Mon.Aug 21, 2023

article thumbnail

White House Announces AI Cybersecurity Challenge

Schneier on Security

At Black Hat last week, the White House announced an AI Cyber Challenge. Gizmodo reports : The new AI cyber challenge (which is being abbreviated “AIxCC”) will have a number of different phases. Interested would-be competitors can now submit their proposals to the Small Business Innovation Research program for evaluation and, eventually, selected teams will participate in a 2024 “qualifying event.” During that event, the top 20 teams will be invited to a semifinal competi

article thumbnail

GUEST ESSAY: Lessons to be learned from the waves of BofA phone number spoofing scams

The Last Watchdog

Phone number spoofing involves manipulating caller ID displays to mimic legitimate phone numbers, giving scammers a deceptive veil of authenticity. Related: The rise of ‘SMS toll fraud’ The Bank of America scam serves as a prime example of how criminals exploit this technique. These scammers impersonate Bank of America representatives, using the genuine bank’s phone number (+18004321000) to gain trust and deceive their targets.

Scams 189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Innovation Hides in Plain Sight and Openly Delights

Tech Republic Security

Smart spaces bring together universal connectivity, security, and intelligence to modernize the workspace experience. But what are technology leaders saying about this accelerated digital transition to smarter spaces? What are the benefits? Where is the room for growth? A recent CIO Dive survey reveals how teams across industries are working toward answering these questions.

article thumbnail

News Alert: airSlate partners with Forthright to launch automated business-efficiency, workflow tool

The Last Watchdog

Boston, Mass, Aug. 22, 2023 – airSlate , a leader in document workflow automation solutions, today announced the launch of QuickStart in collaboration with partner Forthright Technology Providers , a leading provider of user-centric IT solutions and services. The comprehensive package, available at a fixed price, combines airSlate’s automation tools, including customizable workflows and built-in eSignatures, with Forthright’s professional services, enabling organizations to streamline business

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Reimagining Your Video Data Strategy

Tech Republic Security

Did you know that about 99% of surveillance video goes unviewed? What if you could use that video data to simplify operations, manage physical assets, and boost employee health and well-being? Insights and analytics from IoT technologies are key to your organization’s digital transformation. Check out our e-book for the latest tech trends in physical.

article thumbnail

New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

The Hacker News

A high-severity security flaw has been disclosed in the WinRAR utility that could be potentially exploited by a threat actor to achieve remote code execution on Windows systems. Tracked as CVE-2023-40477 (CVSS score: 7.8), the vulnerability has been described as a case of improper validation while processing recovery volumes.

98

LifeWorks

More Trending

article thumbnail

LOL WinRAR: Serious One-Click Bug (Patch NOW)

Security Boulevard

Even if You Are not a Pirate: Fix for CVE-2023-40477 now available. The post LOL WinRAR: Serious One-Click Bug (Patch NOW) appeared first on Security Boulevard.

article thumbnail

BlackCat ransomware group claims the hack of Seiko network

Security Affairs

The BlackCat/ALPHV ransomware group claims to have hacked the Japanese maker of watches Seiko and added the company to its data leak site. On August 10, 2023, the Japanese maker of watches Seiko disclosed a data breach following a cyber attack. “Seiko Group Corporation (hereinafter referred to as “the Company” or “we”) has confirmed that on July 28th of this year, the Company suffered a possible data breach.

Hacking 98
article thumbnail

Trusted Advisor puts you in the security driving seat

Malwarebytes

Malwarebytes' new Trusted Advisor dashboard provides an easy to understand assessment of your security with a single comprehensive protection score, and clear, expert-driven advice. Computer security can be difficult and time consuming. Getting it right means knowing what software needs to be updated, whether your system settings are configured securely, running active protection that can block and remove malware, and performing regular scans to uncover hidden threats.

Malware 98
article thumbnail

Spoofing an Apple device and tricking users into sharing sensitive data

Security Affairs

White hat hackers at the recent hacking conference Def Con demonstrated how to spoof an Apple device and trick users into sharing their sensitive data. At the recent Def Con hacking conference, white hat hackers demonstrated how to spoof an Apple device and trick users into sharing their sensitive data. As reported by Techcrunch, attendees at the conference using iPhones started observing pop-up messages prompting them to connect their Apple ID or share a password with a nearby Apple TV.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

What Is Secure Remote Access?

eSecurity Planet

Secure remote access protects remote business communications that are otherwise susceptible to network and remote protocol exploits. Remote access plays an important role for businesses with remote workforces, geographically disparate branch offices, and limited technical resources. Because it creates connections between a client device and a host device, remote access must be secured.

VPN 98
article thumbnail

This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

The Hacker News

Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit nodes to reroute proxy requests.

Malware 98
article thumbnail

Ivanti fixed a new critical Sentry API authentication bypass flaw

Security Affairs

Ivanti warned customers of a new critical Sentry API authentication bypass vulnerability tracked as CVE-2023-38035. The software company Ivanti released urgent security patches to address a critical-severity vulnerability, tracked as CVE-2023-38035 (CVSS score 9.8), in the Ivanti Sentry (formerly MobileIron Sentry) product. The vulnerability could be exploited to access sensitive API data and configurations, run system commands, or write files onto the system.

article thumbnail

Demystifying Duo APIs: Advanced Security with Duo Integrations

Cisco Security

At Cisco Duo , our primary objective is to prevent unauthorized access with a modern and user-friendly access management solution. Security is paramount to organizations of all sizes, and we are committed to providing secure and streamlined access for the workforce, regardless of their location whether they are at home, in the office or on the road.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New HiatusRAT campaign targets Taiwan and U.S. military procurement system

Security Affairs

HiatusRAT malware operators resurfaced with a new wave of attacks targeting Taiwan-based organizations and a U.S. military procurement system. In March 2023, Lumen Black Lotus Labs researchers uncovered a sophisticated campaign called “ HiatusRAT ” that infected over 100 edge networking devices globally. Threat actors leveraged edge routers, or “living on the edge” access, to passively collect traffic and set up a covert C2 infrastructure.

article thumbnail

Introducing Heimdal XDR: A Game-Changer Disrupting the Market with the Widest Range of Next-Generation Solutions

Heimadal Security

Heimdal® has announced its entry into the Extended Detection and Response (XDR) market with a disruptive SaaS platform. The company offers the widest XDR suite in the industry, featuring 10-in-1 award-winning solutions, all in one unified, easy-to-use console. Discover Extended Detection and Response. XDR Solution by Heimdal. XDR represents a paradigm shift in cybersecurity, offering comprehensive […] The post Introducing Heimdal XDR: A Game-Changer Disrupting the Market with the Widest Ra

article thumbnail

Ongoing Duo outage causes Azure Auth authentication errors

Bleeping Computer

Cisco-owned multi-factor authentication (MFA) provider Duo Security is investigating an ongoing outage that has been causing authentication failures and errors starting three hours ago. [.

article thumbnail

QR codes used to phish for Microsoft credentials

Malwarebytes

Researchers have published details about a phishing campaign that uses QR codes to phish for Microsoft credentials. A QR (Quick Response) code is a kind of two-dimensional barcode that holds encoded data in a graphical black-and-white pattern. The data that a QR code stores can include URLs, email addresses, network details, Wi-Fi passwords, serial numbers, etc.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Simplified Reporting: Paginated Reports via Power BI Report Builder

SecureBlitz

Power BI has become a powerhouse in the constantly changing world of business intelligence and data analysis, helping enterprises to turn raw data into useful insights. Power BI Report Builder's ability to produce paginated reports stands out among its variety of capabilities for its accuracy and organized reporting style. Using Power BI Paginated reports, we'll […] The post Simplified Reporting: Paginated Reports via Power BI Report Builder appeared first on SecureBlitz Cybersecurity.

article thumbnail

Chrome will soon start removing extensions that may be unsafe

Malwarebytes

Retroactive removals are finally on the way for malicious Chrome browser extensions. Beginning with Chrome 117 , Chrome will “proactively highlight to users when an extension they have installed is no longer in the Chrome web store” Previously, if you installed an extension which was subsequently unpublished by the developer or removed by Google, the extension you installed would remain in place, even if it was malicious.

Malware 98
article thumbnail

What Is Network Access Control (NAC)?

Heimadal Security

Network Access Control (NAC) is a cybersecurity technology that regulates access to network resources based on predefined policies and regulations. By identifying, verifying, and assessing the compliance of devices and users trying to connect to a network, NAC helps guarantee that only authorized and secure devices obtain access. It does this by checking device characteristics, […] The post What Is Network Access Control (NAC)?

article thumbnail

Critical Adobe ColdFusion Flaw Added to CISA's Exploited Vulnerability Catalog

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, cataloged as CVE-2023-26359 (CVSS score: 9.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What is Clone Phishing and How Do I Avoid It?

Identity IQ

What is Clone Phishing and How Do I Avoid It? IdentityIQ Nowadays, cyber threats are something we can’t ignore – and as technology advances, so do the methods used by scammers. One of the most devious tricks that they use is called clone phishing. In this blog post, we dive into the world of clone phishing, shedding light on what it is, the potential risks it poses, and most importantly, how to protect yourself from falling victim to it.

article thumbnail

Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software

The Hacker News

Software services provider Ivanti is warning of a new critical zero-day flaw impacting Ivanti Sentry (formerly MobileIron Sentry) that it said is being actively exploited in the wild, marking an escalation of its security woes. Tracked as CVE-2023-38035 (CVSS score: 9.8), the issue has been described as a case of authentication bypass impacting versions 9.

article thumbnail

Weekly Vulnerability Recap – August 21, 2023 – When ACE Equals Bad

eSecurity Planet

Normally, ‘ace’ implies something great, such as to ace an exam or to draw an ace in Blackjack. Unfortunately, arbitrary code execution (ACE) means that an attacker can use a vulnerability to execute any code they want on a device. In the vulnerabilities covered this week, attackers used an ACE vulnerability to install webshells and similar backdoors on vulnerable systems.

article thumbnail

Cuba Ransomware Exploits Veeam Flaw, Targets U.S. and Latin American Entities

Heimadal Security

The Cuba ransomware gang has been seen launching attacks on critical infrastructure organizations in the U.S. and IT firms in Latin America, employing a mix of older and newer hacking tools. The latest campaign, identified by BlackBerry’s Threat Research and Intelligence team in early June 2023, reveals that Cuba is using CVE-2023-27532 to extract credentials […] The post Cuba Ransomware Exploits Veeam Flaw, Targets U.S. and Latin American Entities appeared first on Heimdal Security

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Navigating the Australian Privacy Act 1988: Implications and Preparedness for Organizations

Digital Guardian

The Australian Privacy Act 1988 has been a cornerstone in protecting Australians’ privacy rights and governing how personal information is collected, used, and managed by organizations. Here you’ll find more about what the Privacy Act is and how it could impact you or your organization.

article thumbnail

The Psychology of Insider Risk Management

Security Boulevard

In the second episode of Conversations from the Inside: The Psychology of Insider Risk Management: Time and Place Matters, renowned intelligence and security expert Christopher Burgess sat down with MITRE’s Chief Scientist for Insider Threat Research & Solutions and Senior Principal Behavioral Scientist for Insider Threat, Dr. Deanna Caputo, to discuss the role of human … Continued The post The Psychology of Insider Risk Management appeared first on DTEX Systems Inc.

Risk 97
article thumbnail

How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes

The Hacker News

From a user’s perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation process and gain immediate access to whatever new app or integration you’re seeking.

article thumbnail

Legit Security ASPM Platform Update: Accelerating AppSec Efficiency and Effectiveness

Security Boulevard

In the fast-paced world of modern development that is driven by the constant need for innovation and rapid delivery, security teams are facing an increasing challenge in ensuring secure application delivery. The adoption of agile and CI/CD practices results in hundreds of code changes that are being pushed into production every day. To keep up with the pace of innovation and ensure that these changes aren’t introducing new risks and critical vulnerabilities into the software development lifecyc

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!