Tue.May 02, 2023

article thumbnail

NIST Draft Document on Post-Quantum Cryptography Guidance

Schneier on Security

NIST has release a draft of Special Publication1800-38A: Migration to Post-Quantum Cryptography: Preparation for Considering the Implementation and Adoption of Quantum Safe Cryptography.” It’s only four pages long, and it doesn’t have a lot of detail—more “volumes” are coming, with more information—but it’s well worth reading.

309
309
article thumbnail

GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout

The Last Watchdog

The rising complexity and prevalence of cybersecurity threats are making experts anxious. Related: Training employees to mitigate phishing It pressures working analysts to perform 24 hours’ worth of work in an 8-hour day. Automation could alleviate the burden on IT teams and cybersecurity professionals by shouldering some monotonous, time-consuming tasks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Infoblox discovers rare Decoy Dog C2 exploit

Tech Republic Security

Domain security firm Infoblox discovered a command-and-control exploit that, while extremely rare and complex, could be a warning growl from a new, as-yet anonymous state actor. The post Infoblox discovers rare Decoy Dog C2 exploit appeared first on TechRepublic.

174
174
article thumbnail

New Apple ‘Rapid’ Update is Slow, Messy FAIL

Security Boulevard

PATCH NOW! Oh, wait, you can’t: “You are no longer connected to the internet,” it sneers. The post New Apple ‘Rapid’ Update is Slow, Messy FAIL appeared first on Security Boulevard.

Internet 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Juggling critical infrastructure for data centers, hospitals and more, with an eye on resilience

Tech Republic Security

Joseph Vijay, CEO of Intelli-Systems, talks about the challenges of supporting critical infrastructure, and right-sizing data center power portfolios without disruption. The post Juggling critical infrastructure for data centers, hospitals and more, with an eye on resilience appeared first on TechRepublic.

article thumbnail

Who are Cyber Swindlers

CyberSecurity Insiders

Cyber swindlers, also known as cyber fraudsters, are individuals or groups who use the internet and technology to commit fraud or deception for financial gain. They use various methods, such as phishing scams, identity theft, credit card fraud, and other forms of online scams to steal money or sensitive information from their victims. Some cyber swindlers use sophisticated techniques to deceive their targets, such as creating fake websites or emails that look like legitimate businesses or organi

LifeWorks

More Trending

article thumbnail

BouldSpy Android Spyware: Iranian Government's Alleged Tool for Spying on Minority Groups

The Hacker News

A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300 individuals belonging to minority groups. The malware, dubbed BouldSpy, has been attributed with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Targeted victims include Iranian Kurds, Baluchis, Azeris, and Armenian Christian groups.

Spyware 126
article thumbnail

FBI seizes 9 crypto exchanges used to launder ransomware payments

Bleeping Computer

The FBI and Ukrainian police have seized nine cryptocurrency exchange websites that facilitated money laundering for scammers and cybercriminals, including ransomware actors. [.

article thumbnail

11 security tools all remote employees should have

CSO Magazine

It’s no secret that humans are the biggest vulnerability to any corporate network. Whether it’s an inability to properly manage password complexity across multiple systems, poor social media habits, or even a lack of awareness with things like email links, online shopping, or app and software usage. A major problem for businesses, particularly in a post-COVID world with so many people working remotely, is the fact that these security challenges employees face extend very easily to their personal

Media 123
article thumbnail

APT groups muddying the waters for MSPs

We Live Security

A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers The post APT groups muddying the waters for MSPs appeared first on WeLiveSecurity

121
121
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

BlackCat Ransomware group breaches Australia HWL Ebsworth law firm servers

CyberSecurity Insiders

Australia’s HWL Ebsworth law firm has issued a statement stating that its servers have been hacked and the personal data of its clients and some employees were accessed and siphoned by criminals. The Blackcat ransomware gang posted a statement on its website reiterating the same, stating that they had siphoned approximately 4TB of company data, including employee CVs, ID card details, financial reports, account information, client documentation, credit card information, and a blueprint con

article thumbnail

Google will remove secure website indicators in Chrome 117

Bleeping Computer

Google announced today that the lock icon, long thought to be a sign of website security and trustworthiness, will soon be changed with a new icon that doesn't imply that a site is secure or should be trusted. [.

115
115
article thumbnail

The Evolution of Data Security Solutions

CyberSecurity Insiders

By Dan Benjamin, Co-Founder and CEO, Dig Security Approximately 60% of corporate data now lives in the cloud, a number that has doubled over the last seven years. While the concept of cloud computing dates back decades, it is only in the past few years that organizations have begun to understand its full potential. Cloud computing has enabled a new generation of products and services, facilitated a lightweight form of outsourced solutions, and improved the efficiency and cost of technology tools

article thumbnail

Managed Detection and Response in 2022

SecureList

Kaspersky Managed Detection and Response (MDR) is a service for 24/7 monitoring and response to detected incidents based on technologies and expertise of Kaspersky Security Operations Center (SOC) team. MDR allows detecting threats at any stage of the attack – both before anything is compromised and after the attackers have penetrated the company’s infrastructure.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads

The Hacker News

In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat actor has been observed leveraging the technique to deliver a new Windows-based financial trojan and information stealer called LOBSHOT. "LOBSHOT continues to collect victims while staying under the radar," Elastic Security Labs researcher Daniel Stepanic said in an analysis published last week.

Malware 111
article thumbnail

Samsung bans staff AI use over data leak concerns

CSO Magazine

Samsung has reportedly issued a memo prohibiting the use of generative AI systems like ChatGPT to prevent the upload of sensitive company data on external servers.

108
108
article thumbnail

Level Finance crypto exchange hacked after two security audits

Bleeping Computer

Hackers exploited a Level Finance smart contract vulnerability to drain 214,000 LVL tokens from the decentralized exchange and swapped them for 3,345 BNB, worth approximately $1,100,000. [.

Hacking 106
article thumbnail

SolarWinds: The Untold Story of the Boldest Supply-Chain Hack

WIRED Threat Level

The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.

Hacking 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

4 Principles for Creating a New Blueprint for Secure Software Development

Dark Reading

Improving the security of the software development process is key to thwarting bad actors.

Software 105
article thumbnail

FBI Seeks Additional $64 Million in 2024 to Fight Cyber Threats

SecureWorld News

Christopher Wray, Director of the Federal Bureau of Investigation, on April 27th requested an additional $64 million in funding to fight cyber threats in 2024. The request was made to the U.S. House of Representatives Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies, on The Hill. Wray said in his statement for the record : "Our nation continues to face a multitude of serious and evolving threats ranging from homegrown violent extremists to hostile foreig

article thumbnail

Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software

The Hacker News

Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers. The three vulnerabilities reside in version 8.4 of FRRouting, a popular open source internet routing protocol suite for Linux and Unix platforms.

Internet 103
article thumbnail

Veza releases access security, governance solution for SaaS applications

CSO Magazine

Data security authorization vendor Veza has announced a new solution for access security and governance across SaaS applications including Salesforce, GitHub, and Slack. Veza for SaaS Apps allows customers to automate access reviews, find and fix privilege access violations, trim privilege sprawl, and prevent SaaS misconfigurations – securing the attack surface associated with widespread SaaS app usage and enabling compliance with frameworks like ISO 27001 and GDPR, according to the firm.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout

Security Boulevard

The rising complexity and prevalence of cybersecurity threats are making experts anxious. Related: Training employees to mitigate phishing It pressures working analysts to perform 24 hours’ worth of work in an 8-hour day. Automation could alleviate the burden on IT … (more…) The post GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout appeared first on Security Boulevard.

article thumbnail

BrandPost: 7 considerations for successful digital transformation

CSO Magazine

The way we do business has changed dramatically over the last several years. To remain agile and competitive, organizations must embrace digital transformation. But doing so securely means stepping outside the old ways of establishing a network perimeter, protecting it, and trusting everything inside. Doing things the way they have always been done doesn’t work in the hybrid workplace, where the perimeter is everywhere.

article thumbnail

Google Ads Abused to Lure Corporate Workers to LOBSHOT Backdoor

Dark Reading

The cyberattack campaign, similar to one to spread the Rhadamanthys Stealer, is part of a larger trend by attackers to use malvertising as initial access for ransomware and other threat activity.

article thumbnail

Aw CRUD (Create/Read/Update/Delete): Extended Policy Capabilities in Duo’s API

Duo's Security Blog

At Duo Security, we want to make it easier for our customers to stay secure, which is why we’re happy to announce that starting May 1st, all Duo customers will be able to happily say, “Aw, CRUD” (create, read, update, delete) to their Duo policies through our existing Admin API using our new policy endpoints. Our Duo Documentation has been updated with the how-tos of applying these policy endpoints, and in this post we’ll be sharing use cases of why our customers will benefit from this update.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Fortinet warns of a spike in attacks against TBK DVR devices

Security Affairs

FortiGuard Labs researchers observed a worrisome level of attacks attempting to exploit an authentication bypass vulnerability in TBK DVR devices. FortiGuard Labs researchers are warning of a spike in malicious attacks targeting TBK DVR devices. Threat actors are attempting to exploit a five-year-old authentication bypass issue, tracked as CVE-2018-9995 (CVSS score of 9.8), in TBK DVR devices.

article thumbnail

How to operationalize SBOMs for incident response

Security Boulevard

As the cybersecurity industry has endeavored to reduce the risk of software supply chain security flaws, software bills of materials (SBOMs) have received a ton of attention of late, as security pundits have promoted them as a key building block in software supply chain security programs. The post How to operationalize SBOMs for incident response appeared first on Security Boulevard.

article thumbnail

FBI and Ukrainian police seized 9 crypto exchanges used by cybercriminals

Security Affairs

A joint operation conducted by the FBI and Ukrainian police seized 9 crypto exchanges used by cybercriminal groups for money laundering. The Cyber ​​Police Department together with the Main Investigative Department of the National Police, the Office of the Prosecutor General of Ukraine and in cooperation with the FBI conducted an international operation that seized nine crypto exchanges used by cybercriminal groups to launder profits from illegal activities, including ransomware attacks and onli

article thumbnail

CISA: Vulnerabilities Discovered in Illumina DNA Sequencing Devices

SecureWorld News

Healthcare providers and laboratory personnel have been put on alert after two separate cybersecurity vulnerabilities were discovered in medical devices commonly used in clinical diagnostics and research. On April 27, 2023, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory regarding two vulnerabilities in the Universal Copy Service (UCS) software used by Illumina, a leading genomics company based in the United States.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!