Fri.Dec 09, 2022

article thumbnail

Security Vulnerabilities in Eufy Cameras

Schneier on Security

Eufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary. The company’s behavior is so egregious that ReviewGeek is no longer recommending them. This will be interesting to watch. If Eufy can ignore security researchers and the press without there being any repercussions in the market, others will follow suit.

Marketing 324
article thumbnail

Recognize the commonalities in ransomware attacks to avoid them

Tech Republic Security

Learn how your organization can use the MITRE ATT&CK framework to prevent data breaches, fines, and the loss of clients and customers induced by ransomware threats. The post Recognize the commonalities in ransomware attacks to avoid them appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Trespass Law

Schneier on Security

This article talks about public land in the US that is completely surrounded by private land, which in some cases makes it inaccessible to the public. But there’s a hack: Some hunters have long believed, however, that the publicly owned parcels on Elk Mountain can be legally reached using a practice called corner-crossing. Corner-crossing can be visualized in terms of a checkerboard.

Hacking 297
article thumbnail

Apple unveils new iMessage, Apple ID and iCloud security for high-value targets

Tech Republic Security

Tech firm aims to strengthen security for users and meet modern cyber threat challenges with new cybersecurity technology and end-to-end cloud encryption. The post Apple unveils new iMessage, Apple ID and iCloud security for high-value targets appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Preparing for 2023 and what lies in store for Endpoint Security

Cisco Security

A new year is almost upon us and as we look back on our accomplishments in 2022, we also look forward to helping our customers become more security resilient and be better prepared for 2023. As part of this forward-looking process, and with the help of Gartner Peer Insights, we surveyed 100 Security and IT professionals to understand their level of security maturity and obtain their perspective on the future.

145
145
article thumbnail

McAfee 2023 Threat Predictions

Tech Republic Security

2022 is almost over, and the threats seen during the year have built the foundations for 2023's threat landscape, according to McAfee. Cyber criminals will benefit from new technologies such as AI or Web3. The post McAfee 2023 Threat Predictions appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

Healthcare systems face a “royal” cybersecurity threat from new hacker group

Tech Republic Security

A new alert from the HHS warns of the Royal ransomware threat actor’s aim on the healthcare sector. The post Healthcare systems face a “royal” cybersecurity threat from new hacker group appeared first on TechRepublic.

article thumbnail

Antivirus and EDR solutions tricked into acting as data wipers

Bleeping Computer

A security researcher has found a way to exploit the data deletion capabilities of widely used endpoint detection and response (EDR) and antivirus (AV) software from Microsoft, SentinelOne, TrendMicro, Avast, and AVG to turn them into data wipers. [.].

Antivirus 143
article thumbnail

Experts devised a technique to bypass web application firewalls (WAF) of several vendors

Security Affairs

Claroty researchers devised a technique for bypassing the web application firewalls (WAF) of several vendors. Researchers at industrial and IoT cybersecurity firm Claroty devised an attack technique for bypassing the web application firewalls (WAF) of several industry-leading vendors. The technique was discovered while conducting unrelated research on Cambium Networks’ wireless device management platform.

Firewall 143
article thumbnail

TikTok Ban: Texas is Fourth State to Join; Indiana Sues

Security Boulevard

Four U.S. states have now banned TikTok on government workers’ devices. Plus, Indiana has sued the app’s owner. The post TikTok Ban: Texas is Fourth State to Join; Indiana Sues appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

CommonSpirit confirms data breach impacts 623K patients

Security Affairs

CommonSpirit Health confirmed that the October security breach resulted in the exposure of the personal data of 623,774 patients. In early October, Common Spirit , one of the largest hospital chains in the US, suffered a ransomware cyberattack that caused severe inconvenience to the facilities and to patients. The security breach led to delayed surgeries, hold-ups in patient care and forced the chain to reschedule doctor appointments across the country.

article thumbnail

Proactive Measures to Safeguard against the Ransomware Menace

Quick Heal Antivirus

Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort. The post Proactive Measures to Safeguard against the Ransomware Menace appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

article thumbnail

Pwn2Own Toronto 2022 Day 3: Participants earned nearly $1 million

Security Affairs

On the third day of the Zero Day Initiative’s Pwn2Own Toronto 2022 hacking competition, participants earned more than $250,000. On the third day of the Zero Day Initiative’s Pwn2Own Toronto 2022 hacking competition, participants earned more than $250,000 for demonstrating zero-day attacks against NAS devices, printers, smart speakers, routers, and smartphones.

Hacking 135
article thumbnail

What ChatGPT know about API Security?

Security Boulevard

There is no doubt that you heard about and seen the latest OpenAI’s brilliant called ChatGPT. It can write poems, speak many languages, answer questions, play chess, make code and impress everyone. In this post, we show a few more of how this AI model is good in cybersecurity, in particular in API Security implementations. [.]. The post What ChatGPT know about API Security?

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Xenomorph: What to know about this Android banking trojan

We Live Security

Xenomorph pilfers victims' login credentials for banking, payment, social media, cryptocurrency and other apps with valuable data. The post Xenomorph: What to know about this Android banking trojan appeared first on WeLiveSecurity.

Banking 119
article thumbnail

Federated Authentication vs. SSO: What’s the Difference?

Security Boulevard

If you’ve ever deployed a new application for your organization, you know first-hand the grumbling. The post Federated Authentication vs. SSO: What’s the Difference? appeared first on Axiad. The post Federated Authentication vs. SSO: What’s the Difference? appeared first on Security Boulevard.

article thumbnail

S3 Ep112: Data breaches can haunt you more than once! [Audio + Text]

Naked Security

Breaches, exploits, busts, buffer overflows and bug hunting - entertaining and educational in equal measure.

article thumbnail

A Guide to Addressing and Managing the SaaS Sprawl

Security Boulevard

The SaaS sprawl is occurring more and more in organizations, resulting in SaaS security risks. This article explains how to address and manage the SaaS sprawl. The post A Guide to Addressing and Managing the SaaS Sprawl appeared first on Security Boulevard.

Risk 118
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Samsung Galaxy S22 hacked in 55 seconds on Pwn2Own Day 3

Bleeping Computer

On the third day of Pwn2Own, contestants hacked the Samsung Galaxy S22 a fourth time since the start of the competition, and this time they did it in just 55 seconds. [.].

Hacking 113
article thumbnail

SaaS Identity Access Management for Shadow IT

Security Boulevard

Learn how to secure your vital organizational or personal data by understanding the role of identity access and management for SaaS applications. The post SaaS Identity Access Management for Shadow IT appeared first on Security Boulevard.

115
115
article thumbnail

Cisco discloses high-severity flaw impacting IP Phone 7800 and 8800 Series

Security Affairs

Cisco disclosed a high-severity flaw in its IP phones that can be exploited to gain remote code execution and conduct DoS attacks. Cisco disclosed a high-severity vulnerability, tracked as CVE-2022-20968, impacting its IP Phone 7800 and 8800 Series (except Cisco Wireless IP Phone 8821). An unauthenticated, adjacent attacker can trigger the flaw to cause a stack overflow on an affected device leading to remote code execution and denial of service (DoS) attacks.

Wireless 112
article thumbnail

Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls

The Hacker News

A new attack method can be used to circumvent web application firewalls (WAFs) of various vendors and infiltrate systems, potentially enabling attackers to gain access to sensitive business and customer information.

Firewall 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Will TikTok Make Good on Privacy Promises?

Security Boulevard

TikTok has a problem. Researchers continue to turn up oddities with respect to the storage of user data/information. The timing, of course, is precarious for TikTok, as they are under review by the Committee on Foreign Investment in the United States (CFIUS) and calls are being made by members of Congress to ban the TikTok. The post Will TikTok Make Good on Privacy Promises?

article thumbnail

Diamond industry under attack – Week in security with Tony Anscombe

We Live Security

ESET researchers uncover a new wiper and its execution tool, both attributed to the Iran-aligned Agrius APT group. The post Diamond industry under attack – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

107
107
article thumbnail

Crikey! Not Another One! Lessons Learned From Australia’s Wave of Breaches

Security Boulevard

In the last few months, the citizens of Australia have been harshly awoken to the real consequences of cybercrime. It all started in September 2022 when wireless services giant Optus announced it had suffered a data breach. The initial disclosure came from the CEO, and she explained that breach investigations were still ongoing but that. The post Crikey!

Wireless 105
article thumbnail

Educational Institutions, the Favorite Targets of Vice Society Ransomware in 2022

Heimadal Security

Vice Society ransomware seemed to favor educational institutions in their attacks in 2022. The Cybercrime group targeted 33 schools in the last year, surpassing other threat actors like LockBit, BlackCat, BianLian, and Hive. Other industry verticals that attracted unwanted attention were governments, healthcare, manufacturing, commerce, and legal services Technical Details Vice Society ransomware does not […].

Education 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cybersecurity News Round-Up: Week of December 5, 2022

Security Boulevard

Apple introduces advanced data protection for iCloud, Chinese hackers stole U.S. COVID relief funds, Rackspace was hit by a ransomware attack and Denmark's defence ministry gets hit with a cyber attack. The post Cybersecurity News Round-Up: Week of December 5, 2022 appeared first on Security Boulevard.

article thumbnail

Typosquatting Explained: Definition, Threats, and Safety Tips

Heimadal Security

Cybercriminals pray on our online mistakes, learning how to transform them into money better and faster. And one of the most common mistakes on the Internet is the lack of attention when we are typing due to our short attention span and the highly dynamic cyberspace environment. From these small mistakes grew a specific type […]. The post Typosquatting Explained: Definition, Threats, and Safety Tips appeared first on Heimdal Security Blog.

Internet 105
article thumbnail

New Truebot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm

The Hacker News

Cybersecurity researchers have reported an increase in TrueBot infections, primarily targeting Mexico, Brazil, Pakistan, and the U.S. Cisco Talos said the attackers behind the operation have moved from using malicious emails to alternative delivery methods such as the exploitation of a now-patched remote code execution (RCE) flaw in Netwrix auditor as well as the Raspberry Robin worm.

Malware 101
article thumbnail

The Week in Ransomware - December 9th 2022 - Wide Impact

Bleeping Computer

This week has been filled with research reports and news of significant attacks having a wide impact on many organizations. [.].

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!