Wed.Aug 14, 2024

article thumbnail

Texas Sues GM for Collecting Driving Data without Consent

Schneier on Security

Texas is suing General Motors for collecting driver data without consent and then selling it to insurance companies: From CNN : In car models from 2015 and later, the Detroit-based car manufacturer allegedly used technology to “collect, record, analyze, and transmit highly detailed driving data about each time a driver used their vehicle,” according to the AG’s statement.

Insurance 326
article thumbnail

Tesserent Offers Mental Health Tips for Australian CISOs

Tech Republic Security

Cybersecurity professionals are experiencing high levels of stress, which can have both business and personal implications. Here’s how they can improve their mental health.

CISO 187
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at eCrime 2024 in Boston, Massachusetts, USA. The event runs from September 24 through 26, 2024, and my keynote is on the 24th. The list is maintained on this page.

294
294
article thumbnail

Microsoft Patched 6 Actively Exploited Zero-Day Flaws

Tech Republic Security

Patch Tuesday brought updates for 90 security vulnerabilities, including patching severe remote code execution vulnerabilities and closing some doors in Chromium.

183
183
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Microsoft Patch Tuesday security updates for August 2024 addressed six actively exploited bugs

Security Affairs

Microsoft’s August 2024 Patch Tuesday addressed 90 vulnerabilities, including six that are actively exploited. Patch Tuesday security updates for August 2024 addressed 90 vulnerabilities in Microsoft products including Windows and Windows Components; Office and Office Components; NET and Visual Studio; Azure; Co-Pilot; Microsoft Dynamics; Teams; and Secure Boot and others, bringing the total to 102 when including third-party bugs.

article thumbnail

CBA’s x15ventures Set to Lead in Fintech AI Innovation

Tech Republic Security

CBA's x15ventures is transforming fintech AI with its Xccelerate program, boosting innovation and setting new industry benchmarks in AI technology.

LifeWorks

More Trending

article thumbnail

Rogue AI is the Future of Cyber Threats

Trend Micro

This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.

article thumbnail

UK Prime Minister Keir Starmer and Prince William deepfaked in investment scam campaign

Graham Cluley

Scammers are once again using deepfake technology to dupe unwary internet Facebook and Instagram users into making unwise cryptocurrency investments. AI-generated videos promoting fraudulent cryptocurrency trading platform Immediate Edge have used deepfake footage of British Prime Minister Sir Keir Starmer and His Royal Highness Prince William to reach an estimated 890,000 people via Meta's social media platforms.

article thumbnail

Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters

WIRED Threat Level

Researchers have discovered a way that would allow anyone with a few hundred dollars to hack into a wireless gear-shifting systems used by the top cycling teams for events like the Tour de France.

Wireless 138
article thumbnail

SolarWinds addressed a critical RCE in all Web Help Desk versions

Security Affairs

SolarWinds addressed a critical remote code execution vulnerability in its Web Help Desk solution for customer support. SolarWinds fixed a critical vulnerability, tracked as CVE-2024-28986 (CVSS score 9.8), in SolarWinds’ Web Help Desk solution for customer support. The flaw is a Java deserialization issue that an attacker can exploit to run commands on a vulnerable host leading to remote code execution.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

GitHub Vulnerability 'ArtiPACKED' Exposes Repositories to Potential Takeover

The Hacker News

A newly discovered attack vector in GitHub Actions artifacts dubbed ArtiPACKED could be exploited to take over repositories and gain access to organizations' cloud environments.

135
135
article thumbnail

Kootenai Health data breach impacted 464,000 patients

Security Affairs

Kootenai Health suffered a data breach impacting over 464,000 patients following a 3AM ransomware attack. Kootenai Health disclosed a data breach impacting over 464,088 patients following the leak of their personal information by the ThreeAM (3AM) ransomware gang. Kootenai Health is a healthcare organization based in Coeur d’Alene, Idaho. It is a regional medical center that provides a wide range of medical services, including emergency care, surgical services, cancer care, and specialized

article thumbnail

Black Basta-Linked Attackers Target Users with SystemBC Malware

The Hacker News

An ongoing social engineering campaign with alleged links to the Black Basta ransomware group has been linked to "multiple intrusion attempts" with the goal of conducting credential theft and deploying a malware dropper called SystemBC.

Malware 134
article thumbnail

CVE-2024-36877 in MSI Motherboards Opens Door to Code Execution Attacks, PoC Published

Penetration Testing

MSI, a leading manufacturer of computer hardware, has recently disclosed a critical vulnerability, tracked as CVE-2024-36877, that affects a wide range of its motherboards. The vulnerability, residing in the System... The post CVE-2024-36877 in MSI Motherboards Opens Door to Code Execution Attacks, PoC Published appeared first on Cybersecurity News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges

The Hacker News

A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and extradition of a Belarussian and Ukrainian dual-national believed to be associated with Russian-speaking cybercrime groups. Maksim Silnikau (aka Maksym Silnikov), 38, went by the online monikers J.P. Morgan, xxx, and lansky. He was extradited to the U.S.

article thumbnail

China-linked APT Earth Baku targets Europe, the Middle East, and Africa

Security Affairs

China-linked threat actor Earth Baku expanded its operations in Europe, the Middle East, and Africa starting in late 2022. China-linked APT group Earth Baku (a threat actor associated with APT41 ) has expanded its operations beyond the Indo-Pacific region to Europe, the Middle East, and Africa. Trend Micro researchers observed the APT targeting countries like Italy, Germany, UAE, and Qatar, and the group is suspected to have targeted also entities in Georgia and Romania.

article thumbnail

New Cyber Threat Targets Azerbaijan and Israel Diplomats, Stealing Sensitive Data

The Hacker News

A previously unknown threat actor has been attributed to a spate of attacks targeting Azerbaijan and Israel with an aim to steal sensitive data. The attack campaign, detected by NSFOCUS on July 1, 2024, leveraged spear-phishing emails to single out Azerbaijani and Israeli diplomats. The activity is being tracked under the moniker Actor240524.

article thumbnail

August Patch Pileup: Microsoft’s Zero-Day Doozy Dump

Security Boulevard

See These CVEs: Patch Tuesday—ten zero-days, seven Critical vulns, zero time to waste. The post August Patch Pileup: Microsoft’s Zero-Day Doozy Dump appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining

The Hacker News

Cybersecurity researchers have discovered a new variant of the Gafgyt botnet that's targeting machines with weak SSH passwords to ultimately mine cryptocurrency on compromised instances using their GPU computational power. This indicates that the "IoT botnet is targeting more robust servers running on cloud native environments," Aqua Security researcher Assaf Morag said in a Wednesday analysis.

Passwords 129
article thumbnail

Will GitOps Solve Configuration Security Issues? 

Security Boulevard

Rather than rely only on GitOps, teams should first implement AI and analytics capabilities to reduce human configuration security errors. The post Will GitOps Solve Configuration Security Issues? appeared first on Security Boulevard.

article thumbnail

Apple Breaks the Mold: iPhone NFC Opens to Third-Party Payments

Penetration Testing

For a long time, the iPhone’s NFC functionality was limited to Apple’s own Apple Pay for near-field communication payments. This restriction led to multiple complaints against Apple in the European... The post Apple Breaks the Mold: iPhone NFC Opens to Third-Party Payments appeared first on Cybersecurity News.

article thumbnail

Putting Threat Modeling Into Practice: A Guide for Business Leaders

Security Boulevard

By pushing past the hurdles that can make threat modeling challenging, business leaders can take full advantage of threat models to give their organizations a leg up in the battle against cyberattacks. The post Putting Threat Modeling Into Practice: A Guide for Business Leaders appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA Warns Critical Vulnerabilities in Vonets WiFi Bridge Devices, No Patch Available

Penetration Testing

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory detailing multiple critical vulnerabilities discovered in Vonets WiFi Bridge devices. These vulnerabilities, which could allow attackers to execute... The post CISA Warns Critical Vulnerabilities in Vonets WiFi Bridge Devices, No Patch Available appeared first on Cybersecurity News.

article thumbnail

We’re making it easier for you to protect your identity 

Malwarebytes

Things have changed in cybersecurity. Gone are the days when our only worry was downloading a virus. Now, 71% of people say having their data leaked and identity stolen is one of their biggest fears about being online. Sadly, they’re right to be concerned: Fraud losses hit $10 billion in 2023 (up 14% from 2022). But as the threats have evolved, so have we, and over the last year we’ve added products that protect your entire digital life.

article thumbnail

Microsoft Discovers Critical OpenVPN Vulnerabilities

eSecurity Planet

OpenVPN has long been a popular choice for creating secure point-to-point or site-to-site connections over the internet. Its open-source nature and robust encryption capabilities have made it a staple in many organizations’ and individuals’ security arsenals. However, a recent discovery by Microsoft researchers has unveiled a critical flaw in this widely trusted software.

article thumbnail

X accused of unlawfully using personal data of 60 million+ users to train its AI

Malwarebytes

In what may come as a surprise to nobody at all, there’s been yet another complaint about using social media data to train Artificial Intelligence (AI). This time the complaint is against X (formerly Twitter) and Grok, the conversational AI chatbot developed by Elon Musk’s company xAI. Grok is a large language model (LLM) chatbot able to generate text and engage in conversations with users.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

NIST Unveils Groundbreaking Post-Quantum Cryptography Standards

SecureWorld News

The U.S. National Institute of Standards and Technology (NIST) announced the finalization of three post-quantum cryptography standards, marking a significant milestone in the effort to secure digital communications against the looming threat of quantum computing. The new standards , developed over an eight-year period, are designed to withstand attacks from future quantum computers, which could potentially break current encryption methods within a decade.

CSO 113
article thumbnail

How to Augment Your Password Security with EASM

The Hacker News

Simply relying on traditional password security measures is no longer sufficient. When it comes to protecting your organization from credential-based attacks, it is essential to lock down the basics first. Securing your Active Directory should be a priority – it is like making sure a house has a locked front door before investing in a high-end alarm system.

Passwords 112
article thumbnail

DigiCert Acquires Vercara to Extend Cybersecurity Services

Security Boulevard

DigiCert today announced it is acquiring Vercara, a provider of Domain Name System (DNS) and distributed denial-of-service (DDoS) security services delivered via the cloud. The post DigiCert Acquires Vercara to Extend Cybersecurity Services appeared first on Security Boulevard.

DNS 112
article thumbnail

Your Gym Locker May Be Hackable

WIRED Threat Level

Security researchers say they’ve extracted digital management keys from select electronic lockers and revealed how they could be cloned.

Hacking 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!