Mon.Aug 14, 2023

article thumbnail

All New Have I Been Pwned Domain Search APIs and Splunk Integration

Troy Hunt

I've been teaching my 13-year old son Ari how to code since I first got him started on Scratch many years ago, and gradually progressed through to the current day where he's getting into Python in Visual Studio Code. As I was writing the new domain search API for Have I Been Pwned (HIBP) over the course of this year, I was trying to explain to him how powerful APIs are: Think of HIBP as one website that does pretty much one thing; you load it in your browser and search through data bre

article thumbnail

China Hacked Japan’s Military Networks

Schneier on Security

The NSA discovered the intrusion in 2020—we don’t know how—and alerted the Japanese. The Washington Post has the story : The hackers had deep, persistent access and appeared to be after anything they could get their hands on—plans, capabilities, assessments of military shortcomings, according to three former senior U.S. officials, who were among a dozen current and former U.S. and Japanese officials interviewed, who spoke on the condition of anonymity because of the matte

Hacking 241
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Diligere, Equity-Invest Are New Firms of U.K. Con Man

Krebs on Security

John Clifton Davies , a convicted fraudster estimated to have bilked dozens of technology startups out of more than $30 million through phony investment schemes, has a brand new pair of scam companies that are busy dashing startup dreams: A fake investment firm called Equity-Invest[.]ch , and Diligere[.]co.uk , a scam due diligence company that Equity-Invest insists all investment partners use.

Scams 221
article thumbnail

At Black Hat, Splunk, AWS, IBM Security and Others Launch Open Source Cybersecurity Framework

Tech Republic Security

With security schema, Splunk and collaborators aim to transform alert telemetry from cacophony to chorus with one taxonomy across vendors and tools.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

A new type of "freedom," or, tracking children with AirTags, with Heather Kelly: Lock and Code S04E17

Malwarebytes

"Freedom" is a big word, and for many parents today, it's a word that includes location tracking. Across America, parents are snapping up Apple AirTags, the inexpensive location tracking devices that can help owners find lost luggage, misplaced keys, and—increasingly so—roving toddlers setting out on mini-adventures. The parental fear right now, according to The Washington Post technology reporter Heather Kelly, is that "anybody who can walk, therefore can walk away.

Mobile 98
article thumbnail

Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives

Tech Republic Security

This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials.

Phishing 148

LifeWorks

More Trending

article thumbnail

5 Tips for Securing Data When Using a Personal Mac for Work

Tech Republic Security

Discover strategies for securing data on your personal Mac for work tasks. Learn how to protect your device against potential threats.

Big data 148
article thumbnail

Colorado HCPF Department notifies 4 million individuals after IBM MOVEit breach

Security Affairs

The Colorado Department of Health Care Policy & Financing (HCPF) disclose a data breach after MOVEit attack on IBM. The Colorado Department of Health Care Policy & Financing (HCPF) disclosed a data breach that impacted more than four million individuals. The incident is the result of a MOVEit attack on IBM, threat actors accessed the personal and health information of the impacted individuals. “After IBM notified HCPF that it was impacted by the MOVEit incident, HCPF launched an in

article thumbnail

Drone Usage Policy

Tech Republic Security

Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife and even providing internet access are just a few of the functions drones can offer. The list is sure to grow longer and more diverse as.

Internet 148
article thumbnail

Phishing with hacked sites

SecureList

Phishers want their fake pages to cost minimum effort but generate as much income as possible, so they eagerly use various tools and techniques to evade detection, and save time and money. Examples include automation with phishing kits or Telegram bots. Another tactic, popular with scammers big and small, phishers included, is hacking websites and placing malicious content on those, rather than registering new domains.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Ongoing Xurum attacks target Magento 2 e-stores

Security Affairs

Experts warn of ongoing attacks, dubbed Xurum, targeting e-commerce websites using Adobe’s Magento 2 CMS. Akamai researchers warn of ongoing attacks, dubbed Xurum, targeting e-commerce websites running the Magento 2 CMS. The attackers are actively exploiting a server-side template injection issue, tracked as CVE-2022-24086 , (CVSS score: 9.8), in Adobe Commerce and Magento Open Source.

Hacking 98
article thumbnail

QwixxRAT: New Remote Access Trojan Emerges via Telegram and Discord

The Hacker News

A new remote access trojan (RAT) called QwixxRAT is being advertised for sale by its threat actor through Telegram and Discord platforms.

article thumbnail

25 most popular websites vs Malwarebytes Browser Guard

Malwarebytes

Do you know how many see-everything-you're-doing-on-the-web trackers get loaded into your browser when you watch a YouTube video? Would you care to guess? It's about sixty. Sixty. Six zero. Sixty trackers when you load one video. I know this because I decided to take Browser Guard, the Malwarebytes' browser extension that blocks ads and keeps you safe from trackers, scams, malvertising, and other online threats, for a wander through the web's top 25 sites.

Scams 98
article thumbnail

Why are CEOs Cyber Resilient?

Cisco Security

I recently attended a session run by the Said Business School at Oxford along with an organisation called Istari. The discussion was based upon their research into at the view CEOs had of cyber resilience. There were two immediate points which struck me. The first is that major cyber incidents are hugely traumatic for CEOs. It is an experience they are ill equipped to deal with when compared to other business challenges.

CISO 98
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Weekly Vulnerability Recap – August 14, 2023 – Old or New, Vulnerabilities Need Management

eSecurity Planet

No one likes the hassle of dealing with patch management or vulnerability management , but it is universally agreed that security breaches are far worse. Many organizations try to proactively patch and manage vulnerabilities to prevent attackers from gaining any foothold. Google announced this week that it will now push out weekly security updates to Chrome to help make users more secure.

article thumbnail

Ford says it’s safe to drive its cars with a WiFi vulnerability

Malwarebytes

Ford has released information about a buffer overflow vulnerability in its SYNC 3 infotainment system. Ford learned from a supplier that a security researcher had discovered a vulnerability in the Wi-Fi software driver supplied for use in the SYNC 3 infotainment system available on some Ford and Lincoln vehicles. The company said it started an investigation and subsequently decided that the vulnerability does not affect vehicle driving safety.

article thumbnail

A Huge Scam Targeting Kids With Roblox and Fortnite 'Offers' Has Been Hiding in Plain Sight

WIRED Threat Level

The wide-ranging scams, often disguised as game promotions, can all be linked back to one network.

Scams 98
article thumbnail

Talking Heimdal XDR with Nabil Nistar, Head of Product Marketing

Heimadal Security

As the new face of Heimdal, I wanted to chat about the ‘product’ with our experts and find out why customers love us. So, I sat down with Nabil Nistar, our Head of Product Marketing, and talked about Heimdal Extended Detection & Response (XDR) solution. It’s a groundbreaking platform that’s transforming our customer’s security. A […] The post Talking Heimdal XDR with Nabil Nistar, Head of Product Marketing appeared first on Heimdal Security Blog.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Have You Factored Cybersecurity Infrastructure into Your Global Growth?

GlobalSign

As companies extend their operations globally, they must prioritise cybersecurity measures to support sustainable long-term growth. Read more.

article thumbnail

Discord.io confirms breach after hacker steals data of 760K users

Bleeping Computer

The Discord.io custom invite service has temporarily shut down after suffering a data breach exposing the information of 760,000 members. [.

article thumbnail

Ongoing Xurum Attacks on E-commerce Sites Exploiting Critical Magento 2 Vulnerability

The Hacker News

E-commerce sites using Adobe's Magento 2 software are the target of an ongoing campaign that has been active since at least January 2023. The attacks, dubbed Xurum by Akamai, leverage a now-patched critical security flaw (CVE-2022-24086, CVSS score: 9.8) in Adobe Commerce and Magento Open Source that, if successfully exploited, could lead to arbitrary code execution.

article thumbnail

Fake Tripadvisor Emails to Distribute Knight Ransomware

Heimadal Security

An ongoing spam campaign spreads Knight ransomware among users. The fake emails imitate Tripadvisor complaint messages. Knight ransomware is the revamp of the Cyclop Ransomware-as-a-Service, starting with July 2023. The Knight Ransomware Spam Campaign A researcher at Sophos detected this new spam campaign that spreads Knight ransomware using fake Tripadvisor complaints.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Bad Bots: Understanding Bad Bots, What They Do, and How to Detect & Stop Them

Digital Guardian

Bad bots, malicious programs and applications designed to deface websites and carry out DDoS attacks, can negatively impact a company's business.

DDOS 98
article thumbnail

Holistically Safeguarding Ethical Development in ChatGPT, Other AI Tools

SecureWorld News

This is Part 2 of a three-part series tackling the topic of generative AI tools. This second installment is "Safeguarding Ethical Development in ChatGPT and Other AI Tools through a Holistic Approach: Integrating Security, Governance, and Psychological Considerations." In the realm of generative AI tools, such as Language Learning Models (LLMs), it is essential to take a comprehensive approach toward the development and deployment.

article thumbnail

Following Pushback, Zoom Says It Won't Use Customer Data to Train AI Models

Dark Reading

Company's experience highlights the tightrope tech organizations walk when integrating AI into their products and services.

95
article thumbnail

NIST Framework Version 2.0 a Smart Evolution from 1.1

SecureWorld News

Did you see that on August 8, 2023, the U.S. National Institute of Standards and Technology (NIST) released the Initial Public Draft of its Cybersecurity Framework (CSF) version 2.0? Shortly after it was originally published in 2014, I started using the CSF with our customers to help them find and mitigate their top five cyber risks. As a heavy user of CSF, I read the Public Draft carefully, and there's a lot to like.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New Financial Malware 'JanelaRAT' Targets Latin American Users

The Hacker News

Users in Latin America (LATAM) are the target of a financial malware called JanelaRAT that's capable of capturing sensitive information from compromised Microsoft Windows systems.

Malware 94
article thumbnail

What's New in the NIST Cybersecurity Framework 2.0

Dark Reading

Update to the NIST framework adds new "govern" function for cybersecurity.

article thumbnail

Identity Threat Detection and Response: Rips in Your Identity Fabric

The Hacker News

Why SaaS Security Is a Challenge In today's digital landscape, organizations are increasingly relying on Software-as-a-Service (SaaS) applications to drive their operations. However, this widespread adoption has also opened the doors to new security risks and vulnerabilities. The SaaS security attack surface continues to widen.

article thumbnail

Microsoft enables Windows Kernel CVE-2023-32019 fix for everyone

Bleeping Computer

Microsoft has enabled a fix for a Kernel information disclosure vulnerability by default for everyone after previously disabling it out of concerns it could introduce breaking changes to Windows. [.

92
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!