Fri.Aug 13, 2021

article thumbnail

Using AI to Scale Spear Phishing

Schneier on Security

The problem with spear phishing it that it takes time and creativity to create individualized enticing phishing emails. Researchers are using GPT-3 to attempt to solve that problem: The researchers used OpenAI’s GPT-3 platform in conjunction with other AI-as-a-service products focused on personality analysis to generate phishing emails tailored to their colleagues’ backgrounds and traits.

Phishing 328
article thumbnail

Weekly Update 256

Troy Hunt

Well this week went on for a bit, an hour and 6 mins in all. The 2 Apple things were particularly interesting due to the way in which both catching CSAM baddies and catching baddies who steal your things involves using technology that can be abused. Is it good tech because it can do good things? Bad tech because it can do bad things? Or is tech just morally neutral and we need to look at it more holistically?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Anti Anti-Money Laundering Services for Crooks

Krebs on Security

A new dark web service is marketing to cybercriminals who are curious to see how their various cryptocurrency holdings and transactions may be linked to known criminal activity. Dubbed “ Antinalysis,” the service purports to offer a glimpse into how one’s payment activity might be flagged by law enforcement agencies and private companies that try to link suspicious cryptocurrency transactions to real people.

article thumbnail

Excel is still a security headache after 30 years because of this one feature

Tech Republic Security

Threat researcher explains why it's tricky to tell the difference between legitimate Excel Macros and ones that deliver malware.

Malware 218
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Windows 365 exposes Microsoft Azure credentials in plaintext

Bleeping Computer

A security researcher has figured out a way to dump a user's unencrypted plaintext Microsoft Azure credentials from Microsoft's new Windows 365 Cloud PC service using Mimikatz. [.].

145
145
article thumbnail

How to install Webmin on Rocky Linux

Tech Republic Security

With Webmin, you can better secure and manage your instances of Rocky Linux. Jack Wallen walks you through the process of getting this web-based tool up and running.

185
185

More Trending

article thumbnail

A diverse cybersecurity team can help alleviate the talent shortage

Tech Republic Security

Responsibilities are complex and require different job descriptions, reduced bias and a variety of skill sets, industry leaders say.

article thumbnail

6 risk factors to know when hiring an MSSP

CSO Magazine

With enterprise adoption of managed security services gradually maturing, the rewards and risks of using these services have become a lot clearer for current and potential customers. A recent survey by Forrester Research of 140 MSSP customers found some organizations are leveraging third-party security providers successfully while many others are struggling to extract value from their relationships. [ Keep up with 8 hot cyber security trends (and 4 going cold).

Risk 138
article thumbnail

Company size is a nonissue with automated cyberattack tools

Tech Republic Security

Even with plenty of old problems to contend with, an expert suggests security pros need to get ready for new and more powerful automated ransomware tools.

article thumbnail

SynAck ransomware gang releases master decryption keys for old victims

Security Affairs

The SynAck ransomware gang released the master decryption keys for their operations and rebranded as a new group dubbed El_Cometa group. Good news for the victims of the SynAck ransomware gang, the group released the master decryption keys to allow victims to decrypt their files for free. The gang has now rebranded as the new El_Cometa group. The news was first reported by TheRecord website, the master decryption keys work for victims that were infected between July 2017 and early 2021. “T

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Investment Firm Built Own SIEM. Here’s How

eSecurity Planet

SIEM solutions can be expensive and difficult to manage, so one company built its own – and is pleased with the results. At last week’s Black Hat USA, NYC-based financial technology firm Two Sigma Investments took the virtual stage to outline why their existing solution didn’t cut it, the work needed to create an in-house security information and event management (SIEM) system, and the project’s implications.

article thumbnail

Millions of home routers on Mirai Botnet Radar

CyberSecurity Insiders

According to a research carried out by Maryland based Cybersecurity firm Tenable, hackers are targeting millions of home routers to add them to the Mirai botnet radar that is used to launch DDoS Cyber attack campaigns. Tenable researchers claim hackers are exploiting a security flaw termed authentication-bypass vulnerability that is impact routers and internet of things (IoT) devices.

Firmware 136
article thumbnail

What is zero trust security?

Tech Republic Security

Want a zero-trust security primer on this complex cybersecurity topic? Brandon Vigliarolo breaks it down for you.

article thumbnail

How Has CAP Certification Evolved to Lead in Risk Management?

CyberSecurity Insiders

Fourth Industrial Revolution technologies like artificial intelligence, IoT, 5G networks, cloud and blockchain have the potential to increase operational efficiencies and boost economic growth, but they could also increase cyber risk, resulting in forecast losses of $6 trillion USD this year, according The Global Risks Report 2020 from the World Economic Forum.

Risk 126
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Opsec examples: 6 spectacular operational security failures

CSO Magazine

Every day, most of us leave trails of online breadcrumbs behind us, disconnected pieces of data that a determined sleuth could connect to learn about our activities and perhaps break through our veil of anonymity. The struggle to prevent attackers from putting these puzzle pieces together is known as operational security (opsec). Most of us don't think too much about all this: nobody's trying to track us down, and if they did, the consequences wouldn't be too worrisome.

Media 125
article thumbnail

Why Is There A Surge In Ransomware Attacks?

The Hacker News

The U.S. is presently combating two pandemics--coronavirus and ransomware attacks. Both have partially shut down parts of the economy. However, in the case of cybersecurity, lax security measures allow hackers to have an easy way to rake in millions.

article thumbnail

BrandPost: Everything SMBs Need to Know About Ransomware in 2021

CSO Magazine

Ransomware attacks on large enterprises like Colonial Pipeline dominate the headlines. But did you know small and medium-size businesses (SMBs) account for at least half of all ransomware attacks, if not closer to two-thirds, according to the U.S. Department of Homeland Security? 1 In fact, ransomware is the most common cyberthreat that SMBs face. 2 Before we get into why SMBs are prime targets for attacks, it’s important to understand who these cyberattackers are, how they operate, and why they

article thumbnail

Week in security with Tony Anscombe

We Live Security

How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Vice Society ransomware also exploits PrintNightmare flaws in its attack

Security Affairs

Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice Society ransomware operators are actively exploiting Windows print spooler PrintNightmare vulnerability in their attacks against Windows servers. The PrintNightmare flaws (tracked as ( CVE-2021-1675 , CVE-2021-34527 , and CVE-2021-36958 ) reside in the Windows Print Spooler service, print drivers, and the Windows Point and Print feature.

article thumbnail

AlphaBay Darknet Market Rises from the Dead

Heimadal Security

The administrator that relaunched the dark web market plans to set up a platform that can be used for darknet markets that want to have shops while remaining anonymous. Some History on AlphaBay AlphaBay darknet market was launched in 2014 and became the largest darknet market, until law enforcement managed to take it down on July […]. The post AlphaBay Darknet Market Rises from the Dead appeared first on Heimdal Security Blog.

Marketing 119
article thumbnail

The Applied Use of AI & Machine Learning in Cybersecurity

Security Boulevard

In this first article in a three-part series, we look at machine learning and artificial intelligence and show how it can help modern cybersecurity solutions such as ARIA ADR detect and stop cyberattacks. Stay tuned for future articles that highlight specific machine learning and AI use cases. The post The Applied Use of AI & Machine Learning in Cybersecurity appeared first on Security Boulevard.

article thumbnail

GitHub Expresses Disapproval of Account Password Authentication for Git Operations

Heimadal Security

According to the cloud-based hosting service provider GitHub, as of August 13th, 2021, account passwords are no longer accepted for validating Git operations. The announcement is not new as in July 2020 GitHub declared that all authenticated Git operations will necessitate the use of a private access token, OAuth token, or SSH key. As they […].

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

VPN Test: How to check if your VPN is working or not

Malwarebytes

The primary function of a Virtual Private Network (VPN) is to enhance your online privacy and security. It should do this without slowing your Internet too noticeably. Performing a VPN test or two can help you ensure that it’s up to the mark. VPN privacy test. Your Internet Service Provider (ISP) assigns a unique IP address to your router, the device that connects the computers, phones, and tablets in your house to the Internet.

VPN 107
article thumbnail

How to Enhance Your Home Network Security

Heimadal Security

The only measure most people use to protect their home wireless network nowadays is to set up a password and prevent neighbors and other people from taking control of your data. But we have to be more serious about home network security and do more than just setting a simple password. Securing the home network has […]. The post How to Enhance Your Home Network Security appeared first on Heimdal Security Blog.

article thumbnail

SynAck ransomware releases decryption keys after El_Cometa rebrand

Bleeping Computer

The SynAck ransomware gang released the master decryption keys for their operation after rebranding as the new El_Cometa group. [.].

article thumbnail

Cyberbullying 101: A Primer for kids, teens, and parents

Malwarebytes

At some point in our lives, we have likely either been bullied, stood back and watched others bullying, or participated in the act. Playing the role of offender, offended, and by-stander has become easier, thanks to the Internet and the technologies that make it possible to keep up connected. In this article, we aim to arm you with the basics. From there you can decide for yourself if you want to further expand your knowledge so you know what to do to help someone—a family, a peer—who might be i

Media 108
article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection

The Hacker News

Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials.

Phishing 112
article thumbnail

Crypto-scams you should be steering clear of in 2021

Malwarebytes

A fair few cryptocurrency scams have been doing the rounds across 2021. Most of them are similar if not identical to tactics used in previous years with an occasional twist. Here’s some of the most visible ones you should be steering clear of. Recovery code theft. Many Bitcoin wallets make use of something called recovery codes. These are, as the name suggests, codes allowing you to regain access to wallets you’ve locked yourself out of.

Scams 107
article thumbnail

Discovered Tablet Confirms Russian Covert Action in Libya

Security Boulevard

When you lose your device, be it a laptop, tablet or phone, what have you lost? That is the question every CISO should be encouraging employees to ask as they provision and maintain devices that contain sensitive information. The Wagner Group no doubt wishes their mercenaries were asking that question, given the recent revelation from. The post Discovered Tablet Confirms Russian Covert Action in Libya appeared first on Security Boulevard.

CISO 111
article thumbnail

Phishing campaign goes old school, dusts off Morse code

Malwarebytes

In an extensive report about a phishing campaign , the Microsoft 365 Defender Threat Intelligence Team describes a number of encoding techniques that were deployed by the phishers. And one of them was Morse code. While Morse code may seem like ancient communication technology to some, it does have a few practical uses in the modern world. We just didn’t realize that phishing campaigns was one of them!

Phishing 104
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.