Mon.Apr 10, 2023

article thumbnail

LLMs and Phishing

Schneier on Security

Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading victims to respond or click on the link than the usual spam. It’s an interesting experiment, and the results are likely to vary wildly based on the details of the experiment.

Phishing 347
article thumbnail

GUEST ESSAY: Cyber hygiene need not be dreary — why engaging training is much more effective

The Last Watchdog

Instilling a culture of cyber security at your organization requires your people to maintain a high level of knowledge and awareness about cyber security risks—and that takes an effective, impactful, and ongoing security awareness program. Related: Deploying employees as human sensors However, a security awareness program is only as good as its content.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PingIdentity launches decentralized identity management

Tech Republic Security

With PingOne Neo, PingIdentity aims to accelerate “speed to trust”, supercharge identity management and put control of a user’s identity in the user’s pocket. The post PingIdentity launches decentralized identity management appeared first on TechRepublic.

Passwords 197
article thumbnail

Over 1 Million WordPress Sites Infected by Balada Injector Malware Campaign

The Hacker News

Over one million WordPress websites are estimated to have been infected by an ongoing campaign to deploy malware called Balada Injector since 2017. The massive campaign, per GoDaddy's Sucuri, "leverages all known and recently discovered theme and plugin vulnerabilities" to breach WordPress sites. The attacks are known to play out in waves once every few weeks.

Malware 144
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Learn what you need to protect your business with ethical hacking for just $45

Tech Republic Security

There are courses in this bundle for all skill levels; several require no previous tech background whatsoever. The post Learn what you need to protect your business with ethical hacking for just $45 appeared first on TechRepublic.

Hacking 174
article thumbnail

Apple zero-day spyware patches extended to cover older Macs, iPhones and iPads

Naked Security

That double-whammy Apple browser-to-kernel spyware bug combo we wrote up last week? Turns out it applies to all supported Macs and iDevices - patch now!

Spyware 143

LifeWorks

More Trending

article thumbnail

Yes, You CAN Steal This Car — by Opening the Fender

Security Boulevard

CAN You Not? Toyota RAV4 and many others vulnerable to CAN bus injection attack. Cars need zero-trust too. The post Yes, You CAN Steal This Car — by Opening the Fender appeared first on Security Boulevard.

IoT 138
article thumbnail

What is the true potential impact of artificial intelligence on cybersecurity?

CSO Magazine

Will artificial intelligence become clever enough to upend computer security? AI is already surprising the world of art by producing masterpieces in any style on demand. It’s capable of writing poetry while digging up arcane facts in a vast repository. If AIs can act like a bard while delivering the comprehensive power of the best search engines, why can’t they shatter security protocols, too?

article thumbnail

Overview of Google Play threats sold on the dark web

SecureList

In 2022, Kaspersky security solutions detected 1,661,743 malware or unwanted software installers, targeting mobile users. Although the most common way of distributing such installers is through third-party websites and dubious app stores, their authors every now and then manage to upload them to official stores, such as Google Play. These are usually policed vigorously, and apps are pre-moderated before being published; however, the authors of malicious and unwanted software employ a variety of

Malware 133
article thumbnail

Round-Robin DNS Explained. What It Is and How It Works

Heimadal Security

The Round-robin DNS is a load-balancing technique that helps manage traffic and avoid overloading servers. Multiple IP addresses are assigned to a single domain name; each time the domain name is resolved, the returned IP address is picked in a circular order. The method aims to distribute the traffic load evenly between the servers associated […] The post Round-Robin DNS Explained.

DNS 126
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Final Act? Killnet Rallies Attackers to DDoS NATO Targets

Security Boulevard

While much of the world anticipated hunts for colored eggs, chocolate bunnies and family dinners on Sunday, Black Kite was busy sounding the alarm about an expected swan song from Killnet that could involve “high-impact” DDoS attacks on NATO critical infrastructure targets. “A serious and potentially highly damaging cybersecurity threat has been announced by a.

DDOS 124
article thumbnail

Apps for Sale: Cybercriminals Sell Android Hacks for Up to $20K a Pop

Dark Reading

The marketplace for malicious Google Play applications and app-takeover tools is thriving, thanks to novel hacking techniques and lax enterprise security.

Hacking 118
article thumbnail

Apple fixes recently disclosed zero-days on older iPhones and iPads

Bleeping Computer

Apple has released emergency updates to backport security patches released on Friday, addressing two actively exploited zero-day flaws also affecting older iPhones, iPads, and Macs. [.

115
115
article thumbnail

Container security essentials

Security Boulevard

As the preferred method for packaging and deploying cloud-native applications, a comprehensive understanding of containers, and how to secure them, has never been so important. The post Container security essentials appeared first on Security Boulevard.

Software 111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Windows 11 changing Print Screen to open Snipping Tool by default

Bleeping Computer

Microsoft is testing changes to how the print screen button works in Windows 11, causing it to open the Windows Snipping Tool rather than copying a screenshot to the clipboard. [.

111
111
article thumbnail

Protect Your Business From eCommerce Security Threats

Security Boulevard

As the world transitions to digital commerce, including across internet of things (IoT) devices and apps, online shopping has skyrocketed in popularity. With convenience at the touch of a button, and a device in almost every consumer’s pocket, potential consumers have more shopping power at the tips of their fingers than ever before. Hackers and […] The post Protect Your Business From eCommerce Security Threats appeared first on Security Boulevard.

eCommerce 111
article thumbnail

Rethinking Cybersecurity's Structure & the Role of the Modern CISO

Dark Reading

A CISO with a focused role will be better prepared to thrive in an organization and accelerate adoption and understanding of cybersecurity.

CISO 110
article thumbnail

CrowdStrike Adds Honeytokens to Deceive Cybercriminals

Security Boulevard

CrowdStrike has extended the capabilities of its Falcon Endpoint Protection to make it simpler to employ honeytokens to identify compromised credentials that could be used to launch a cyberattack and the tools used to evade detection. In addition, the company has added tools to surface duplicate passwords in Microsoft Active Directory (AD) and support for.

Passwords 110
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Pair of Apple Zero-Days Under Active Exploit; Patch & Update Accordingly

Dark Reading

Unpatched Macs, iPhones, and iPads open to browser takeover and system kernel-level malicious code execution, Apple warns.

105
105
article thumbnail

Are You Ready for the New FDA Cybersecurity Mandate for Medical Devices?

Security Boulevard

The Food and Drug Administration (FDA) has done more than just apply a bandage on the issue of cybersecurity-related risks in medical devices. Late last month, the FDA issued guidance for medical device companies to ensure the safety of devices like heart monitors, MRI machines, and insulin pumps. What the FDA is Asking of Medical. Are You Ready for the New FDA Cybersecurity Mandate for Medical Devices?

article thumbnail

IDENTITY MANAGEMENT DAY 2023: Advice from Cyber Pros

CyberSecurity Insiders

Tomorrow, April 11 is Identity Management Day. This day serves as an annual reminder to increase awareness and education for leaders, IT decision-makers and the general public on the importance of identity management. The dangers of improper management of digital identities are at an all-time high. We spoke with our blog volunteers to get their insights into what best practices their companies are following, along with how you can get on a path to better identity management.

article thumbnail

A Strategic Approach to Cybersecurity Resilience

Security Boulevard

While most organizations understand the importance of cybersecurity, many are still unsure about the meaning of cyber resilience. According to the National Institute of Standards and Technology (NIST), cyber resilience is defined as “the ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks, or compromises on systems … enabled by mission.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Oldest Law Practice in NYC Hacked, over 90,000 Clients Impacted

Heimadal Security

Almost 90,000 clients’ personal information was compromised in the cyberattack on the prestigious law firm Cadwalader, Wickersham & Taft. The law firm informed its clients on March 30, 2023, that on November 15, 2022, an unauthorized third party acquired remote access to the firm’s computers. According to reports, the threat actors could extract sensitive information from […] The post Oldest Law Practice in NYC Hacked, over 90,000 Clients Impacted appeared first on Heimdal

Hacking 104
article thumbnail

Will TikTok Bans go Viral in the Workplace?

Security Boulevard

The U.S., Canada and the U.K. recently issued orders banning the use of TikTok on government-issued mobile devices in response to cybersecurity concerns about the video-sharing app. Like some of the content found on the social media platform itself, TikTok bans seem to be going viral. This ban isn’t likely to be limited to government. The post Will TikTok Bans go Viral in the Workplace?

Media 102
article thumbnail

Estonian National Charged in U.S. for Acquiring Electronics and Metasploit Pro for Russian Military

The Hacker News

An Estonian national has been charged in the U.S. for purchasing U.S.-made electronics on behalf of the Russian government and military. The 45-year-old individual, Andrey Shevlyakov, was arrested on March 28, 2023, in Tallinn. He has been indicted with 18 counts of conspiracy and other charges. If found guilty, he faces up to 20 years in prison.

article thumbnail

Sophos patches three issues in the Sophos Web Security appliance, one of them rated as critical

Security Affairs

Sophos addressed three vulnerabilities in Sophos Web Appliance, including a critical flaw that can lead to code execution. Cybersecurity vendor Sophos addressed three vulnerabilities in Sophos Web Appliance, including a critical flaw, tracked as CVE-2023-1671 (CVSS score of 9.8), that can lead to code execution. The CVE-2023-1671 flaw is a pre-auth command injection issue that resides in the warn-proceed handler, it affects appliances older than version 4.3.10.4.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Top 10 Cybersecurity Trends for 2023: From Zero Trust to Cyber Insurance

The Hacker News

As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily lives, cybercrime is on the rise, as evidenced by the fact that cyberattacks caused 92% of all data breaches in the first quarter of 2022.

article thumbnail

Samsung employees unwittingly leaked company secret data by using ChatGPT

Security Affairs

Samsung employees have unwittingly leaked top secret data by providing them to the popular chatbot service ChatGPT. Samsung employees have shared internal documents, including meeting notes and source code, with the popular chatbot service ChatGPT. ChatGPT uses data provided by the users to train itself and build its experience, with the risk that this data can be available to other users that will query the popular chatbot.

article thumbnail

Securing Kafka in Modern Application Environments | Identify Apache Kafka Security Vulnerabilities | Contrast Security

Security Boulevard

Apache Kafka is one of the most popular platforms for real-time data processing and efficient communication between distributed systems. According to enlyft there are approximately 50,192 companies that use Apache and the number has proliferated rapidly. Apache Kafka was originally developed by LinkedIn and was built for website activity tracking, capturing all the clicks, actions, or inputs on a website.

98
article thumbnail

CISA adds zero-day bugs in iPhones, Macs, and iPads to its Known Exploited Vulnerabilities catalog

Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) added two flaws in iPhones, Macs, and iPads to its Known Exploited Vulnerabilities catalog. U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the following five new issues to its Known Exploited Vulnerabilities Catalog: CVE-2023-28205 – Apple Multiple Products WebKit Use-After-Free Vulnerability; CVE-2023-28206 – Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability; This wee

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!