Tue.Sep 13, 2022

article thumbnail

FBI Seizes Stolen Cryptocurrencies

Schneier on Security

The Wall Street Journal is reporting that the FBI has recovered over $30 million in cryptocurrency stolen by North Korean hackers earlier this year. It’s only a fraction of the $540 million stolen, but it’s something. The Axie Infinity recovery represents a shift in law enforcement’s ability to trace funds through a web of so-called crypto addresses, the virtual accounts where cryptocurrencies are stored.

article thumbnail

Secure Access Service Edge: Trends and SASE companies to watch

Tech Republic Security

These five SASE companies are the leaders in their field. The post Secure Access Service Edge: Trends and SASE companies to watch appeared first on TechRepublic.

148
148
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Use-after-freedom: MiraclePtr

Google Security

Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of Chrome security issues and we’re continuing to investigate many solutions – both in C++ and in new programming languages. The most common type of memory safety bug is the “use-after-free”. We recently posted about an exciting series of technologies designed to prevent these.

article thumbnail

CFOs ignoring billions of dollars loss incurred through Cyber Risks

CyberSecurity Insiders

Chief Financial Officers aka CFOs are ignoring billions of dollars loss incurred through cyber risks and threats, says a survey. Interestingly, over 87% of survey respondents are over-confident that their companies can overcome any level of threats, although their current Cybersecurity posture was never tested to the core. The survey conducted financial risks evaluator Kroll states that in the past few months, beginning this year of 2022, over 71% of organizations suffered over 5 million financi

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

New GIFShell Attack Targets Microsoft Teams

eSecurity Planet

A cybersecurity consultant has discovered a new attack chain that leverages GIF images in Microsoft Teams to execute arbitrary commands on the target’s machine. The exploit uncovered by Bobby Rauch is dubbed “GIFShell,” and the main component is a GIF image that contains a hidden Python script. This crafted image is sent to a Microsoft Teams user to create a reverse shell.

article thumbnail

Apple fixed the eighth actively exploited zero-day this year

Security Affairs

Apple has addressed the eighth zero-day vulnerability that is actively exploited in attacks against iPhones and Macs since January. Apple has released security updates to fix a zero-day vulnerability, tracked as CVE-2022-32917, which is actively exploited in attacks against iPhone and Mac devices. This is the eighth zero-day vulnerability fixed by the IT giant since the start of the year. “An application may be able to execute arbitrary code with kernel privileges.” reads the advisor

Hacking 124

LifeWorks

More Trending

article thumbnail

Ransomware hackers adopting Intermittent Encryption

CyberSecurity Insiders

According to a study conducted by security firm SentinelOne, ransomware spreading hackers are adopting a new encryption standard named ‘Intermittent Encryption’ while targeting victims. And as per the update, now available on the company’s blog post, the new data locking technique is being embraced by more buyers and affiliates as they find it innovative and VFM.

article thumbnail

Spending time with the Girl Scouts of Greater Chicago at Northwest Indiana’s CampCEO

Webroot

Girl Scouts is proven to help girls thrive. A Girl Scout develops a strong sense of self, displays positive values, seeks challenges and learns from setbacks. I had the absolute honor of spending 3 days with the Girl Scouts in Chicago at the annual Camp CEO. Camp CEO is a chance for the Girl Scouts to meet, talk to, and connect with the mentors who attend.

Mobile 111
article thumbnail

Retbleed Security Fix Makes Linux go 70% Slower

Security Boulevard

The Linux kernel workaround for the ‘Retbleed’ vulnerability is causing a huge slowdown in tests of slightly old hardware. The post Retbleed Security Fix Makes Linux go 70% Slower appeared first on Security Boulevard.

article thumbnail

Important update! iPhones, Macs, and more vulnerable to zero-day bug

Malwarebytes

On Monday, Apple released a long list of patched vulnerabilities to its software, including a new zero-day flaw affecting Macs and iPhones. The company revealed it's aware that threat actors may have been actively exploiting this vulnerability, which is tracked as CVE-2022-32917. As it's a zero-day, nothing much is said about CVE-2022-32917, only that it may allow malformed applications to execute potentially malicious code with kernel privileges.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Trend Micro addresses actively exploited Apex One zero-day

Security Affairs

Trend Micro addressed multiple vulnerabilities in its Apex One endpoint security product, including actively exploited zero-day flaws. Trend Micro announced this week the release of security patches to address multiple vulnerabilities in its Apex One endpoint security product, including a zero-day vulnerability, tracked as CVE-2022-40139 (CVSS 3.0 SCORE 7.2), which is actively exploited.

article thumbnail

Why is my Wi?Fi slow and how do I make it faster?

We Live Security

Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible reasons along with a few quick fixes to speed things up. The post Why is my Wi‑Fi slow and how do I make it faster? appeared first on WeLiveSecurity.

98
article thumbnail

Cyber espionage campaign targets Asian countries since 2021

Security Affairs

A cyber espionage group targets governments and state-owned organizations in multiple Asian countries since early 2021. Threat actors are targeting government and state-owned organizations in multiple Asian countries as parts of a cyber espionage campaign that remained under the radar since early 2021. “A distinct group of espionage attackers who were formerly associated with the ShadowPad remote access Trojan (RAT) has adopted a new, diverse toolset to mount an ongoing campaign against a

article thumbnail

New PsExec spinoff lets hackers bypass network security defenses

Bleeping Computer

Security researchers have developed an implementation of the Sysinternals PsExec utility that allows moving laterally in a network using a less monitored port. [.].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Iran-linked TA453 used new Multi-Persona Impersonation technique in recent attacks

Security Affairs

Iran-linked threat actors target individuals specializing in Middle Eastern affairs, nuclear security and genome research. In mid-2022, Proofpoint researchers uncovered a cyberespionage campaign conducted by Iran-linked TA453 threat actors. The campaign aimed at individuals specializing in Middle Eastern affairs, nuclear security and genome research.

article thumbnail

JumpCloud Adds Decentralized Password Manager to Portfolio

Security Boulevard

JumpCloud Inc. this week launched a password manager that relies on an alternative approach that stores encrypted credentials locally on user devices and then synchronizes vaults between devices via servers in the cloud. Cate Lochead, chief marketing officer for JumpCloud, said JumpCloud Password Manager employs a decentralized architecture to manage and secure passwords independent of.

article thumbnail

Business Security Starts With Identity

Dark Reading

How identity-centric security can support business objectives.

98
article thumbnail

Apple Releases iOS and macOS Updates to Patch Actively Exploited Zero-Day Flaw

The Hacker News

Apple has released another round of security updates to address multiple vulnerabilities in iOS and macOS, including a new zero-day flaw that has been used in attacks in the wild. The issue, assigned the identifier CVE-2022-32917, is rooted in the Kernel component and could enable a malicious app to execute arbitrary code with kernel privileges.

98
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Yanluowang Ransomware Gang Leaked Cisco Stolen Data

Heimadal Security

The American technology giant, Cisco, confirmed that the data leaked by Yanluowang ransomware gang on September 11, 2022, is authentic. The data now released on the dark web was stolen in a cyberattack in May, this year. The company’s network has been breached through the VPN account of an employee. Cisco’s Take on the Attac In […]. The post Yanluowang Ransomware Gang Leaked Cisco Stolen Data appeared first on Heimdal Security Blog.

article thumbnail

Apple puts the password on life support with passkey

Malwarebytes

The "passwordless future" is something many internet users—and a great majority of the cybersecurity industry—have hoped for. Now Apple is about to make those hopes a reality. With the release of iOS 16 yesterday, and macOS Ventura next month, Apple fans will be able to use passkeys , its password replacement, for iPhones, iPads, and Macs.

article thumbnail

4 Problems with Password Managers Today

Security Boulevard

The four primary problems of password managers causing low adoption and other failures to achieve the desired security outcome are discussed below. The post 4 Problems with Password Managers Today appeared first on Security Boulevard.

article thumbnail

Steam account credentials phished in browser-in-a-browser attack

Malwarebytes

Steam users are once again under threat from a particularly sneaky tactic used to steal account details. As with so many Steam attacks currently, it accommodates for the possibility of users relying on Steam Guard Mobile Authentication for additional protection. It also makes use of a recent “browser within a browser” technique to harvest Steam credentials.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Misinformation and propaganda in the authoritarian internet

Security Boulevard

On my sixth birthday, my father gifted me a globe of the world. It is the best birthday present I have ever received. You see, I grew up in a cramped apartment in Baku, Azerbaijan. But even in our small corner of this world on the edge of the Soviet Empire behind the Iron Curtain, when my father and I read Stefan Zweig’s book on Magellan together, I could dream of the vast world beyond.

article thumbnail

U-Haul Customer Contract Search Tool Compromised

Dark Reading

Password compromise led to unauthorized access to a customer contract search tool over a five-month window, according to the company.

article thumbnail

Barracuda Networks Extends Cybersecurity and Data Protection Portfolio

Security Boulevard

At the Secured.22 virtual conference, Barracuda Networks announced it has added a range of capabilities that collectively tighten integration across its portfolio of cybersecurity and backup and recovery platforms. Brian Babineau, chief customer officer at Barracuda Networks, said the overall goal is to make it simpler to enforce zero-trust access policies and, in the event.

article thumbnail

Microsoft September 2022 Patch Tuesday fixes zero-day used in attacks, 63 flaws

Bleeping Computer

Today is Microsoft's September 2022 Patch Tuesday, and with it comes fixes for an actively exploited Windows vulnerability and a total of 63 flaws. [.].

97
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Implent Cloud Security Tools Now, Not Later

Security Boulevard

Two-thirds of organizations use the cloud to hold sensitive data or workloads, but there is a lingering lack of confidence about the ability to protect that information, according to research from the Cloud Security Alliance. And while more than a quarter of these organizations are using confidential computing to protect this sensitive information, more than.

Risk 97
article thumbnail

Update now! Google patches vulnerabilities for Pixel mobile phones

Malwarebytes

Google’s Pixel Update Bulletin for September included two security patches that are Pixel specific. Both underlying vulnerabilities are rated critical and could lead to privilege escalation and device takeover. The vulnerabilities. Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database.

Mobile 96
article thumbnail

Podcast: AI and Cybersecurity

Security Boulevard

In a recent podcast interview with Zack Hack, Host of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, discusses the latest views on AI and Cybersecurity. The podcast can be listened to in its entirety below. The post Podcast: AI and Cybersecurity appeared first on Security Boulevard.

article thumbnail

LinkedIn fake job offers and emails leading to Cyber Frauds

CyberSecurity Insiders

LinkedIn, a professional social networking website, has become a part of our daily lives as it not only allows us to promote a business but also allows to network, job hunt and recruit new talent. However, not all seems to be well with the said online business, as it has disturbed the lives of many professionals in the year 2021-2022. Cyber crooks are seen creating fake profiles to perform social engineering attacks on individuals and businesses.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!