Wed.Mar 15, 2023

article thumbnail

Microsoft Patch Tuesday, March 2023 Edition

Krebs on Security

Microsoft on Tuesday released updates to quash at least 74 security bugs in its Windows operating systems and software. Two of those flaws are already being actively attacked, including an especially severe weakness in Microsoft Outlook that can be exploited without any user interaction.

Passwords 224
article thumbnail

Humans are still better at creating phishing emails than AI — for now

Tech Republic Security

AI-generated phishing emails, including ones created by ChatGPT, present a potential new threat for security professionals, says Hoxhunt. The post Humans are still better at creating phishing emails than AI — for now appeared first on TechRepublic.

Phishing 196
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI: Investment Scams Surpass BEC as Most Costly Cybercrime

SecureWorld News

Alright, how many of you saw a cryptocurrency ad on TV in 2022? Oh, yeah, everyone did. How many of you acted on those ads and actually purchased crypto? Probably some of you. Now the important question: how many of you got scammed in some sort of way by cryptocurrency or another type of investment?

Scams 127
article thumbnail

Get 3 years of rock-solid protection with Surfshark VPN for $83.99

Tech Republic Security

The service is rated at 8/10 stars by The VPN Lab. The post Get 3 years of rock-solid protection with Surfshark VPN for $83.99 appeared first on TechRepublic. Security Tech & Work surfshark vpn virtual private network VPN

VPN 128
article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the foundational elements you need to start or validate your ERM program. He will also dive into topic definitions, governance structures, and framework components for success.

article thumbnail

PCI SSC Announces 2023 Special Interest Group Election Results

PCI perspectives

Following its annual Special Interest Group (SIG) election process, the PCI Security Standards Council has confirmed the winning SIG topic for 2023. The Council’s Participating Organizations voted to select “Scoping and Segmentation for Modern Network Architectures” as the focus for the year ahead.

article thumbnail

For credentials, these are the new Seven Commandments for zero trust

Tech Republic Security

With backing from major firms, credential security company Beyond Identity has launched the Zero Trust Authentication initiative for organizations to hack-proof user credentials. The post For credentials, these are the new Seven Commandments for zero trust appeared first on TechRepublic.

More Trending

article thumbnail

Electronic data disposal policy

Tech Republic Security

Media 116
article thumbnail

Identity theft of 225,000 customers takes place at Latitude Financial Services

CyberSecurity Insiders

Australian firm Latitude Financial Services is hitting news headlines as a cyber attack on its servers has led to the data breach of 225,000 customers. Among the stolen data, a majority of the documents are related to driving licenses, employee login details, and such. The company which has over 2.8

article thumbnail

Turbulence In Banking: Navigating the Cyber Risk

Security Boulevard

With recent events involving Silicon Valley Bank and Signature Bank fresh in our minds, investors and financial institutions both big and small are looking to reduce exposure and risk. The post Turbulence In Banking: Navigating the Cyber Risk appeared first on Security Boulevard.

article thumbnail

Microsoft SmartScreen vulnerability delivers Magniber Ransomware

CyberSecurity Insiders

Cyber Criminals are smartly exploiting SmartScreen bugs in the Microsoft software to deliver Magniber Ransomware. And so far, the infection spread to thousands of devices, as the Windows operating giant in advance issued no red flag alerts.

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Join this exclusive webinar with Dr. Karen Hardy, where she will explore the power of storytelling in risk communication as a core component of a resilient organization's management framework!

article thumbnail

Raising Awareness of Connected Device Security

Security Boulevard

October is officially cybersecurity awareness month, originally designated back in 2004 by United States President George W. Bush and Congress to raise awareness of the growing cybersecurity threat landscape that affects businesses, the government and individuals.

article thumbnail

A look at CVE-2023–23415?—?a Windows ICMP vulnerability + mitigations which is not a cyber meltdown

DoublePulsar

Yesterday Microsoft dropped a patch for a vulnerability found by @hexnomad. It’s a great vuln, in theory allowing code… Continue reading on DoublePulsar » cybersecurity-news vulnerability

article thumbnail

Microsoft’s 2023 Patch Tuesday Fixes Two Actively Exploited Zero-Days

Security Boulevard

Microsoft’s March Patch Tuesday provided fixes for a total of 83 vulnerabilities, including two actively exploited zero-days. Here’s what you need to know. What is the situation?

98
article thumbnail

This Is the New Leader of Russia's Infamous Sandworm Hacking Unit

WIRED Threat Level

Evgenii Serebriakov now runs the most aggressive hacking team of Russia’s GRU military spy agency. To Western intelligence, he’s a familiar face. Security Security / Cyberattacks and Hacks Security / National Security

Hacking 98
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Privacy Challenges Illustrated by Recent Cases

Security Boulevard

In the 1973 baseball melodrama Bang the Drum Slowly, the players, intent on scamming some rubes, play a card game called “TEGWAR.” It stands, as you later learn, for ‘The Exciting Game Without Any Rules.’ ’ Three recent unrelated events in the news this week illustrate how U.S.

Scams 98
article thumbnail

Meet Data Privacy Mandates With Cybersecurity Frameworks

Dark Reading

Protection laws are always evolving. Here's how you can streamline your compliance efforts

article thumbnail

The Comprehensive Value of Investing in Both Cybersecurity and Cyber Insurance

Security Boulevard

With ransomware attacks, social engineering, and data breaches at an all-time high, terms like “cybersecurity” and “cyber insurance” are being thrown around in conversation more than ever before. But what, in practice, do they mean – and how are the two intertwined?

article thumbnail

Cyberattackers Continue Assault Against Fortinet Devices

Dark Reading

Patched earlier this month, a code-execution vulnerability is the latest FortiOS weakness to be exploited by attackers, who see the devices as well-placed targets for initial access operations

94
article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

Palo Alto Networks Uses Machine Learning to Reduce SASE Costs

Security Boulevard

Palo Alto Networks today revealed it is using artificial intelligence to automate the management of its secure access service edge (SASE) platform.

article thumbnail

A Spy Wants to Connect With You on LinkedIn

WIRED Threat Level

Russia, North Korea, Iran, and China have been caught using fake profiles to gather information. But the platform’s tools to weed them out only go so far. Security Security / Cyberattacks and Hacks Security / National Security

Hacking 92
article thumbnail

Dell Adds CrowdStrike to Cybersecurity Services Portfolio

Security Boulevard

Dell Technologies today announced an alliance with CrowdStrike as part of a larger initiative to expand the cybersecurity services it provides. Under the terms of the alliance with CrowdStrike, Dell has agreed to resell the CrowdStrike Falcon platform to customers.

article thumbnail

5 Best Residential Proxy Providers

SecureBlitz

If you’re shopping for a residential proxy provider, this is your 101 on how to choose the best provider. First: What is a residential proxy? A residential proxy address is an IP address assigned to a home device or computer connected to the internet through an Internet Service Provider.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Deep web vs. dark web: What businesses should know about both

Security Boulevard

The everyday internet presents a variety of risks for businesses and consumers. Identity theft and unauthorized purchases incite the greatest concern, but they aren’t the only—or even most expensive—types of fraud that impact online commerce.

article thumbnail

Important Considerations For Developing A Cybersecurity Strategy

SecureBlitz

This post will show you the important considerations for developing a cybersecurity strategy. With the growing dependence on technology to streamline operations, businesses and organizations have become more conscious of the importance of cybersecurity.

article thumbnail

SMBs Orgs Want Help, but Cybersecurity Expertise Is Scarce

Dark Reading

Smaller firms are boosting cybersecurity budgets, but there's a long way to go to address a deep lack of cyber preparedness among SMBs

article thumbnail

Key aerospace player Safran Group leaks sensitive data

Security Affairs

Top aviation company Safran Group left itself vulnerable to cyberattacks, likely for well over a year, underlining how vulnerable big aviation firms are to threat actors, according to research by Cybernews.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

GoatRAT Android Banking Trojan Targets Mobile Automated Payment System

Dark Reading

The new malware was discovered targeting three banks in Brazil

Banking 82
article thumbnail

Security Firm Rubrik breached by Clop gang through GoAnywhere Zero-Day exploitation

Security Affairs

Data security firm Rubrik discloses a data breach, attackers exploited recent GoAnywhere zero-day to steal its data.

Banking 79
article thumbnail

Why Security Practitioners Should Understand Their Business

Dark Reading

The sooner CISOs become proactive in understanding the flip side of the organizations they protect, the better they'll be at their jobs

CISO 79
article thumbnail

The World’s Real ‘Cybercrime’ Problem

WIRED Threat Level

From US state laws to the international stage, definitions of “cybercrime” remain vague, broad, and increasingly entrenched in our legal systems. Security Security / National Security Security / Cyberattacks and Hacks Security / Security News

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.