Tue.Nov 28, 2023

article thumbnail

Digital Car Keys Are Coming

Schneier on Security

Soon we will be able to unlock and start our cars from our phones. Let’s hope people are thinking about security.

269
269
article thumbnail

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Tech Republic Security

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

San Francisco, Calif., Nov. 28, 2023 – AppDirect , the world’s leading B2B subscription commerce platform, today released key findings from its IT Business Leaders 2024 Outlook Report. The study, conducted by independent research firm Propeller Insights, dives into how IT business leaders feel about their security posture in a world where the technologies they embrace to grow and thrive are also vulnerable to constant and increasing threats.

article thumbnail

AWS Launches New Chips for AI Training and Its Own AI Chatbot

Tech Republic Security

At AWS re:Invent, NVIDIA contributed GPUs to Amazon's cloud efforts and added a retriever system to its AI Enterprise Software platform on AWS Marketplace.

Software 157
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

New BLUFFS attack lets attackers hijack Bluetooth connections

Bleeping Computer

Researchers at Eurecom have developed six new attacks collectively named 'BLUFFS' that can break the secrecy of Bluetooth sessions, allowing for device impersonation and man-in-the-middle (MitM) attacks. [.

137
137
article thumbnail

Just Published: PCI DSS v4.x Targeted Risk Analysis Guidance

PCI perspectives

Risk analysis is a foundational tool to help organizations identify and prioritize potential threats and vulnerabilities within their environment. PCI DSS v4.0 introduced the concept of targeted risk analysis (TRA) with two different types of TRAs to provide entities with the flexibility to evaluate risk and determine the security impact of specific requirement controls, as appropriate for their environment.

Risk 125

More Trending

article thumbnail

Daixin Team group claimed the hack of North Texas Municipal Water District

Security Affairs

The Daixin Team group claims to have hacked the North Texas Municipal Water District (US) and threatened to leak the stolen data. The North Texas Municipal Water District (NTMWD) is a regional water district that provides wholesale water, wastewater treatment, and solid waste services to a group of member cities and customers in North Texas, United States.

Hacking 124
article thumbnail

Hackers start exploiting critical ownCloud flaw, patch now

Bleeping Computer

Hackers are exploiting a critical ownCloud vulnerability tracked as CVE-2023-49103 that exposes admin passwords, mail server credentials, and license keys in containerized deployments. [.

Passwords 127
article thumbnail

Retail at risk: Top threats facing retailers this holiday season

We Live Security

While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them

Retail 123
article thumbnail

Google Chrome emergency update fixes 6th zero-day exploited in 2023

Bleeping Computer

Google has fixed the sixth Chrome zero-day vulnerability this year in an emergency security update released today to counter ongoing exploitation in attacks. [.

133
133
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

A Civil Rights Firestorm Erupts Around a Looming Surveillance Power Grab

WIRED Threat Level

Dozens of advocacy groups are pressuring the US Congress to abandon plans to ram through the renewal of a controversial surveillance program that they say poses an “alarming threat to civil rights.

article thumbnail

The Necessity of Security Best Practices When Implementing Generative AI

Security Boulevard

Generative AI can help maintain a competitive advantage, but organizations should be mindful of the security and data privacy challenges of a new deployment. The post The Necessity of Security Best Practices When Implementing Generative AI appeared first on Security Boulevard.

article thumbnail

Threat actors started exploiting critical ownCloud flaw CVE-2023-49103

Security Affairs

Threat actors started exploiting a critical ownCloud vulnerability (CVE-2023-49103) that can lead to sensitive information disclosure. ownCloud is an open-source software platform designed for file synchronization and sharing. It allows individuals and organizations to create their own private cloud storage services, giving them control over their data while facilitating collaboration and file access across multiple devices.

article thumbnail

iOS 17 NameDrop privacy scare: What you need to know

Graham Cluley

Warnings are spreading on social media about NameDrop, a new way for iPhone users to quickly share their contact information with others. Should you be worried, and what should you do about it? Read more in my article on the Hot for Security blog.

Media 114
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Google Chrome emergency update fixes 5th zero-day exploited in 2023

Bleeping Computer

Google has fixed the fifth Chrome zero-day vulnerability this year in an emergency security update released today to counter ongoing exploitation in attacks. [.

120
120
article thumbnail

Ringleader of Ransomware Group in Ukraine Arrested: Europol

Security Boulevard

The 32-year-old head of a threat group alleged to be responsible for ransomware attacks against corporations in 71 countries was arrested last week as part of a four-year investigation by European and U.S. law enforcement agencies. Arrested in Ukraine along with the unnamed ringleader were four other members of the group, which is accused of. The post Ringleader of Ransomware Group in Ukraine Arrested: Europol appeared first on Security Boulevard.

article thumbnail

International police operation dismantled a prominent Ukraine-based Ransomware group

Security Affairs

An international law enforcement operation dismantled the core of a ransomware group operating from Ukraine. A joint law enforcement operation led by Europol and Eurojust, with the support of the police from seven nations, has arrested in Ukraine the core members of a ransomware group. Today EUROPOL in conjunction with the Ukraine National Police arrested individuals operating a ransomware group out of Ukraine.

article thumbnail

AI Gets a Legal Gift for Thanksgiving

Security Boulevard

A federal court in San Fransisco addressed whether the training of AI infringes copyright, and the decision has interesting implications for the technology's future. The post AI Gets a Legal Gift for Thanksgiving appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Healthcare provider Ardent Health Services disclosed a ransomware attack

Security Affairs

The US Healthcare provider Ardent Health Services disclosed that it was the victim of a ransomware attack last week. Ardent Health Services is a healthcare company that operates hospitals and other medical facilities in the United States. It is a for-profit health system with a focus on acquiring, managing, and improving hospitals. Ardent Health Services is known for providing a range of healthcare services, including acute care, specialty care, and community health services.

article thumbnail

Defining Cyber Security Goals and Objectives: A Guide to Protecting Your Digital Empire

Security Boulevard

In an era where digital assets have become an integral part of business operations, the need for a comprehensive cybersecurity plan has never been more critical. The digital realm is fraught with risks, and organizations must prioritize achieving their cyber security goals, which include protecting their valuable information and systems from unauthorized access, breaches, and … Defining Cyber Security Goals and Objectives: A Guide to Protecting Your Digital Empire Read More » The post Defining C

Risk 109
article thumbnail

Elon Musk Is Giving QAnon Believers Hope Just in Time for the 2024 Elections

WIRED Threat Level

Musk’s recent use of the term “Q*Anon” is his most explicit endorsement of the movement to date. Conspiracists have since spent days dissecting its meaning and cheering on his apparent support.

105
105
article thumbnail

Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity

Security Boulevard

Securing your organization’s information systems is a top priority in the ever-evolving digital landscape. Organizations face an ongoing battle against cyber threats; penetration testing is a powerful weapon to avoid these risks. The National Institute of Standards and Technology (NIST) Penetration Testing Framework, known as “nist pen testing,” offers a robust and structured approach to … Mastering NIST Penetration Testing: Your Essential Guide to Robust Cybersecurity Read More » The post Maste

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Critical Vulnerabilities Found in Apache Superset: Upgrade Urged

Penetration Testing

In the world of data visualization and business intelligence, Apache Superset stands out as a modern, enterprise-ready web application. Renowned for its speed, lightness, and intuitive design, it empowers users across various skill levels... The post Critical Vulnerabilities Found in Apache Superset: Upgrade Urged appeared first on Penetration Testing.

article thumbnail

Another Look at Accountability in Cybersecurity

Security Boulevard

Cybersecurity incidents are more than availability problems Malicious actors are using the legal process to their advantage Personal liability for cybersecurity mishandling is becoming more common Cybersecurity incidents, once dismissed as minor disruptions, have evolved into significant threats with far-reaching consequences. Initially seen as temporary setbacks, their impact on business operations was underestimated.

article thumbnail

Zero-Day Alert: Google Chrome Under Active Attack, Exploiting New Vulnerability

The Hacker News

Google has rolled out security updates to fix seven security issues in its Chrome browser, including a zero-day that has come under active exploitation in the wild. Tracked as CVE-2023-6345, the high-severity vulnerability has been described as an integer overflow bug in Skia, an open source 2D graphics library.

105
105
article thumbnail

Microsoft shares temp fix for Outlook crashes when sending emails

Bleeping Computer

Today, Microsoft shared a temporary fix for a known issue causing Outlook Desktop to crash when sending emails from Outlook.com accounts. [.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Telegram’s Bans on Extremist Channels Aren't Really Bans

WIRED Threat Level

A WIRED analysis of more than 100 restricted channels shows these communities remain active, and content shared within them often spreads to channels accessible to the public.

Media 99
article thumbnail

DP World confirms data stolen in cyberattack, no ransomware used

Bleeping Computer

International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. However, no ransomware payloads or encryption was used in the attack. [.

article thumbnail

Ransomware gangs and Living Off the Land (LOTL) attacks: A deep dive

Malwarebytes

We’ve told you about ransomware-as-a-service (RaaS) gangs ; we’ve told you about living off the Land (LOTL) attacks. What do you get when you bring the two together? Bad news. Our recent report, Threat Brief: Ransomware Gangs & Living Off the Land Attacks , takes a deep dive into why the intersection of these two threats is so dangerous. Our Threat Brief details how LOTL attacks fit in the ransomware attack chain of major gangs Ransomware gangs use LOTL attacks to carry out their malicious a

article thumbnail

Qilin ransomware claims attack on automotive giant Yanfeng

Bleeping Computer

The Qilin ransomware group has claimed responsibility for a cyber attack on Yanfeng Automotive Interiors (Yanfeng), one of the world's largest automotive parts suppliers. [.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.