Mon.Aug 28, 2023

article thumbnail

Remotely Stopping Polish Trains

Schneier on Security

Turns out that it’s easy to broadcast radio commands that force Polish trains to stop: …the saboteurs appear to have sent simple so-called “radio-stop” commands via radio frequency to the trains they targeted. Because the trains use a radio system that lacks encryption or authentication for those commands, Olejnik says, anyone with as little as $30 of off-the-shelf radio equipment can broadcast the command to a Polish train­—sending a series of three acoustic tones

article thumbnail

OpenAI Debuts ChatGPT Enterprise, Touting Better Privacy for Business

Tech Republic Security

Data from ChatGPT Enterprise will not be used to train the popular chatbot. Plus, admins can manage access.

Big data 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat Fireside Chat: How to achieve API security — as AI-boosted attacks intensify

The Last Watchdog

API security has arisen as a cornerstone of securing massively interconnected cloud applications. At Black Hat USA 2023 , I had a great discussion about API security with Data Theorem COO Doug Dooley and Applovin CISO Jeremiah Kung. For a full drill down, please give the accompanying podcast a listen. As a fast-rising mobile ad network going toe-to-toe with Google and Facebook, Applovin has been acquiring advanced security tools and shaping new practices to manage its API exposures.

CISO 187
article thumbnail

Japan’s JPCERT warns of new ‘MalDoc in PDF’ attack technique

Security Affairs

Japan’s JPCERT warns of a new recently detected ‘MalDoc in PDF’ attack that embeds malicious Word files into PDFs. Japan’s computer emergency response team (JPCERT) has recently observed a new attack technique, called ‘MalDoc in PDF’, that bypasses detection by embedding a malicious Word file into a PDF file. The researchers explained that a file created with MalDoc in PDF has magic numbers and file structure of PDF, but can be opened in Word.

Malware 140
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

U.S. Energy Company Targeted by QR Code Phishing Campaign

SecureWorld News

In May 2023, a phishing campaign was launched that targeted a major U.S. energy company, as well as organizations in other industries, such as finance, insurance, manufacturing, and technology. The campaign used malicious QR codes embedded in PNG image attachments or redirect links associated with Microsoft Bing and well-known business applications, such as Salesforce and CloudFlare's Web3 services.

Phishing 101
article thumbnail

Attackers can discover IP address by sending a link over the Skype mobile app

Security Affairs

A security researcher demonstrated how to discover a target’s IP address by sending a link over the Skype mobile app. The security researcher Yossi discovered that is possible to discover a target’s IP address by sending a link over the Skype mobile app. The researcher pointed out that the attack only requires the target to open the message. The problem only impacts the Skype mobile app.

Mobile 136

LifeWorks

More Trending

article thumbnail

Stealthy Android Malware MMRat Carries Out Bank Fraud Via Fake App Stores

Trend Micro

The Trend Micro Mobile Application Reputation Service (MARS) team discovered a new, fully undetected Android banking trojan, dubbed MMRat, that has been targeting mobile users in Southeast Asia since late June 2023.

Banking 98
article thumbnail

Updated Kmsdx botnet targets IoT devices

Security Affairs

Researchers spotted an updated version of the KmsdBot botnet that is now targeting Internet of Things (IoT) devices. The Akamai Security Intelligence Response Team (SIRT) discovered a new version of the KmsdBot botnet that employed an updated Kmsdx binary targeting Internet of Things (IoT) devices. KmsdBot is an evasive Golang-based malware that was first detected by Akamai in November 2022, it infects systems via an SSH connection that uses weak login credentials.

IoT 98
article thumbnail

How to Enable Logging: Secure Cloud-native Development Series

Veracode Security

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the second part of the series, and it will teach you how and why to enable logging from the start. We’re going to talk about enabling logging (cloud logging, to be specific). What’s the difference?

article thumbnail

Researchers published PoC exploit code for Juniper SRX firewall flaws

Security Affairs

Researchers published a PoC exploit code for Juniper SRX firewall flaws that can be chained to gain RCE in Juniper’s JunOS. watchTowr Labs security researchers published a proof-of-concept exploit (PoC) exploit code for vulnerabilities in Juniper SRX firewalls. An unauthenticated attacker can chain the vulnerabilities to gain remote code execution in Juniper JunOS on vulnerable devices.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Teen Hackers Behind Notorious Lapsus$ Group Convicted in London

SecureWorld News

Two individuals associated with the notorious Lapsus$ cybercriminal gang have been convicted for their involvement in a string of high-profile hacking incidents, according to the BBC. These arrests have finally shed some much-needed light on the nefarious activities of this group that had sent shockwaves through the technology industry, leaving even the most well-defended organizations vulnerable and concerned.

article thumbnail

Rhysida ransomware group claims the hack of Prospect Medical

Security Affairs

The Rhysida ransomware group claimed to have hacked Prospect Medical Holdings and sensitive information from the company. In early August, a cyberattack disrupted the computer systems of multiple hospitals operated by Prospect Medical Holdings , which are located in multiple states, including California, Texas, Connecticut, Rhode Island, and Pennsylvania.

Hacking 98
article thumbnail

Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

eSecurity Planet

Older unpatched vulnerabilities make hackers’ work easier: They can keep running tried-and-true exploits and just look for new victims. Unfortunately, the theme for this week is returning vulnerabilities, or ones that haven’t been excised quite yet. Some exploits and weaknesses have had fixes for months or longer, yet they keep showing up in the news, indicating that either they haven’t been patched properly or the patches haven’t worked.

VPN 98
article thumbnail

Massive MOVEit campaign already impacted at least 1,000 organizations and 60 million individuals

Security Affairs

The recent wave of MOVEit attacks conducted by the Cl0p ransomware gang impacted 1,000 organizations, experts say. Cybersecurity firm Emsisoft shared disconcerting details about the recent, massive hacking campaign conducted by the Cl0p ransomware group that targeted the MOVEit Transfer file transfer platform designed by Progress Software Corporation.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Essential Guide to Nearshore Software Development in Mexico

SecureBlitz

Nearshore software development has become a well-liked outsourcing option in recent years for companies looking to improve their software development capabilities while remaining close to their home nation. Due to its thriving tech sector and skilled labor pool, Mexico has become a favored choice for nearshore software development. This book attempts to offer useful insights […] The post The Essential Guide to Nearshore Software Development in Mexico appeared first on SecureBlitz Cybersecu

article thumbnail

Black Hat USA 2023 NOC: Network Assurance

Cisco Security

The Black Hat Network Operations Center (NOC) provides a high security, high availability network in one of the most demanding environments in the world – the Black Hat event. The NOC partners are selected by Black Hat, with Arista, Cisco, Corelight, Lumen, NetWitness and Palo Alto Networks delivering from Las Vegas this year. We appreciate Iain Thompson of The Register , for taking time to attend a NOC presentation and tour the operations.

article thumbnail

Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks

The Hacker News

Microsoft is warning of an increase in adversary-in-the-middle (AiTM) phishing techniques, which are being propagated as part of the phishing-as-a-service (PhaaS) cybercrime model. In addition to an uptick in AiTM-capable PhaaS platforms, the tech giant noted that existing phishing services like PerSwaysion are incorporating AiTM capabilities.

article thumbnail

Cisco VPNs without MFA are under attack by ransomware operator

Malwarebytes

The Cisco Product Security Incident Response Team (PSIRT) has posted a blog about Akira ransomware targeting VPNs without Multi-Factor Authentication (MFA). The Cisco team states that it is aware of reports of the Akira ransomware group going specifically after Cisco VPNs that are not configured for MFA. And they have observed instances where cybercriminals appear to be targeting organizations that do not configure MFA for their VPN users.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Cyberattacks Targeting E-commerce Applications

The Hacker News

Cyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become more omnichannel, they build and deploy increasingly more API interfaces, with threat actors constantly exploring more ways to exploit vulnerabilities.

article thumbnail

Google strengthens its Workplace suite protection

Malwarebytes

Google has announced the strengthening of safeguard measures for its Workspace customers. You may well be using Workspace without realising it. If you’re using a Google product such as Gmail, Calendar, Drive, or Google Docs Editors Suite (among other apps), then congratulations: you are fully inside the Workspace ecosystem. Late last year, changes were made to try and catch out an attacker rifling through Google accounts and attempting to access certain critical settings or functionality.

article thumbnail

Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram Channel

The Hacker News

In yet another sign that developers continue to be targets of software supply chain attacks, a number of malicious packages have been discovered on the Rust programming language's crate registry. The libraries, uploaded between August 14 and 16, 2023, were published by a user named "amaperf," Phylum said in a report published last week.

article thumbnail

Weekly Vulnerability Recap – August 28, 2023 – Windows, Ivanti, Adobe Hit By Flaws

eSecurity Planet

Older unpatched vulnerabilities make hackers’ work easier: They can keep running tried-and-true exploits and just look for new victims. Unfortunately, the theme for this week is returning vulnerabilities, or ones that haven’t been excised quite yet. Some exploits and weaknesses have had fixes for months or longer, yet they keep showing up in the news, indicating that either they haven’t been patched properly or the patches haven’t worked.

VPN 95
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Experts Uncover How Cybercriminals Could Exploit Microsoft Entra ID for Elevated Privilege

The Hacker News

Cybersecurity researchers have discovered a case of privilege escalation associated with a Microsoft Entra ID (formerly Azure Active Directory) application by taking advantage of an abandoned reply URL.

article thumbnail

5 Ways to Prepare for Google's 90-Day TLS Certificate Expiration

Dark Reading

With bad guys frequently upping their game, security can't leave these protections to a once-a-year upgrade.

95
article thumbnail

The Rise of Smishing: How Businesses Can Protect Themselves from SMS Phishing Attacks

SecureBlitz

Here, I will talk about the rise of smishing and how businesses can protect themselves from SMS phishing attacks The prevalent use of mobile devices for business purposes has opened a host of opportunities for cybercriminals to exploit. It is a problem that has expanded hugely in recent times, with the shift to remote working […] The post The Rise of Smishing: How Businesses Can Protect Themselves from SMS Phishing Attacks appeared first on SecureBlitz Cybersecurity.

article thumbnail

Cybercriminals Harness Leaked LockBit Builder in Wave of New Attacks

Dark Reading

Enterprising, or simply lazy, cybercriminals are using Lockbit v3 to cut corners on ransomware.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Meal delivery service PurFoods announces major data breach

Malwarebytes

An organisation that provides home delivery meals has revealed that around 1.2 million people's personal data may be at risk, after the company suffered a ransomware attack earlier in the year. PurFoods, which offers up a service called Mom’s Meals, helps to provide meals for folks in a variety of different personal situations. From its site: We work with over 500 health plans, managed care organisations, governments, and agencies to provide access to meals for people covered under Medicar

article thumbnail

Financial Firms Breached in MOVEit Cyberattacks Now Face Lawsuits

Dark Reading

TD Ameritrade, Charles Schwab named in new class action data breach lawsuit, following last week's filing against Prudential.

article thumbnail

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

We Live Security

The compromise of the 3CX communication software made history as the first-ever publicly documented incident of one supply-chain attack leading to another. Data from ESET telemetry suggest that there were hundreds of malicious 3CX applications used by clients.

Hacking 52
article thumbnail

Legal Liability for Insecure Software Might Work, but It's Dangerous

Dark Reading

Imposing government-regulated security requirements on software companies may go too far and create unintended consequences.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!