Mon.Jul 17, 2023

article thumbnail

Oops! Simple Typo Causes Over 100,000 Sensitive US Military Emails To Be Delivered To Pro-Russia Government Of Mali

Joseph Steinberg

A simple, single-letter typo has caused perhaps as many as several million email messages sent by members of the US Military to be inappropriately delivered to the African country of Mali, an ally of Russia in which contractors from the infamous Russian military contractor, Wagner Group, have been assisting Mali’s armed forces. It appears that for as long as a decade, various users of military email systems sent messages to emails addresses using the top-level domain “.ML,” the domain for

article thumbnail

Tracking Down a Suspect through Cell Phone Records

Schneier on Security

Interesting forensics in connection with a serial killer arrest: Investigators went through phone records collected from both midtown Manhattan and the Massapequa Park area of Long Island—two areas connected to a “burner phone” they had tied to the killings. (In court, prosecutors later said the burner phone was identified via an email account used to “solicit and arrange for sexual activity.” The victims had all been Craigslist escorts, according to officials.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using Snapshots to Improve Data Security

Tech Republic Security

Snapshots are an effective way to improve the security of your data. Learn about different ways to use them to enhance your data security.

148
148
article thumbnail

Future Proofing Tech Investments in Turbulent Times: Real Stories

Jane Frankland

The tech sector is always dynamic, always changing. But now it’s transforming faster and more unpredictably than ever. Given a whole range of PESTLE factors, IT decision makers (ITDMs) from small businesses to enterprises with managed IT environments are under increasing pressure to make smarter investments with their budgets. This includes everything from productivity and cybersecurity to superior computing experiences for employees, who are increasingly collaborating remotely, multitasking, an

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Adobe warns customers of a critical ColdFusion RCE exploited in attacks

Security Affairs

Adobe is warning customers of a critical ColdFusion pre-authentication RCE bug, tracked as CVE-2023-29300, which is actively exploited. Adobe warns customers of a critical ColdFusion pre-authentication remote code execution vulnerability, tracked as CVE-2023-29300 (CVSS score 9.8), that is actively exploited in attacks in the wild. “Adobe is aware that CVE-2023-29300 has been exploited in the wild in very limited attacks targeting Adobe ColdFusion,” reads a statement sent by the comp

article thumbnail

OPSEC FAIL: US Military Email Going to Mali — via Typo

Security Boulevard

MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in.ML The post OPSEC FAIL: US Military Email Going to Mali — via Typo appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

Forbes Technology Council: Why Large Language Models (LLMs) Alone Won’t Save Cybersecurity

Security Boulevard

The star of the moment is Large Language Models (aka LLMs), the foundational model that powers ChatGPT. There are plenty of documented examples of truly impressive feats built on this technology: writing reports or outputting code in seconds. At its core, LLMs basically ingest A LOT of text (e.g., think Internet) as a corpus of training data and rely on human feedback in a type of supervised training called reinforcement learning.

article thumbnail

Judge Delays Enforcement of California Consumer Privacy Act to 2024

SecureWorld News

Enforcement of the California Privacy Rights Act (CPRA)—a stiffening of the existing privacy laws under the California Consumer Privacy Act (CCPA)—has been delayed until March 29, 2024. A California judge made the decision just as the original July 1, 2023, deadline was to hit. " While this delay may be welcome news for businesses subject to the California Consumer Privacy Act ( #CCPA ), it is no reason to delay privacy compliance initiatives as a slew of other states have laws set to take effec

CSO 98
article thumbnail

BSides Sofia 2023 – Daniela Shalev – Hunting Unsigned DLLs To Find APT

Security Boulevard

Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel. Permalink The post BSides Sofia 2023 – Daniela Shalev – Hunting Unsigned DLLs To Find APT appeared first on Security Boulevard.

article thumbnail

Spy vs. spy: Exploring the LetMeSpy hack, with maia arson crimew

Malwarebytes

The language of a data breach, no matter what company gets hit, is largely the same. There's the stolen data—be it email addresses, credit card numbers, or even medical records. There are the users—unsuspecting, everyday people who, through no fault of their own, mistakenly put their trust into a company, platform, or service to keep their information safe.

Hacking 98
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Randall Munroe’s XKCD ‘Fireflies’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink The post Randall Munroe’s XKCD ‘Fireflies’ appeared first on Security Boulevard.

98
article thumbnail

Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot Malware

The Hacker News

Microsoft Word documents exploiting known remote code execution flaws are being used as phishing lures to drop malware called LokiBot on compromised systems. "LokiBot, also known as Loki PWS, has been a well-known information-stealing Trojan active since 2015," Fortinet FortiGuard Labs researcher Cara Lin said.

Malware 98
article thumbnail

Redpoint Ventures Announces InfraRed 100

Security Boulevard

AppOmni is proud to be part of the inaugural Redpoint Ventures InfraRed 100 representing the fastest-growing private cloud infrastructure software businesses. The post Redpoint Ventures Announces InfraRed 100 appeared first on AppOmni. The post Redpoint Ventures Announces InfraRed 100 appeared first on Security Boulevard.

article thumbnail

Hackers Exploit WebAPK to Deceive Android Users into Installing Malicious Apps

The Hacker News

Threat actors are taking advantage of Android's WebAPK technology to trick unsuspecting users into installing malicious web apps on Android phones that are designed to capture sensitive personal information. "The attack began with victims receiving SMS messages suggesting the need to update a mobile banking application," researchers from CSIRT KNF said in an analysis released last week.

Banking 97
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

7 remote work cyber security rules every business should follow

Security Boulevard

The post 7 remote work cyber security rules every business should follow appeared first on Click Armor. The post 7 remote work cyber security rules every business should follow appeared first on Security Boulevard.

article thumbnail

Act now! In-the-wild Zimbra vulnerability needs a workaround

Malwarebytes

Security experts are warning Zimbra users that a vulnerability for which there is no patch is being actively exploited in the wild. In a security update about the vulnerability, the company offered a temporary workaround which users can apply while waiting for a patch to be created. Zimbra is an open source webmail application used for messaging and collaboration.

article thumbnail

Addressing the Mobile Malware Threat With Zero-Trust

Security Boulevard

AI-enabled zero-trust solutions can help address the rising threat of mobile malware. The post Addressing the Mobile Malware Threat With Zero-Trust appeared first on Security Boulevard.

Mobile 98
article thumbnail

Is Data Security Still an Issue with Outsourced Software Development Teams and What to do About It

GlobalSign

Data security can still be an issue with outsourced software development teams. Here’s what to do about it to prevent potential threats.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft Pushes for a Seat at the SSE Table

Security Boulevard

Microsoft is getting ready to muscle its way into the burgeoning security service edge (SSE) space, but it may have some catching up to do. The post Microsoft Pushes for a Seat at the SSE Table appeared first on Security Boulevard.

article thumbnail

Cybercriminals Exploiting WooCommerce Payments Plugin Flaw to Hijack Websites

The Hacker News

Threat actors are actively exploiting a recently disclosed critical security flaw in the WooCommerce Payments WordPress plugin as part of a massive targeted campaign. The flaw, tracked as CVE-2023-28121 (CVSS score: 9.

article thumbnail

APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware

Security Boulevard

Red Menshen is an APT group that is rapidly evolving its BPFDoor backdoor malware that targets systems running Linux or Solaris. The post APT Group Red Menshen is Rapidly Evolving its BPFDoor Malware appeared first on Security Boulevard.

Malware 98
article thumbnail

Malicious USB Drives Targetinging Global Targets with SOGU and SNOWYDRIVE Malware

The Hacker News

Cyber attacks using infected USB infection drives as an initial access vector have witnessed a three-fold increase in the first half of 2023, That's according to new findings from Mandiant, which detailed two such campaigns – SOGU and SNOWYDRIVE – targeting both public and private sector entities across the world.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

BSides Sofia 2023 – Evgeni Saber – Advanced Enterprise Vulnerability

Security Boulevard

Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel. Permalink The post BSides Sofia 2023 – Evgeni Saber – Advanced Enterprise Vulnerability appeared first on Security Boulevard.

article thumbnail

Cloud Credential Stealing Campaign Targets AWS, Azure, GCP

SecureWorld News

A recent report from cybersecurity firm SentinelOne sheds light on a concerning trend in the cyber threat landscape: the expansion of a cloud credential stealing campaign targeting Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). This development underscores the increasing value of cloud service credentials to threat actors and emphasizes the need for organizations to prioritize their cloud security strategies.

article thumbnail

Steps Forward: Can ‘CNAPP’ solutions truly unify cloud, on-premises best cybersecurity practices?

Security Boulevard

A fledgling security category referred to as Cloud-Native Application Protection Platforms ( CNAPP ) is starting to reshape the cybersecurity landscape. Related: Computing workloads return on-prem CNAPP solutions assemble a varied mix of security tools and best practices and focuses … (more…) The post Steps Forward: Can ‘CNAPP’ solutions truly unify cloud, on-premises best cybersecurity practices?

article thumbnail

These 6 Questions Will Help You Choose the Best Attack Surface Management Platform

The Hacker News

The hype around different security categories can make it difficult to discern features and capabilities from bias when researching new platforms. You want to advance your security measures, but what steps actually make sense for your business?

95
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to Prevent Account Sharing Like Netflix

Security Boulevard

For an early stage company, the focus often lies in attracting users and expanding the customer base. Land and expand. During this phase, account sharing may not be perceived as a significant problem. However, as the business matures and revenue optimization becomes the primary focus, the detection and management of The post How to Prevent Account Sharing Like Netflix appeared first on Security Boulevard.

article thumbnail

JumpCloud Blames 'Sophisticated Nation-State' Actor for Security Breach

The Hacker News

A little over a week after JumpCloud reset API keys of customers impacted by a security incident, the company said the intrusion was the work of a sophisticated nation-state actor. The adversary "gained unauthorized access to our systems to target a small and specific set of our customers," Bob Phan, chief information security officer (CISO) at JumpCloud, said in a post-mortem report.

CISO 92
article thumbnail

Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln

Security Boulevard

There is no workaround or patch for a high-severity vulnerability—and none will be forthcoming—in Cisco’s Nexus 9000 series switches. The post Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln appeared first on Security Boulevard.

article thumbnail

Hackers exploiting critical WordPress WooCommerce Payments bug

Bleeping Computer

Hackers are conducting widespread exploitation of a critical WooCommerce Payments plugin to gain the privileges of any users, including administrators, on vulnerable WordPress installation. [.

91
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!