Wed.Feb 15, 2023

article thumbnail

Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

Tech Republic Security

A report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and web apps. The post Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube appeared first on TechRepublic.

Phishing 186
article thumbnail

IoC detection experiments with ChatGPT

SecureList

ChatGPT is a groundbreaking chatbot powered by the neural network-based language model text-davinci-003 and trained on a large dataset of text from the Internet. It is capable of generating human-like text in a wide range of styles and formats. ChatGPT can be fine-tuned for specific tasks, such as answering questions, summarizing text, and even solving cybersecurity-related problems, such as generating incident reports or interpreting decompiled code.

Malware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Twitter outage says about (over) zealous downsizing

Tech Republic Security

The outage message that Twitter users got last week could be read as a warning for big tech firms looking to slash their IT workforce. The post What Twitter outage says about (over) zealous downsizing appeared first on TechRepublic.

149
149
article thumbnail

BrandPost: The Future of Machine Learning in Cybersecurity

CSO Magazine

Machine learning (ML) is a commonly used term across nearly every sector of IT today. And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity. This article will share reasons why ML has risen to such importance in cybersecurity, share some of the challenges of this particular application of the technology and describe the future that machine

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to secure your iOS device to prevent unwanted access

Tech Republic Security

Leaving your iOS device unattended can pose a security risk as more iOS users are carrying personal information on their devices. Keep it secure with these handy tips. The post How to secure your iOS device to prevent unwanted access appeared first on TechRepublic.

Risk 136
article thumbnail

Oligo Security Mitigates Open Source Vulnerabilities at Runtime

Security Boulevard

Oligo Security today launched a runtime application security and observability platform that enables cybersecurity teams to detect and prioritize open source code vulnerabilities based on severity without affecting performance. Fresh from raising $28 million in funding, Oligo CEO Nadav Czerninski said the Oligo platform makes use of dynamic library-level analysis and behavior monitoring software to.

Software 130

More Trending

article thumbnail

Ransomware Closed 2022 With a Bang, Fueled by RaaS

Security Boulevard

It comes as no surprise that, as last year came to a close, Microsoft was tracking more than 50 unique active ransomware families and more than 100 threat actors that were using ransomware in their attacks. After all, ransomware is still a familiar, destructive and sometimes costly foe; 2022 ended with the Sandworm gang launching. The post Ransomware Closed 2022 With a Bang, Fueled by RaaS appeared first on Security Boulevard.

article thumbnail

Defending against attacks on Azure AD: Goodbye firewall, hello identity protection

CSO Magazine

Not too long ago, guarding access to the network was the focal point of defense for security teams. Powerful firewalls ensured that attackers were blocked on the outside while on the inside things might get “squishy,” allowing users fairly free rein within. Those firewalls were the ultimate defense—no one undesirable got access. Until they did. With the advent of cloud computing, the edge of a network is no longer protected by a firewall.

Firewall 126
article thumbnail

Secure 5G Networks Key for Business and Society

Security Boulevard

As 5G networks continue to roll out, cybersecurity is top-of-mind for communication service providers (CSPs). The telecom industry was the most targeted vertical, attracting 37% of security attacks compared to 14% for the next-highest industry vertical according to CrowdStrike’s 2022 threat report. Understanding a fast-moving digital landscape comes with unique challenges, and more industries and.

article thumbnail

10 signs that scammers have you in their sights

We Live Security

Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing The post 10 signs that scammers have you in their sights appeared first on WeLiveSecurity

Scams 117
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Veeam offers $5 million data recovery warranty from ransomware attacks

CyberSecurity Insiders

Are you worried about ransomware hitting your servers, putting a dent in your data intensive business? If that’s so, then Veeam Backup and Replication software is offering a data recovery warranty of $5 million from ransomware attacks. Veeam’s Premium Edition offers Modern Data Protection and Recovery capabilities against many cyber attacks, including those emerging out of file encrypting malware.

article thumbnail

Microsoft Patch Tuesday Includes Three Exploited Zero-Day Vulnerabilities

eSecurity Planet

Microsoft’s February 2023 Patch Tuesday fixes 75 vulnerabilities, nine of them rated critical, and three (all rated important) that are being exploited. “This is only the second Patch Tuesday of the year, and we have already tripled the number of weaponized threats that need to be fixed in this release,” Syxsense CEO and founder Ashley Leonard told eSecurity Planet. “We also have five patches that resolve vulnerabilities with a CVSS score of more than 9 (critical), which

article thumbnail

Global Marketing Leader Pam El Joins the IDIQ Board of Directors

Identity IQ

Global Marketing Leader Pam El Joins the IDIQ Board of Directors IdentityIQ -Veteran marketer brings decades of experience working with billion-dollar brands such as the NBA, Nationwide Financial and State Farm to IDIQ- Temecula, CA, Feb. 15, 2023— IDIQ , an industry leader in identity theft protection and credit monitoring, today announced the appointment of Pam El, a marketing veteran and former executive vice president and chief marketing officer at the National Basketball Association, to its

Marketing 105
article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

First is the news about the compromise of a SAS network as hackers disrupted Scandinavian airlines computer network and accessed information related to thousands of customers. Karin Nyman, the in-charge spokesperson of SAS, stated that his company was working on remediating the effects of the digital attack and urged customers to stay away from the mobile app for now.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Gulp! Pepsi hack sees personal information stolen by data-stealing malware

Graham Cluley

Towards the end of last year, malicious hackers broke into the systems of Pepsi Bottling Ventures, the largest privately-owned bottler of Pepsi-Cola beverages in the USA, and installed malware. For almost the month the malware secretly exfiltrated personally identifiable information (PII) from the company's network. Read more in my article on the Hot for Security blog.

Malware 98
article thumbnail

What is Data Loss Prevention?

Security Boulevard

Data Loss Prevention, commonly referred to as DLP, refers to policies, technologies, and controls used by organizations to prevent accidental leaks, misuse, or intentional theft of sensitive data by users, malicious insiders, or external attackers. Strategies can include forcing encryption of shared data, restricting access to sensitive data to only those employees with legitimate needs, … Continued The post What is Data Loss Prevention?

article thumbnail

GitHub Copilot update stops AI model from revealing secrets

Bleeping Computer

GitHub has updated the AI model of Copilot, a programming assistant that generates real-time source code and function recommendations in Visual Studio, and says it's now safer and more powerful. [.

98
article thumbnail

Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns

Trend Micro

We detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was presented in full at the JSAC 2023 in January 2023.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Security tool adoption jumps, Okta report shows

CSO Magazine

Identity and access management ( IAM ) vendor Okta today released a report detailing app use and security trends among its broad user base. Among other trends it identified, the report found that zero trust security policies have become more common, and uptake of a wide range of security tools has been sharply on the rise. Okta survyed 17,000 customers globally, and found that zero trust usage among its clients has increased from 10% two years ago to 22% today, indicating both that the philosop

article thumbnail

Hyundai, Kia patch bug allowing car thefts with a USB cable

Bleeping Computer

Automakers Hyundai and KIA are rolling out an emergency software update on several of their car models impacted by an easy hack that makes it possible to steal them. [.

article thumbnail

Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the Radar

The Hacker News

Cybersecurity researchers have unearthed a new piece of evasive malware dubbed Beep that's designed to fly under the radar and drop additional payloads onto a compromised host. "It seemed as if the authors of this malware were trying to implement as many anti-debugging and anti-VM (anti-sandbox) techniques as they could find," Minerva Labs researcher Natalie Zargarov said.

Malware 91
article thumbnail

City of Oakland declares state of emergency after ransomware attack

Bleeping Computer

Oakland has declared a local state of emergency because of the impact of a ransomware attack that forced the City to take all its IT systems offline on February 8th. [.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

What Is OPSEC: Operational Security Explained

Heimadal Security

Also known as operational security or procedural security, OPSEC is a security and risk management process that prevents sensitive information from falling into the hands of malicious actors. Originating in the military, OPSEC became a popular practice in the private sector as well, helping organizations to protect customer data, address cyberespionage, and information security.

article thumbnail

Russian Cybercriminal Faces Decades in Prison for Hacking and Trading Operation

Dark Reading

Vladislav Klyushin and co-conspirators used SEC filings stolen from the networks of Tesla, Roku, and other publicly traded companies to earn nearly $100 million in illegal trades.

Hacking 88
article thumbnail

Adobe addressed critical bugs in Illustrator, After Effects Software

Security Affairs

Adobe Patch Tuesday addressed at least a half dozen vulnerabilities, including critical issues that expose Windows and macOS to hack. Adobe released security updates to address at least a half dozen vulnerabilities impacting Photoshop, Illustrator and After Effects for both Windows and macOS users. Adobe addressed four critical issues (CVE-2022-24094, CVE-2022-24095, CVE-2022-24096, and CVE-2022-24097) affecting the After Effects products, successful exploitation could lead to arbitrary code exe

article thumbnail

US Border Patrol Is Finally Able to Check E-Passport Data

WIRED Threat Level

After 16 years, the agency has implemented the software to cryptographically verify digital passport data—and it’s already caught a dozen alleged fraudsters.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Citrix released security updates for multiple High-Severity flaws in its products

Security Affairs

Citrix released security updates for multiple High-Severity flaws in Virtual Apps and Desktops, and Workspace apps for Windows and Linux. Citrix released security patches to fix multiple vulnerabilities in Virtual Apps and Desktops, and Workspace apps for Windows and Linux. The first issue listed in the support Knowledge Center of the company, tracked as CVE-2023-24483 , is a Privilege Escalation to NT AUTHORITYSYSTEM on the vulnerable VDA. “A vulnerability has been identified that, if exp

Hacking 88
article thumbnail

1 Million Downloads Later: How An Android Game Leaked Private Data

Heimadal Security

Researchers discovered that the Tap Busters: Bounty Hunters app had left their database open to the public for at least five months, exposing users’ private conversations. Additionally, sensitive data was hardcoded into the client side of the app, making it vulnerable to further leaks. With over one million downloads on Google Play Store and more […] The post 1 Million Downloads Later: How An Android Game Leaked Private Data appeared first on Heimdal Security Blog.

article thumbnail

Fake Hogwarts Legacy cracks lead to adware, scams

Malwarebytes

Hogwarts Legacy , the much-anticipated Harry Potter video game, has finally landed on major gaming platforms. But, as with all games like this, it comes with a steep price tag, so it's no surprise to suddenly see websites peddling "cracked" versions of the game for free. These sites are easily accessible via a quick Google search. "hogwarts legacy crack" sample search result by Google (Source: Malwarebytes | Stefan Dasic) Cracked games are games that are rendered playable due to tampering or fil

Adware 85
article thumbnail

Antivirus versus Anti Malware: Which One Should You Choose?

Heimadal Security

Protecting your computer from malicious attacks is an important part of keeping it safe and secure. But with the vast array of antivirus and anti-malware programs available, it can be difficult to determine which one is best for your needs. A successful malware attack has great impact on both users and organizations, causing data loss, […] The post Antivirus versus Anti Malware: Which One Should You Choose?

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.