Tue.Jun 20, 2023

article thumbnail

One overlooked element of executive safety: Data privacy

Tech Republic Security

Practices such as using a separate email for sensitive activities and removing personal data from people search sites can help executives improve their data privacy. The post One overlooked element of executive safety: Data privacy appeared first on TechRepublic.

article thumbnail

Microsoft Repeatedly Burned in ‘Layer 7’ DDoS

Security Boulevard

Unlucky number: Time and again this month, “Russian” hackers bring down Microsoft clouds. The post Microsoft Repeatedly Burned in ‘Layer 7’ DDoS appeared first on Security Boulevard.

DDOS 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Okta moves passkeys to cloud, allowing multi-device authentication

Tech Republic Security

Okta’s formula for multi-device identity authentication for a hybrid workforce: extract passwords, add ease of passkeys across devices. The post Okta moves passkeys to cloud, allowing multi-device authentication appeared first on TechRepublic.

article thumbnail

ASUS warns router customers: Patch now, or block all inbound requests

Naked Security

“Do as we say, not as we do!” – The patches took ages to come out, but don’t let that lure you into taking ages to install them.

140
140
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Hiring kit: GDPR data protection compliance officer

Tech Republic Security

The European Union’s General Data Protection Regulation requires every business enterprise and public authority that collects personal data from EU customers and clients to protect that data from unauthorized access. Finding ideal candidates for the GDPR data protection compliance officer position will require thorough vetting, and potential candidates may be difficult to find.

148
148
article thumbnail

Schneider Power Meter Vulnerability Opens Door to Power Outages

Dark Reading

A severe security vulnerability allows credentials for the power meters to continuously transmit in cleartext, allowing device takeover.

138
138

LifeWorks

More Trending

article thumbnail

Hackers infect Linux SSH servers with Tsunami botnet malware

Bleeping Computer

An unknown threat actor is brute-forcing Linux SSH servers to install a wide range of malware, including the Tsunami DDoS (distributed denial of service) bot, ShellBot, log cleaners, privilege escalation tools, and an XMRig (Monero) coin miner. [.

Malware 137
article thumbnail

Burnout: The Hidden Cost of Working in Cybersecurity & Other High Risk Fields

Jane Frankland

Over the years, I’ve come close to burnout but in the fast-paced digital world, especially since the pandemic, burnout has become a silent epidemic. With long hours, tight deadlines, a constant demand for new innovations, and hybrid working, employees are feeling its effects more than ever. But although burnout is a prevalent issue, many people still feel uncomfortable discussing it openly.

article thumbnail

Microsoft fixes Azure AD auth flaw enabling account takeover

Bleeping Computer

Microsoft has addressed an Azure Active Directory (Azure AD) authentication flaw that could allow threat actors to escalate privileges and potentially fully take over the target's account. [.

article thumbnail

Hackers Will Be Quick to Bypass Gmail's Blue Check Verification System

Dark Reading

It's still important to use other security measures, such as strong passwords and two-factor authentication, to protect your data.

Passwords 125
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New RDStealer malware steals from drives shared over Remote Desktop

Bleeping Computer

A cyberespionage and hacking campaign tracked as 'RedClouds' uses the custom 'RDStealer' malware to automatically steal data from drives shared through Remote Desktop connections. [.

Malware 131
article thumbnail

Digital dumpster diving: Exploring the intricacies of recycle bin forensics

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In the vast realm of digital investigations, there exists a fascinating technique known as recycle bin forensics. Delving into the depths of this captivating field unveils a world where seemingly deleted files can still reveal their secrets, allowing digital detectives to reconstruct user activities and uncov

article thumbnail

Over 100,000 ChatGPT accounts stolen via info-stealing malware

Bleeping Computer

More than 101,000 ChatGPT user accounts have been compromised by information stealers over the past year, according to dark web marketplace data. [.

article thumbnail

Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces

The Hacker News

Over 100,000 compromised OpenAI ChatGPT account credentials have found their way on illicit dark web marketplaces between June 2022 and May 2023, with India alone accounting for 12,632 stolen credentials. The credentials were discovered within information stealer logs made available for sale on the cybercrime underground, Group-IB said in a report shared with The Hacker News.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Microsoft shares workaround for Outlook freezes, slow starts

Bleeping Computer

Microsoft is working to address a known issue affecting Outlook for Microsoft 365 customers, causing slow starts and freezes as if Offline Outlook Data Files (OST) are being synced right after launch. [.

126
126
article thumbnail

Identity Crisis: Supreme Court Rules on ‘Identity Theft’ Penalty Enhancement

Security Boulevard

The Supreme Court attempted to define what it means to “use” without lawful authority “a means of identification” of another person. The post Identity Crisis: Supreme Court Rules on ‘Identity Theft’ Penalty Enhancement appeared first on Security Boulevard.

article thumbnail

New Condi malware builds DDoS botnet out of TP-Link AX21 routers

Bleeping Computer

A new DDoS-as-a-Service botnet called "Condi" emerged in May 2023, exploiting a vulnerability in TP-Link Archer AX21 (AX1800) Wi-Fi routers to build an army of bots to conduct attacks. [.

DDOS 120
article thumbnail

100K+ Infected Devices Leak ChatGPT Accounts to the Dark Web

Dark Reading

Infostealers are as alive as ever, wantonly sweeping up whatever business data might be of use to cybercriminals, including OpenAI credentials.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Russian APT28 hackers breach Ukrainian govt email servers

Bleeping Computer

A threat group tracked as APT28 and linked to Russia's General Staff Main Intelligence Directorate (GRU) has breached Roundcube email servers belonging to multiple Ukrainian organizations, including government entities. [.

article thumbnail

Passwords out, passkeys in: are you ready to make the switch?

We Live Security

With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other? The post Passwords out, passkeys in: are you ready to make the switch?

Passwords 106
article thumbnail

A bowl full of security problems: Examining the vulnerabilities of smart pet feeders

SecureList

Introduction In today’s interconnected world, more and more devices are being connected to the internet, including everyday household items like pet feeders that are becoming smart by virtue of this simple fact. However, as these devices become more sophisticated, they also become more vulnerable to cyberattacks. In this blog post, we’ll discuss the results of a vulnerability research study focused on a popular model of smart pet feeder.

Firmware 106
article thumbnail

Preventing and Managing Secrets Leaks

Security Boulevard

Discover the importance of preventing secret leaks and the costly consequences organizations face. Learn why existing tooling falls short and how GuardRails can enhance your security posture. The post Preventing and Managing Secrets Leaks appeared first on GuardRails. The post Preventing and Managing Secrets Leaks appeared first on Security Boulevard.

105
105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Info Stealing Malware Dropped via Only Fans

Heimadal Security

A new malware campaign employs fake OnlyFans content and adult lures to install the remote access trojan ‘DcRAT,’ enabling threat actors to steal data and credentials or deploy ransomware on infected devices. Using OnlyFans for malicious ends is nothing new; in January 2023, attackers exploited an open redirect on a UK government site to send […] The post Info Stealing Malware Dropped via Only Fans appeared first on Heimdal Security Blog.

Malware 105
article thumbnail

Is AI revolutionizing cybersecurity? The answer isn’t as clear.

Security Boulevard

Peruse last quarter’s press releases from top cybersecurity vendors, and it’s hard to miss the focus on artificial intelligence (AI) and machine learning (ML). According to these vendors, traditional security tools are getting boosted by advanced algorithms that can analyze large amounts of event and behavioral data to trigger automated decisions that keep organizations safe.

article thumbnail

Gaps in Azure Service Fabric’s Security Call for User Vigilance

Trend Micro

In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications.

103
103
article thumbnail

Rorschach Ransomware: What You Need to Know

Dark Reading

Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

MOVEit Vulnerability Breaches Targeted Fed Agencies

Trend Micro

MOVEit file transfer vulnerability has breached several U.S. government federal agencies - check back for updates.

article thumbnail

Experts Uncover Year-Long Cyber Attack on IT Firm Utilizing Custom Malware RDStealer

The Hacker News

A highly targeted cyber attack against an East Asian IT company involved the deployment of a custom malware written in Golang called RDStealer. "The operation was active for more than a year with the end goal of compromising credentials and data exfiltration," Bitdefender security researcher Victor Vrabie said in a technical report shared with The Hacker News.

article thumbnail

Biden hosts an AI Forum in San Francisco

CyberSecurity Insiders

As an initial step, the United States leader recently hosted a forum in San Francisco to address issues related to AI development and explore ways in which it can contribute to economic growth while ensuring the well-being and safety of humanity. President Joe Biden engaged in discussions with experts from universities and advocacy groups to identify potential risks associated with the parallel advancement of AI technology.

article thumbnail

VMware warns of critical vRealize flaw exploited in attacks

Bleeping Computer

VMware updated a security advisory published two weeks ago to warn customers that a now-patched critical vulnerability allowing remote code execution is being actively exploited in attacks. [.

100
100
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!