Tue.Sep 26, 2023

article thumbnail

Signal Will Leave the UK Rather Than Add a Backdoor

Schneier on Security

Totally expected, but still good to hear : Onstage at TechCrunch Disrupt 2023, Meredith Whittaker, the president of the Signal Foundation, which maintains the nonprofit Signal messaging app, reaffirmed that Signal would leave the U.K. if the country’s recently passed Online Safety Bill forced Signal to build “backdoors” into its end-to-end encryption. “We would leave the U.K. or any jurisdiction if it came down to the choice between backdooring our encryption and betrayin

article thumbnail

Australian Government’s ‘Six Cyber Shields’ Is Potentially a Well-Meaning Skills Crisis

Tech Republic Security

The Australian government’s new national cyber security strategy might have the inadvertent effect of making security efforts even more difficult for businesses by intensifying the current skills shortage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical libwebp Vulnerability Under Active Exploitation - Gets Maximum CVSS Score

The Hacker News

Google has assigned a new CVE identifier for a critical security flaw in the libwebp image library for rendering images in the WebP format that has come under active exploitation in the wild. Tracked as CVE-2023-5129, the issue has been given the maximum severity score of 10.0 on the CVSS rating system.

143
143
article thumbnail

Quick Glossary: Malware

Tech Republic Security

Malware is an insidious infection that will steal productivity from your enterprise and potentially wreak havoc on your network. To prevent and counteract malware, it’s important to know the terminology surrounding it. This list of terms from TechRepublic Premium will help you grasp the vocabulary that describes malware and the technology that spawns it.

Malware 186
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Microsoft is Rolling out Support for Passkeys in Windows 11

The Hacker News

Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major update to the desktop operating system. The feature allows users to login to websites and applications without having to provide a username and password, instead relying on their device PIN or biometric information to complete the step.

Passwords 142
article thumbnail

ProtonVPN vs. AtlasVPN (2023): Which VPN Should You Use?

Tech Republic Security

Which VPN is better, ProtonVPN or AtlasVPN? Read our in-depth comparison to decide which one fits you in terms of pricing, key features and more.

VPN 174

LifeWorks

More Trending

article thumbnail

Identity Theft Protection Policy

Tech Republic Security

Help protect your employees and customers from identity theft. This policy from TechRepublic Premium outlines precautions for reducing risk, signs to watch out for and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since identity theft can still occur.

article thumbnail

ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families

The Hacker News

Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as many as seven different ransomware families over the past year. "ShadowSyndicate is a threat actor that works with various ransomware groups and affiliates of ransomware programs," Group-IB and Bridewell said in a joint technical report.

article thumbnail

The Rhysida ransomware group hit the Kuwait Ministry of Finance

Security Affairs

This week the Rhysida ransomware group claimed the hack of the Kuwait Ministry of Finance and added it to its Tor leak site. Last week a ransomware attack hit the Government of Kuwait, the attack took place on September 18 and the government experts immediately started the incident response procedures to block the threat. Below is the message published on Twitter by the official X account of Kuwait’s Ministry of Finance.

article thumbnail

Risk of a US Government Shutdown Is Fueled by Very Online Republicans

WIRED Threat Level

Egged on by a far-reaching conservative media ecosystem, right-wing hardliners are forcing Washington to bend to their reality as the federal government careens toward a possible shutdown.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign

The Hacker News

A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government organizations.

article thumbnail

BORN Ontario data breach impacted 3.4 million newborns and pregnancy care patients

Security Affairs

The Better Outcomes Registry & Network (BORN), the Ontario birth registry disclosed a data breach affecting some 3.4 million people. The Better Outcomes Registry & Network (BORN) is a program and database used in the healthcare sector, particularly in maternal and child health, to collect, manage, and analyze health information for the purpose of improving patient outcomes and healthcare services.

article thumbnail

Essential Guide to Cybersecurity Compliance

The Hacker News

SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym soup that can make even a compliance expert’s head spin. If you’re embarking on your compliance journey, read on to discover the differences between standards, which is best for your business, and how vulnerability management can aid compliance.

article thumbnail

Threat actors claim the hack of Sony, and the company investigates

Security Affairs

Sony launched an investigation into an alleged data breach after the RansomedVC group claimed the hack of the company. Sony announced it is investigating allegations of a data breach after the RansomedVC extortion group claimed to have hacked the company and added the company to its Tor leak site. “We are currently investigating the situation, and we have no further comment at this time.

Hacking 132
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Xenomorph Banking Trojan: A New Variant Targeting 35+ U.S. Financial Institutions

The Hacker News

An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 financial institutions in the U.S. The campaign, according to Dutch security firm ThreatFabric, leverages phishing web pages that are designed to entice victims into installing malicious Android apps that target a broader list of apps than its predecessors.

Banking 134
article thumbnail

Xenomorph malware is back after months of hiatus and expands the list of targets

Security Affairs

A new campaign is spreading Xenomorph malware to Android users in the United States, Spain, Portugal, Italy, Canada, and Belgium. Researchers from ThreatFabric uncovered a new campaign spreading Xenomorph malware to Android users in the United States and all over the world. In February 2022, researchers from ThreatFabric first spotted the Xenomorph malware, which was distributed via the official Google Play Store reaching over 50,000 installations.

Malware 130
article thumbnail

Amidst MGM, Caesar's Incidents, Attackers Focus on Luxury Hotels

Dark Reading

A fast-growing cyber campaign solely takes aim at luxury hotel and resort chains, using security-disruptive tactics to spread info-stealing malware.

Malware 129
article thumbnail

Google assigns new maximum rated CVE to libwebp bug exploited in attacks

Bleeping Computer

Google has assigned a new CVE ID (CVE-2023-5129) to a libwebp security vulnerability exploited as a zero-day in attacks and patched two weeks ago. [.

128
128
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Smishing Triad Stretches Its Tentacles into the United Arab Emirates

Security Affairs

Resecurity research found that the ‘Smishing Triad’ cybercrime group has expanded its phishing campaign into the United Arab Emirates (UAE). Resecurity research recently found that ‘ Smishing Triad ,’ a group specializing in phishing scams conducted via SMS (smishing attacks), has expanded its attack campaign into the United Arab Emirates (UAE).

Phishing 127
article thumbnail

New ZeroFont phishing tricks Outlook into showing fake AV-scans

Bleeping Computer

Hackers are utilizing a new trick of using zero-point fonts in emails to make malicious emails appear as safely scanned by security tools in Microsoft Outlook. [.

Phishing 128
article thumbnail

Can open-source software be secure?

We Live Security

Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?

Software 126
article thumbnail

Top 5 Problems Solved by Data Lineage

Security Affairs

Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle. In an age where data drives decisions and fuels innovation, understanding the journey of data from its inception to its final destination is paramount. Data lineage provides this understanding. Data lineage is the visualization and tracking of data as it moves through various stages of its lifecycle, and it offers a host of benefits in solving critical data management challenges.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic

The Hacker News

How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry Gain insights to help improve and accelerate your organization’s threat response Summary of Findings The Network Effect Threat Report offers insights based on unique data from Fastly’s Next-Gen WAF from Q2 2023 (April 1, 2023 to June 30, 2023).

article thumbnail

Nearly 900 Schools Impacted by MOVEit Breach

SecureWorld News

In the midst of the global surge in cybersecurity incidents, the MOVEit vulnerability has impacted thousands of organizations worldwide, exposing persistent vulnerabilities. From global energy giant Shell to the New York City Department of Education to the Oregon DMV , it appears that not many organizations are safe from this breach. Now, another victim has emerged.

Education 120
article thumbnail

Get a Sneak Peek at a Community Meeting Presentation on Speaking the Same Language As Your Assessor

PCI perspectives

Do not pass up the chance to collaborate and gain knowledge on the latest developments in payment security at the upcoming PCI SSC Community Meetings. These events feature presentations from some of the sharpest minds in payment security. Below Peggy Nolan , PCIP, CISA, CEO, Payment Card Assessments provides a preview of her presentation on Speaking the Same Language as Your Assessor.

113
113
article thumbnail

Xenomorph Android Banking Trojan Makes Landfall in US

Security Boulevard

A sophisticated Android banking trojan that was first seen last year targeting banking apps in several European countries has made its way across the Atlantic Ocean, looking to steal credentials and money from customers of such U.S. financial institutions as Chase, Bank of America, American Express, and USAA. In all, the Xenomorph malware is zeroing.

Banking 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

NY College Must Spend $3.5M on Cybersecurity After Breach Affecting 200k Students

Heimadal Security

After a data breach in 2021 exposed the personal information of nearly 200,000 people, the attorney general of New York requested a university to invest $3.5 million in cybersecurity. The measure addresses the data security deficiencies that led to a ransomware attack in 2021. Marymount Manhattan College (MMC), a liberal arts college in New York […] The post NY College Must Spend $3.5M on Cybersecurity After Breach Affecting 200k Students appeared first on Heimdal Security Blog.

article thumbnail

Webinar: Bridging digital transformation & cybersecurity

Malwarebytes

Digital transformation may be revolutionizing businesses and the way we operate, but it also presents notable challenge: How can organizations stay secure amidst the ceaseless tide of change? Our latest Byte Into Security webinar has the answers. Meet the Experts Marcin Kleczynski , CEO of Malwarebytes, teams up with Chris Brock, Drummond's Chief Information Officer.

article thumbnail

Preparing for the 20th Annual Cybersecurity Awareness Month

SecureWorld News

Before we carve pumpkins and dress up for Halloween, October brings an important awareness campaign: Cybersecurity Awareness Month. This year marks two decades of promoting stronger digital safety habits across the globe. Cybersecurity Awareness Month is a 31-day reminder that protecting your online presence can be both important and a little bit spooky.

article thumbnail

Suspicious New Ransomware Group Claims Sony Hack

Dark Reading

A deceitful threat actor claims its biggest haul yet. But what, if any, Sony data does it actually have?

Hacking 103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!