Wed.Jul 13, 2022

article thumbnail

Will iPhone’s New “Lockdown Mode” Create Dangerous Overconfidence In Apple’s CyberSecurity Capabilities?

Joseph Steinberg

Apple last week announced new security features specifically intended to offer “specialized additional protection to users who may be at risk of highly targeted cyberattacks from private companies developing state-sponsored mercenary spyware.”. In its announcement, the maker of iPhones, iPads, and Macs stated that its new “Lockdown Mode” represents a “groundbreaking security capability;” Lockdown Mode, which is available to users of a range of devices running Apple’s latest OS beta releases, is

article thumbnail

Secure remote help can be powerful but may not be cheap

Tech Republic Security

Use the new Windows Remote Help app to support remote and hybrid employees from Microsoft Endpoint Manager securely without a VPN. The post Secure remote help can be powerful but may not be cheap appeared first on TechRepublic.

VPN 199
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Collaboration and knowledge sharing key to progress in cybersecurity

We Live Security

In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers. The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity.

article thumbnail

Nearly half of enterprise endpoint devices present significant security risks

Tech Republic Security

Organizations are struggling to manage devices and stay ahead of vulnerabilities, patches and attacks, according to a new report from Adaptiva and the Ponemon Institute. The post Nearly half of enterprise endpoint devices present significant security risks appeared first on TechRepublic.

Risk 187
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

WhatsApp warns users: Fake versions of WhatsApp are trying to steal your personal info

Malwarebytes

WhatsApp boss Will Cathcart is warning users of the popular messaging app to be on their guard after the WhatsApp Security Team discovered bogus apps packing a hidden punch in the form of malware. Outside the safety of the walled garden. App stores do whatever they can to try and prevent bogus programs making it onto the storefront. While the majority of apps on legitimate stores are likely safe, rogues do get through.

Mobile 145
article thumbnail

20 VPN subscriptions and bundles on sale now

Tech Republic Security

Keep your internet connection behind lock and key with these 20 VPN subscriptions and bundles offered through TechRepublic Academy. The post 20 VPN subscriptions and bundles on sale now appeared first on TechRepublic.

VPN 187

LifeWorks

More Trending

article thumbnail

Facebook 2FA scammers return – this time in just 21 minutes

Naked Security

Last time they arrived 28 minutes after lighting up their fake domain. this time it was just 21 minutes.

Scams 142
article thumbnail

Survey Surfaces Raft of Industrial IoT Security Challenges

Security Boulevard

A survey of 800 senior IT managers, senior IT security managers and project managers responsible for industrial internet-of-things (IIoT)/operational technology (OT) found 94% reported their organization experienced a security incident in the last 12 months. The survey, conducted by Barracuda Networks, also found 87% of organizations that experienced an incident were impacted for more than.

IoT 141
article thumbnail

Qakbot operations continue to evolve to avoid detection

Security Affairs

Experts warn that operators behind the Qakbot malware operation are improving their attack chain in an attempt to avoid detection. Qakbot , also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008. The malware spreads via malspam campaigns, it inserts replies in active email threads. The threat continues to evolve implementing new attack vectors to evade detection, Zscaler Threatlabz researchers warn.

Malware 138
article thumbnail

New Android malware on Google Play installed 3 million times

Bleeping Computer

A new Android malware family on the Google Play Store that secretly subscribes users to premium services was downloaded over 3,000,000 times. [.].

Malware 137
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

These five apps can wipe off all your Mobile Security worries

CyberSecurity Insiders

Smart Phones have become a necessity these days, but the security concerns they offer are many. Especially, the Pegasus software surveillance revelations have left many in the mobile world baffled. And the highlight in the discovery was a Saudi Prince using the NSO Group built software to spy on Amazon Chief Jeff Bezos and leaking his personal life details as texts and photos to the media.

Mobile 130
article thumbnail

Update now—July Patch Tuesday patches include fix for exploited zero-day

Malwarebytes

It’s time to triage a lot of patching again. Microsoft’s July Patch Tuesday includes an actively exploited local privilege escalation vulnerability in the Windows Client/Server Runtime Subsystem (CSRSS). This vulnerability immediately made it to the Cybersecurity & Infrastructure Security Agency (CISA) list of known to be exploited in the wild list that are due for patching by August 2, 2022.

article thumbnail

Before the Ransomware Attack: 5 Initial Access Methods

Security Boulevard

Most security teams will agree that having a deep understanding of how attackers gain initial access is the most critical factor in building an effective cybersecurity strategy and stopping ransomware attacks in their tracks. According to federal research by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), attackers infiltrate victim networks using five main methods: The post Before the Ransomware Attack: 5 Initial Access Methods appeared first on Security Boulevard.

article thumbnail

Bandai Namco confirms hack after ALPHV ransomware data leak threat

Bleeping Computer

Game publishing giant Bandai Namco has confirmed that they suffered a cyberattack that may have resulted in the theft of customers' personal data. [.].

Hacking 126
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Celebrating Emoji Day in CyberSecurity!

Thales Cloud Protection & Licensing

Celebrating Emoji Day in CyberSecurity! divya. Thu, 07/14/2022 - 06:57. It's that day of the year again - the time? when we celebrate ?? Emoji Day on ?? 17 July. You might be wondering ??, what is Emoji Day, and what does it have to do with cybersecurity??? And you might think ?? why should security ?? professionals even care? Well, emojis are everywhere and used in all types of digital communication ???

article thumbnail

New UEFI firmware flaws impact over 70 Lenovo laptop models

Bleeping Computer

The UEFI firmware used in several laptops made by Lenovo is vulnerable to three buffer overflow vulnerabilities that could enable attackers to hijack the startup routine of Windows installations. [.].

Firmware 123
article thumbnail

New UEFI Firmware Vulnerabilities Impact Several Lenovo Notebook Models

The Hacker News

Consumer electronics maker Lenovo on Tuesday rolled out fixes to contain three security flaws in its UEFI firmware affecting over 70 product models.

Firmware 123
article thumbnail

How Design Thinking Drives People-Focused Innovation at Duo: An Introduction

Duo's Security Blog

Part one in a three-part series on design thinking at Duo. At Duo Security, customers love us because our zero-trust security platform is easy, effective and user-focused. While our culture of belonging helps us prioritize these values in our work, broader Cisco reaffirms and amplifies them through its design thinking program. The Duo Blog chatted with Valeria Kanziuba, design thinking lead at Cisco Secure , to learn about design thinking basics, how Cisco adapts design thinking best practices a

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Luna Moth Is a New Tool Used by Hackers to Break Into Organizations

Heimadal Security

Luna Moth is a new data extortion gang that has been penetrating corporations to steal personal information. They tell victims that they would make the files publicly accessible unless the victims pay a ransom to keep the contents from being released. Luna Moth has been engaged in phishing attempts that have provided remote access tools […]. The post Luna Moth Is a New Tool Used by Hackers to Break Into Organizations appeared first on Heimdal Security Blog.

Phishing 122
article thumbnail

Consulting firms jump on the Zero Trust bandwagon

CSO Magazine

Within a day of each other, the consulting and outsourcing firms Deloitte and HCL Technologies have both launched new managed cybersecurity services, as consultants look to capitalize on the growing appetite for the Zero Trust security model. On Tuesday, Deloitte unveiled its Zero Trust Access managed service, which is heavily influenced by its recent acquisition of TransientX.

article thumbnail

New Lilith ransomware emerges with extortion site, lists first victim

Bleeping Computer

A new ransomware operation has been launched under the name 'Lilith,' and it has already posted its first victim on a data leak site created to support double-extortion attacks. [.].

article thumbnail

Exostar launches CMMC 2.0-compliant Microsoft 365, other solutions for SMBs

CSO Magazine

Regulated industry community builder Exostar has announced new updates to its platform designed to help small- and medium-sized businesses (SMBs) overcome the technology, time, and cost obstacles of preparing for and demonstrating compliance with Cybersecurity Maturity Model Certification (CMMC) 2.0. The latest version of the CMMC requires businesses throughout the U.S.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Windows 8.1 now shows full-screen 'End of Support' warnings

Bleeping Computer

Windows 8.1 is now displaying full-screen alerts when logging into the operating system, warning that the OS is reaching the end of support in January 2023 and will no longer receive security updates. [.].

114
114
article thumbnail

BMW charging an $18 subscription for heated seats

Javvad Malik

BMW, a brand known for its amazing cars, a model for everyone – built with the infamous German engineering and now offering a whole bunch of options as a monthly subscription. In some ways it makes sense. Streamline your production and build each and every car with the exact same hardware, but then limit options to those who are willing to pay out extra.

Software 113
article thumbnail

Twitter now concerned about 53TB of User Data lying with Elon Musk

CyberSecurity Insiders

A few weeks ago, Elon Musk offered a $44 billion deal to Twitter and requested the social media giant to give an exact count of Fake accounts. The firm initially denied the allegations, but later admitted that well over 5% of its total accounts were bot generated. Tesla Chief Musk then issued a statement asking Twitter to be specific on the count of the accounts that were generated by Twitter Bots.

article thumbnail

BrandPost: Why Hackers are Increasingly Targeting Digital Supply Chains

CSO Magazine

For a large majority of the world, the SolarWinds hack in December 2020 was the first real introduction to digital supply chains and their vulnerabilities. But the reality is that hackers increasingly have been vested in software supply chain attacks, which increased 650% from July 2019 to May 2020 alone. Likewise, data from Netscout’s 2H 2021 Threat Intelligence Report shows that hackers remain laser-focused on attacking the digital supply chain.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations

The Hacker News

Microsoft on Tuesday disclosed that a large-scale phishing campaign targeted over 10,000 organizations since September 2021 by hijacking Office 365's authentication process even on accounts secured with multi-factor authentication (MFA).

Phishing 106
article thumbnail

What to Do If My Email Is Found on The Dark Web?

Identity IQ

What to Do If My Email Is Found on The Dark Web? IdentityIQ. Pretty much everyone uses email. It’s part of your daily life. But what do you do if your email address is found on the dark web? People might be trying to access your accounts. Unfortunately, the dark web is where you can find a number of criminals and cybercriminals trying to break into your accounts and get access to your money, personal information, login details for other websites, and more.

article thumbnail

Patch Tuesday July 2022 – Microsoft Releases Fixes for 80+ Known Issues, Including a Zero-Day Vulnerability

Heimadal Security

The second Tuesday of June comes with ‘goodies’ aplenty from Microsoft – 80+ fixes for issues ranging from denial of services to remote code execute, security features bypass, elevations of privilege, and of course, information disclosure. Microsoft has also addressed a zero-day vulnerability that could have allowed threat actors to remotely execute code on the […].

105
105
article thumbnail

CSC Reports Spike in Fake Baby Formula, Semiconductor Domains

Security Boulevard

A report published by CSC today revealed a spike in fake domain registrations from entities attempting to leverage the ongoing shortages of baby formula and semiconductors to conduct phishing attacks and perpetrate fraud. The CSC report found an 84% increase in baby formula-related domains registered by third parties since January of 2021 and a 95%.

Phishing 105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!