Sat.May 13, 2023

article thumbnail

Weekly Update 347

Troy Hunt

A late one this week as I cover from the non-stop conferencing that was the Azure user group in Perth, followed by the Cyber West keynote, then the social drinks that night, the flight back home straight into the AusCERT gala dinner, the panel on data governance that morning then wrapping up with the speed debate Friday arvo. I think that's all.

article thumbnail

Capita warns customers they should assume data was stolen

Bleeping Computer

Business process outsourcing firm Capita is warning customers to assume that their data was stolen in a cyberattack that affected its systems in early April. [.

128
128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scam Intercepters – some thoughts

Security Boulevard

Despite no longer being paid to provide consultancy to the IT security industry, I couldn’t resist catching up with an interesting BBC initiative called Scam Interceptors. Having been appalled in the past when Click actually bought a botnet*, thus feeding scammers in the name of investigative journalism and self-congratulation, I was relieved to see that […] The post Scam Intercepters – some thoughts appeared first on Security Boulevard.

Scams 108
article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. The post Episode 250: Window Snyder of Thistle on. Read the whole entry. » Click the icon below to listen.

IoT 98
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Discord suffered a data after third-party support agent was hacked

Security Affairs

Discord disclosed a data breach, the security breach was caused by the compromise of a third-party support agent’s account. Discord, the popular VoIP and instant messaging social platform, disclosed a data breach and is notifying the impacted users. The security breach resulted in unauthorized access to a third-party customer service agent’s support ticket queue.

Hacking 96
article thumbnail

New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing Phishing Pages

The Hacker News

A new phishing-as-a-service (PhaaS or PaaS) platform named Greatness has been leveraged by cybercriminals to target business users of the Microsoft 365 cloud service since at least mid-2022, effectively lowering the bar to entry for phishing attacks.

More Trending

article thumbnail

Toyota Leaked Vehicle Data of 2 Million Customers

WIRED Threat Level

The FBI disables notorious Russia-linked malware, the EU edges toward a facial recognition ban, and security firm Dragos has an intrusion of its own.

Malware 92
article thumbnail

Personal info of 90k hikers leaked by French tourism company La Malle Postale

Security Affairs

La Malle Postale, a transportation company serving hikers on popular hiking trails in France, leaked personal data and private messages of their clients. The Cybernews research team has discovered a data leak on La Malle Postale’s system that exposed the personal data of their clients. The leaked information included names, phone numbers, emails, private communication via SMS messages, passwords, and employees’ credentials.

article thumbnail

The Ultimate Guide to Multi-Factor Authentication

Security Boulevard

The Ultimate Guide to Multi-Factor Authentication The Ultimate Guide to Multi-Factor Authentication The Importance of Multi-Factor Authentication The Importance of Multi-Factor Authentication In today’s digital age, the security of sensitive information and data is of utmost importance. Cyber criminals are constantly finding new ways to exploit security weaknesses and gain access to critical data, which […] The post The Ultimate Guide to Multi-Factor Authentication appeared first on Cyber securi

article thumbnail

Data of more than 2M Toyota customers exposed in ten years-long data breach

Security Affairs

A data breach disclosed by Toyota Motor Corporation exposed info of more than 2 million customers for ten years Toyota Motor Corporation disclosed a data breach that exposed the car-location information of 2,150,000 customers between November 6, 2013, and April 17, 2023. The data breach was caused by a database misconfiguration that was accessible to anyone without authentication.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Abusing Communities

Security Boulevard

I may need to give up social media altogether. I can’t seem to avoid seeing scams in all directions, and I can’t seem to ignore them, even though writing about this stuff is no longer my living. Perhaps it’s a curse, or the result of a misspent life: I remind myself of a quotation. Margaret […] The post Abusing Communities appeared first on Security Boulevard.

Scams 57
article thumbnail

Is Every Hacker Similar To Another One? How Many Types Of Hackers Exist.

Hacker's King

The term “ hacker ” has become a somewhat vague and misunderstood term in the modern era. When we hear the term “hacker”, we often think of someone who breaks into computer systems and steals information. However, the reality is that hackers come in many different shapes and sizes, each with their own unique goals, motivations, and methods. Before we dive into the difference between various types of hackers, it’s important to first define what a hacker actually is.

article thumbnail

USENIX Enigma 2023 – Josiah Dykstra – ‘The Slippery Slope Of Cybersecurity Analogies’

Security Boulevard

Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX Enigma 2023 – Josiah Dykstra – ‘The Slippery Slope Of Cybersecurity Analogies’ appeared first on Security Boulevard.

article thumbnail

SysReptor v2023.142 releases: Pentest Report Creator

Penetration Testing

SysReptor – Pentest Reporting Easy As Pie ? Write in markdown ✏️ Design in HTML/VueJS ⚙️ Render your report to PDF ? Fully customizable ? Self-hosted or Cloud ? No need for Word Security Considerations Template Injection SysReptor uses... The post SysReptor v2023.142 releases: Pentest Report Creator appeared first on Penetration Testing.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Email Security in 2023 – An Insiders Guide to Best Practices & Top Vendors

CyberSecurity Insiders

Email is a vital communication tool for organizations across industries but also serves as a primary attack vector for cybercriminals. To put this in perspective, over 376 billion emails are sent every single day. And according to Verizon, over 90% of malware is delivered via email. To combat this rapidly evolving threats landscape, organizations must proactively address email security challenges.

Phishing 111