Wed.Jul 26, 2023

article thumbnail

Backdoor in TETRA Police Radios

Schneier on Security

Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around the world. The European Telecommunications Standards Institute (ETSI), an organization that standardizes technologies across the industry, first created TETRA in 1995. Since then, TETRA has been used in products, including radios, sold by Motorola, Airbus, and more.

article thumbnail

Russia Sends Cybersecurity CEO to Jail for 14 Years

Krebs on Security

The Russian government today handed down a treason conviction and 14-year prison sentence on Iyla Sachkov , the former founder and CEO of one of Russia’s largest cybersecurity firms. Sachkov, 37, has been detained for nearly two years under charges that the Kremlin has kept classified and hidden from public view, and he joins a growing roster of former Russian cybercrime fighters who are now serving hard time for farcical treason convictions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: Protect AI raises $35M in Series A financing to secure AI, ML software supply chain

The Last Watchdog

Seattle, Wash., July 26, 2023 — Protect AI , the artificial intelligence (AI) and machine learning (ML) security company, today announced it has closed a $35M Series A round of funding. The round was led by Evolution Equity Partners with participation from Salesforce Ventures and existing investors Acrew Capital, boldstart ventures, Knollwood Capital and Pelion Ventures.

Software 188
article thumbnail

Learn How to Protect Your Business With Ultimate Security for $80

Tech Republic Security

Protect your company by learning maximum security practices in this bundle, while it's available at the best-on-web price of only $79.99.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Two flaws in Linux Ubuntu affect 40% of Ubuntu users

Security Affairs

Wiz researchers discovered two Linux vulnerabilities in the Ubuntu kernel that can allow an unprivileged local user to gain elevated privileges. Wiz Research discovered two privilege escalation vulnerabilities, tracked as CVE-2023-2640 and CVE-2023-32629, in the OverlayFS module in the Linux distro Ubuntu. According to the researchers, the flaws impact 40% of the users of the popular Linux distribution.

Hacking 98
article thumbnail

Rust-based Realst Infostealer Targeting Apple macOS Users' Cryptocurrency Wallets

The Hacker News

A new malware family called Realst has become the latest to target Apple macOS systems, with a third of the samples already designed to infect macOS 14 Sonoma, the upcoming major release of the operating system.

LifeWorks

More Trending

article thumbnail

New AI Tool 'FraudGPT' Emerges, Tailored for Sophisticated Attacks

The Hacker News

Following the footsteps of WormGPT, threat actors are advertising yet another cybercrime generative artificial intelligence (AI) tool dubbed FraudGPT on various dark web marketplaces and Telegram channels. "This is an AI bot, exclusively targeted for offensive purposes, such as crafting spear phishing emails, creating cracking tools, carding, etc.

article thumbnail

Over 500K MikroTik RouterOS systems potentially exposed to hacking due to critical flaw

Security Affairs

Experts warn of a severe privilege escalation, tracked as CVE-2023-30799 , in MikroTik RouterOS that can be exploited to hack vulnerable devices. VulnCheck researchers warn of a critical vulnerability, tracked as CVE-2023-30799 (CVSS score: 9.1), that can be exploited in large-scale attacks to target over 500,000 RouterOS systems. “MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue.

Hacking 98
article thumbnail

Peloton Bugs Expose Enterprise Networks to IoT Attacks

Dark Reading

Hackers have three key pathways — the OS, apps, and malware — for leveraging the popular home fitness equipment as initial access for data compromise, ransomware, and more

IoT 98
article thumbnail

Two ambulance services in UK lost access to patient records after a cyber attack on software provider

Security Affairs

Swedish software firm Ortivus suffered a cyberattack that has resulted in at least two British ambulance services losing access to electronic patient records. Two British ambulance services were not able to access electronic patient records after a cyber attack that hit their software provider Ortivus. Ortivus was a Swedish software company specializing in providing solutions for the healthcare and medical industry.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

ALERT: Google Wants to DRM your OS for ‘Web Environment Integrity’

Security Boulevard

We will kill WEI: A thinly veiled attempt to track you and make more ad money. The post ALERT: Google Wants to DRM your OS for ‘Web Environment Integrity’ appeared first on Security Boulevard.

IoT 98
article thumbnail

CISA adds Ivanti EPMM flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability, tracked as CVE-2023-35078, to its Known Exploited Vulnerabilities Catalog.

Mobile 98
article thumbnail

Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networks

The Hacker News

A deeper analysis of a recently discovered malware called Decoy Dog has revealed that it's a significant upgrade over the Pupy RAT, an open-source remote access trojan it's modeled on.

Malware 98
article thumbnail

Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws

Bleeping Computer

Two Linux vulnerabilities introduced recently into the Ubuntu kernel create the potential for unprivileged local users to gain elevated privileges on a massive number of devices. [.

98
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down

WIRED Threat Level

After scammers duped a friend with a hacked Twitter account and a “deal” on a MacBook, I enlisted the help of a fellow threat researcher to trace the criminals’ offline identities.

Hacking 98
article thumbnail

3 Ways MSPs/MSSPs are Helping SMBs Do More with Less Around Email Security – Consolidation Without Compromise

Security Boulevard

Today’s disruptive environment has caused small and medium-sized businesses (SMBs) to face unprecedented technological hurdles. And thanks to limited resources and a lack of cybersecurity experts, many SMBs are finding themselves even more vulnerable to costly attacks. As MSPs and MSSPs offer a range of essential services, businesses can reduce risks and optimize operations even […] The post 3 Ways MSPs/MSSPs are Helping SMBs Do More with Less Around Email Security – Consolidation Without Compro

article thumbnail

Privacy by Design: Integrating Privacy into Healthcare Systems and Processes

SecureWorld News

With organizations and practices of all sizes across the healthcare industry adopting more advanced systems , privacy can no longer be an afterthought. Instead, it must be a cornerstone embedded from the beginning. To help make the shift, we will examine the core principles of privacy by design, a preemptive and integrated strategy for safeguarding patient data from the earliest stages of healthcare system development and process design.

article thumbnail

Insider Risk in the Defence Sector

Security Boulevard

Introduction The defence sector, vital to national security, is increasingly becoming a hotspot for insider risks. With a diverse array of entities, from large contractors to SMEs, and an intricate supply chain, the sector is an attractive target for both internal and external actors. Insider risks in the defence sector have resulted in significant information […] Het bericht Insider Risk in the Defence Sector verscheen eerst op Signpost Six.

Risk 98
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

New SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Days

The Hacker News

The U.S. Securities and Exchange Commission (SEC) on Wednesday approved new rules that require publicly traded companies to publicize details of a cyber attack within four days of identifying that it has a "material" impact on their finances, marking a major shift in how computer breaches are disclosed.

article thumbnail

Terrestrial Trunked Radio System Vulnerable to Leakage and Message Injection

Heimadal Security

Dutch researchers revealed 5 vulnerabilities in the Terrestrial Trunked Radio (TETRA) that could expose government organizations and critical infrastructure communication to third parties. Two of the collectively called TETRA:BURST flaws, CVE-2022-22401 and CVE-2022-22402, were rated critical. TETRA is used for communication by police, fire and ambulance services, transportation agencies, utilities, military and border control organizations, […] The post Terrestrial Trunked Radio System Vu

article thumbnail

Windows 11 KB5028254 update fixes VPN performance issues, 27 bugs

Bleeping Computer

Microsoft has released the July 2023 optional cumulative update for Windows 11, version 22H2, with fixes for 27 issues, including ones affecting VPN performance and display or audio devices. [.

VPN 98
article thumbnail

How to Setup Microsoft Office 365 DKIM record?

Security Boulevard

Learn how to create, setup and enable DKIM Office 365 records for multiple domains on the Defender portal. The post How to Setup Microsoft Office 365 DKIM record? appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Norwegian Government`s System Breached over Ivanti EPMM Zero-Day

Heimadal Security

The Norwegian National Security Authority (NSM) revealed that threat actors exploited the CVE-2023-35078 zero-day vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) to target the Norwegian Government. According to the Norwegian authorities, the attack did not impact the Prime Minister’s Office, the Ministry of Defense, the Ministry of Justice, or the Ministry of Foreign Affairs.

article thumbnail

Linux Commands To Check The State Of Firmware

Security Boulevard

Whether you are new to Linux or a seasoned Linux systems administrator, knowing the hardware and firmware on your systems is essential. Firmware that is out-of-date can pose security and operational risks. I advise you to keep up with firmware updates before you are impacted by an attacker with a shiny new exploit or some […] The post Linux Commands To Check The State Of Firmware appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

article thumbnail

New Vulnerability Puts 926,000 MikroTik Routers at Risk! Users Urged to Patch

Heimadal Security

Researchers found a critical ‘Super Admin’ privilege elevation vulnerability that impacts MikroTik devices. Over 900,000 RouterOS routers are at risk and security specialists advise users to apply available patches immediately. CVE-2023-30799 enables remote and authenticated threat actors to escalate privileges from admin to super-admin on the Winbox or HTTP interface.

Risk 98
article thumbnail

Rezilion: Devs Wasting Time on Wrong Cybersecurity Vulnerabilities

Security Boulevard

A Rezilion report argued most organizations are wasting their limited remediation resources on vulnerabilities that may never be exploited. The post Rezilion: Devs Wasting Time on Wrong Cybersecurity Vulnerabilities appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Critical Zero-Day in Ivanti Software Used to Attack Norwegian Agencies

SecureWorld News

Earlier this week, the Norwegian National Security Authority (NSM) disclosed that a series of attacks targeting government agencies exploited a previously unknown Zero-Day vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) software, formerly known as MobileIron Core. The vulnerability, tracked as CVE-2023-35078, allowed attackers to bypass authentication and gain unauthorized remote access to EPMM servers.

article thumbnail

Attackers are Hiding Malware Behind Barbie-Themed Scams

Security Boulevard

The massive box office brought in by the “Barbie” movie during its opening weekend—$162 million—surprised even some Hollywood industry watchers despite the commercial hype in the weeks leading up to its release. What isn’t surprising are the online fraudsters who have latched onto the surefire summer blockbuster, with threat researchers from McAfee tracking a range.

Scams 98
article thumbnail

A Market-Leading Writing App That Will Help Every Student Stick To Their Study Plan and Excel in Writing Proficiency

SecureBlitz

In our digital-driven world, education has also adapted, embracing technology as a crucial learning tool. This adaptation has brought about a profound shift in education, moving from traditional chalk and board methods to technologically supported strategies. The writing app has emerged as a significant component of this shift, becoming an invaluable app for students to […] The post A Market-Leading Writing App That Will Help Every Student Stick To Their Study Plan and Excel in Writing Pro

article thumbnail

Cofense Announces General Availability of Protect+ MSP

Security Boulevard

LEESBURG, Va. – July 26, 2023 – Cofense, the leading provider of phishing detection and response (PDR) solutions, today announced the general availability of Cofense Protect+ MSP, a multi-tenant, advanced email security and protection solution that keeps organizations protected from today’s sophisticated email attacks Today’s managed service providers (MSPs) and managed security service providers (MSSPs) are […] The post Cofense Announces General Availability of Protect+ MSP appeared first on

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!