cybersecurity Hampered by Fear of Change, Judgement appeared first on Security Boulevard.

article thumbnail

Slovenia's largest power provider HSE hit by ransomware attack

Bleeping Computer

Slovenian power company Holding Slovenske Elektrarne (HSE) has suffered a ransomware attack that compromised its systems and encrypted files, yet the company says the incident did not disrupt electric power production. [.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Guide to the IIoT Security [Industrial Internet of Things]

Security Boulevard

Often called the ‘industrial internet’ or ‘industry 4.0,’ specialists anticipate that IIoT security will play a significant role in the fourth industrial revolution. In the face of narrowing profit margins, escalating inflation, and fiercer competition than ever before, businesses are embracing digital transformation as a vital strategy to stay competitive in today’s dynamic market.

Internet 108
article thumbnail

How to Protect Your Product Design: IP Law & Security Tools

Digital Guardian

For many companies, patents, trademarks, and designs can be priceless, meaning if jeopardized, they could have far-ranging repercussions for owners. Protecting that IP is critical.

105
105
article thumbnail

General Electric, DARPA Hack Claims Raise National Security Concerns

Dark Reading

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

Hacking 122
article thumbnail

What You Need to Know About Apple’s NameDrop iOS17 Feature

Identity IQ

What You Need to Know About Apple’s NameDrop iOS17 Feature IdentityIQ Apple’s recent iOS17 update introduced NameDrop, enabling users to exchange contact information quickly and easily. While this feature offers unmatched convenience, it also has raised some safety concerns. Here is what you need to know about Apple’s NameDrop iOS17 feature.

Scams 104
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Rethinking shift left: How a lack of context creates unnecessary friction between AppSec and Developers

Security Boulevard

Shift Left… it’s a term used almost ubiquitously across application security by both security practitioners implementing programs, regardless of scale, as well as just about every vendor selling an application security solution. The idea that it’s faster, cheaper, and often easier to fix a security flaw when the code is being created (as opposed to later in the software development lifecycle (SDLC)) is widely accepted within the AppSec community.

Software 103
article thumbnail

Ardent hospital ERs disrupted in 6 states after ransomware attack

Bleeping Computer

Ardent Health Services, a healthcare provider operating 30 hospitals across five U.S. states, disclosed today that its systems were hit by a ransomware attack on Thursday. [.

article thumbnail

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Dark Reading

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

article thumbnail

Ransomware attack on indie game maker wiped all player accounts

Bleeping Computer

A ransomware attack on the "Ethyrial: Echoes of Yore" MMORPG last Friday destroyed 17,000 player accounts, deleting their in-game items and progress in the game. [.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Why IT teams should champion AI in the workplace, and deploy secure AI tools safely to their teams

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Glide. Thanks to the great team there for their support! AI technology is quickly finding it’s footing in the workplace. IT teams need to lead the charge on AI adoption at their companies to ensure it happens safely, securely, and successfully.

article thumbnail

How better key management can close cloud security gaps troubling US government (Part 1 of 2)

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government (Part 1 of 2) sparsh Tue, 11/28/2023 - 05:20 Bruce Schneier recently blogged : A bunch of networks, including US Government networks , have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key.

article thumbnail

Tracking the Trackers: For Better or Worse

SecureWorld News

Ever since the first GPS (Global Positioning Satellites) systems went live back in the early nineties, privacy experts have warned us about our diminishing rights. And while we have gained both safety and security as a result of this ability to globally track people and things, we seemed to have lost our true sense of privacy. I’ve been inventing devices that track these trackers for decades, mostly in an effort to assist law enforcement from becoming the victims of tracking themselves, and here

article thumbnail

Cyber Threats to Watch Out for in 2024

Dark Reading

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

CISA and NCSC Unveil Guidelines for Secure AI System Development

SecureWorld News

In a significant step forward to safeguard the digital landscape, the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom National Cyber Security Centre (NCSC) have jointly released the Guidelines for Secure AI System Development. These comprehensive guidelines aim to empower organizations worldwide to design, develop, deploy, and operate AI systems with cybersecurity at their core.

article thumbnail

CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines

Dark Reading

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

96
article thumbnail

Arachnophobic: How Duo Customers Can Respond to CISA’s Report on Scattered Spider

Duo's Security Blog

CISA recently published a report on Scattered Spider , a threat actor that has been increasingly active and impactful over the past year. The report is important reading for any security practitioner because, in addition to being a threat in and of itself, Scattered Spider has been a leading indicator showing how threat actors pivot into new techniques.

article thumbnail

Ardent Health Hospitals Disrupted After Ransomware Attack

Dark Reading

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.