Sun.Apr 14, 2024

article thumbnail

Weekly Update 395

Troy Hunt

Data breach verification: that seems like a good place to start given the discussion in this week's video about Accor. Watch the vid for the whole thing but in summary, data allegedly taken from Accor was published to a popular hacking forum and the headlines inevitably followed. However, per that story: Cybernews couldn’t confirm the authenticity of the data.

Retail 220
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking twice at RSA Conference 2024 in San Francisco. I’ll be on a panel on software liability on May 6, 2024 at 8:30 AM, and I’m giving a keynote on AI and democracy on May 7, 2024 at 2:25 PM. The list is maintained on this page.

Software 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deciphering Metrics: From NCAA Women’s Basketball to Cyber Trends

Lohrman on Security

Iowa’s Caitlin Clark clearly propelled NCAA women’s basketball viewership. But what do past numbers teach us about future expectations — in both basketball and cyber metrics?

174
174
article thumbnail

Critical PHP Vulnerabilities Patched: Update Immediately to Mitigate Attacks

Penetration Testing

The PHP development team has released urgent security patches for multiple vulnerabilities affecting versions 8.1.28, 8.2.18, and 8.3.6. These vulnerabilities, ranging from critical command injection flaws to potential account compromises, require immediate attention from... The post Critical PHP Vulnerabilities Patched: Update Immediately to Mitigate Attacks appeared first on Penetration Testing.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Canadian retail chain Giant Tiger data breach may have impacted millions of customers

Security Affairs

A threat actor claimed the hack of the Canadian retail chain Giant Tiger and leaked 2.8 million records on a hacker forum. A threat actor, who goes online with the moniker ShopifyGUY, claimed responsibility for hacking the Canadian retail chain Giant Tiger and leaked 2.8 million records on a hacker forum. Giant Tiger is a Canadian discount store chain that operates over 260 stores across Canada.

Retail 122
article thumbnail

Popular Text Editor Notepad++ Compromised in “WikiLoader” Malware Attack

Penetration Testing

A sophisticated malware campaign targeting the widely-used Notepad++ text editor has been uncovered by security researchers at AhnLab Security Emergency Response Center (ASEC). Dubbed “WikiLoader,” this attack demonstrates the alarming ingenuity of modern threat... The post Popular Text Editor Notepad++ Compromised in “WikiLoader” Malware Attack appeared first on Penetration Testing.

More Trending

article thumbnail

OpenTable won't add first names, photos to old reviews after backlash

Bleeping Computer

OpenTable has reversed its decision to show members' first names and profile pictures in past anonymous reviews after receiving backlash from members who felt it was a breach of privacy. [.

100
100
article thumbnail

Security Affairs newsletter Round 467 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.

article thumbnail

Espionage Campaign Returns: LightSpy Targets Southern Asia

Penetration Testing

The resurgence of the LightSpy mobile spyware campaign poses a renewed and alarming threat to individuals and organizations in Southern Asia, particularly those potentially connected to India. This sophisticated espionage toolkit, analyzed by the... The post Espionage Campaign Returns: LightSpy Targets Southern Asia appeared first on Penetration Testing.

article thumbnail

Medium bans AI-generated content from its paid Partner Program

Bleeping Computer

Medium is banning AI-generated content from its paid Partner program, notifying users that the new policy goes into effect on May 1, 2024. [.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

PurpleLab: Revolutionizing Cybersecurity Testing with Speed and Simplicity

Penetration Testing

What is PurpleLab? This solution will allow you to easily deploy an entire lab to create/test your detection rules, simulate logs, play tests, download and run malware and mitre attack techniques, restore the sandbox,... The post PurpleLab: Revolutionizing Cybersecurity Testing with Speed and Simplicity appeared first on Penetration Testing.

article thumbnail

Linux Backdoor Infection Scare, Massive Social Security Number Heist

Security Boulevard

In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor. The episode further delves into a cybersecurity incident where hackers stole 340,000 social security numbers from a […] The post Linux Backdoor Infection Scare, Massive Social Security Number Heist appeared first on Shared Security Podcast.

article thumbnail

Roku Experiences Second Data Breach Incident Affecting Over Half a Million Accounts

Penetration Testing

Streaming giant Roku has publicly acknowledged a second data breach incident impacting approximately 576,000 user accounts. This follows an initial breach in March 2024, compromising approximately 15,000 accounts. Credential Stuffing Remains the Prime Suspect... The post Roku Experiences Second Data Breach Incident Affecting Over Half a Million Accounts appeared first on Penetration Testing.

article thumbnail

Deciphering Metrics: From NCAA Women’s Basketball to Cyber Trends

Security Boulevard

Iowa’s Caitlin Clark clearly propelled NCAA women’s basketball viewership. But what do past numbers teach us about future expectations — in both basketball and cyber metrics? The post Deciphering Metrics: From NCAA Women’s Basketball to Cyber Trends appeared first on Security Boulevard.

63
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

USENIX Security ’23 – How to Bind Anonymous Credentials to Humans

Security Boulevard

Authors/Presenters: *Julia Hesse, Nitin Singh, Alessandro Sorniotti* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel. Permalink The post USENIX Security ’23 – How to Bind Anonymous Credentials to Humans appeared first on Security Boulevard.

article thumbnail

Scale Your Security with vCISO as a Service

Security Boulevard

Businesses of all sizes, from startups to established organizations, need robust cybersecurity measures to protect their data and infrastructure. However, building a best-in-class security program can be a challenge, especially for companies with limited resources or expertise. This is where […] The post Scale Your Security with vCISO as a Service appeared first on WeSecureApp :: Simplifying Enterprise Security.