Thu.Oct 06, 2022

article thumbnail

Former Uber CISO Faces Prison Time For Mishandling Cyberattack: Justice, Scapegoating, or Both?

Joseph Steinberg

A jury yesterday found former Uber security chief Joe Sullivan guilty of covering up a massive data breach; the conviction makes Sullivan likely to become the first executive to face prison time over the mishandling of a cyberattack. According to The New York Times , in 2016, while the Federal Trade Commission (FTC) was investigating an earlier breach of Uber’s computer systems, Sullivan learned of a subsequent compromise that affected more than 57 million Uber accounts.

CISO 258
article thumbnail

Phishing attack spoofs Zoom to steal Microsoft user credentials

Tech Republic Security

Targeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox. The post Phishing attack spoofs Zoom to steal Microsoft user credentials appeared first on TechRepublic.

Phishing 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beware: SOVA Android Banking Trojan emerges more powerful with new capabilities

Quick Heal Antivirus

SOVA is an Android banking Trojan with significant capabilities like credential theft, capturing keystrokes, taking screenshots, etc., The post Beware: SOVA Android Banking Trojan emerges more powerful with new capabilities appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Banking 132
article thumbnail

Top 5 best practices for cloud security

Tech Republic Security

Find out the best practices for securely deploying applications and managing data in the cloud. The post Top 5 best practices for cloud security appeared first on TechRepublic.

174
174
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

5 reasons why security operations are getting harder

CSO Magazine

Recent ESG research reveals that 52% of security professionals believe security operations are more difficult today than they were two years ago. Why? Security operations center (SOC) teams point to issues such as: A rapidly evolving and changing threat landscape: Forty-one percent of security professionals find it difficult to understand and counteract modern threats like ransomware or supply chain attacks and then build this knowledge into a comprehensive security operations program.

article thumbnail

Former Uber CSO found guilty of obstruction in attempted data breach cover-up

Tech Republic Security

Joe Sullivan schemed to hide a 2016 breach of 57 million users’ information shortly after he was hired. The post Former Uber CSO found guilty of obstruction in attempted data breach cover-up appeared first on TechRepublic.

CSO 158

LifeWorks

More Trending

article thumbnail

How to add an extra layer of protection in Bitwarden vault items

Tech Republic Security

Jack Wallen shows you how you can increase the security of Bitwarden vault items with a simple configuration. The post How to add an extra layer of protection in Bitwarden vault items appeared first on TechRepublic.

article thumbnail

Ransomware news headlines trending on Google

CyberSecurity Insiders

Lloyd’s London, a leading insurance trader in the world, has apparently experienced cyber attack that is currently being deeply probed. The company issued a press statement that it has hired a cyber experts team to investigate the incident and those behind the attack. Because, UK is supporting Ukraine in its war with Russia, the suspicion finger obliviously is pointing towards Kremlin.

article thumbnail

123K Individuals Data Exposed in Tucson Data Breach

Hacker Combat

The Tucson Data Breach is a recent data breach that occurred in the city of Tucson, Arizona. The breach affected approximately 1.2 million individuals, who had their personal information exposed. This information included names, addresses, social security numbers, and date of birth. The Tucson Data Breach is one of the largest data breaches to ever occur in the United States.

article thumbnail

A New Android Spyware Called RatMilad Is Targeting Enterprise Devices

Heimadal Security

RatMilad, a new Android malware that masquerades as a VPN and phone number spoofing app, has been observed to target a Middle Eastern enterprise mobile device. The mobile trojan acts as advanced spyware, receiving and executing commands to collect and exfiltrate a wide range of data from the infected mobile endpoint, according to a report published by […].

Spyware 124
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

A Simple Guide to Vulnerability Triage: A Structured Approach to Vulnerability Management

CyberSecurity Insiders

Whatever assets you happen to control, you want to be sure that they’re secure. Even if your system is lucky enough to be based in Sweden – the country with the lowest malware infection rates in the world – it needs vigilant protection. . The uncomfortable truth is that there are innumerable threats out there, and more companies than ever are being targeted by cybercriminals. .

Risk 115
article thumbnail

The need to change cybersecurity for the next generation

We Live Security

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits. The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity.

article thumbnail

How to Progress in Your Cybersecurity Career

CyberSecurity Insiders

Cybersecurity is one of the fastest-growing industries and one that will likely see a lot of opportunities for career progression over the years. As a result, more people than ever are now looking to work in this field. However, there are a lot of challenges when it comes to working in cybersecurity, and you’ll need to understand how to make the most of your opportunities.

article thumbnail

Microsoft Takes Measures Against Password Spray Attacks

Heimadal Security

Exchange Online users are warned about the increasing number of password spray attacks that use Microsoft’s Exchange Basic Authentication feature. The warning from Microsoft’s Exchange team comes as the Basic Authentication (Basic Auth), “an outdated industry standard”, is gradually being deprecated for Exchange Online, beginning October 1, 2022.

Passwords 111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

“Egypt Leaks” – Hacktivists are Leaking Financial Data

Security Affairs

Researchers at cybersecurity firm Resecurity spotted a new group of hacktivists targeting financial institutions in Egypt, Resecurity, a California-based cybersecurity company protecting Fortune 500 corporations globally, has noticed a new group of hacktivists targeting financial institutions in Egypt. The bad actors go under the campaign “EG Leaks” (also known as “Egypt Leaks”), they started leaking large volumes of compromised payment data belonging to the customers of major Egyptian banks on

Banking 105
article thumbnail

Australia’s Largest Telecom Company Employees at Risk Following Telstra Breach

Heimadal Security

The Australian telecommunications company Telstra reveals a data breach targeting third-party platform that holds names and email addresses of its employees. After Optus reported its own security breach this past September, this time it is Telstra`s turn to deal with the aftermath of data leakage. Critically, there was no breach of any Telstra systems, and […].

Risk 110
article thumbnail

19-Year-Old Teen Arrested for Using Leaked Optus Breach Data in SMS Scam

The Hacker News

The Australian Federal Police (AFP) has arrested a 19-year-old teen from Sydney for allegedly attempting to leverage the data leaked following the Optus data breach late last month to extort victims.

Scams 102
article thumbnail

Malicious Cyber Activity Targeting Election Systems: FBI Declares

Heimadal Security

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) declares in a public service announcement that cyber activity has been registered to try to compromise the infrastructure of the election. The attempt is unlikely to affect the voting result or cause any major disruption in the system. The two institutions […].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Russian Hackers Shut Down US State Government Websites

Dark Reading

Russian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.

article thumbnail

Massive Data Breach Exposes City of Tucson, Arizona

Heimadal Security

Over 125,000 people found out recently that their personal information is at risk, when a data breach was discovered by the authorities in the City of Tucson, Arizona. Timeline of Events As revealed in a notice sent to those affected by the attack, the threat actors had access to the network between May 17 and May […]. The post Massive Data Breach Exposes City of Tucson, Arizona appeared first on Heimdal Security Blog.

article thumbnail

A Coordinated Swatting Spree Is Targeting US Schools

WIRED Threat Level

Sixteen states collectively suffered more than 90 false reports of school shooters during three weeks in September—and many appear to be connected.

Hacking 100
article thumbnail

BlackByte Ransomware Disables Security Products Through BYOVD Method

Heimadal Security

BlackByte, a ransomware gang that has been active since 2021, is using a new technique to get past security system. Researchers call the technique BYOVD (Bring Your Own Vulnerable Driver) and it enables the threat actors to bypass protection systems by disabling more than 1.000 drivers simultaneously. What makes the method successful is the fact […].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

LilithBot Malware, a new MaaS offered by the Eternity Group

Security Affairs

Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a recently discovered sample of a new malware called LilithBot to the Eternity group (aka EternityTeam; Eternity Project). The Eternity group operates a homonymous malware-as-a-service (MaaS), it is linked to the Russian “Jester Group,” which is active since at least January 2022.

Malware 98
article thumbnail

19-Year-Old Arrested for Allegedly Using Leaked Optus Customer Data for Extortion

Heimadal Security

The Australian Federal Police (AFP) have taken into custody a 19-year-old man in Sydney for reportedly using leaked Optus customer data for extortion. Source According to the official statement issued by AFP today, the suspect now faces two charges: one for blackmail and the second for dealing with identification information, which carry a maximum penalty […].

article thumbnail

Watch out, a bug in Linux Kernel 5.19.12 can damage displays on Intel laptops

Security Affairs

A bug in Linux Kernel 5.19.12 that was released at the end of September 2022 can potentially damage the displays of Intel laptops. Linux users reported the displays of their Intel laptops rapidly blinking, flickering, and showing white flashes after upgrading to Linux kernel version 5.19.12. Linux expert Ville Syrjäl pointed out that the anomalous issue may damage displays. “After looking at some logs we do end up with potentially bogus panel power sequencing delays, which may harm the LCD

Hacking 98
article thumbnail

Ransomware-as-a-Service: The Cloud Model Escalates Ransomware Attacks

Security Boulevard

Cybersecurity teams know that any technology is not only vulnerable to a cyberattack but also that threat actors will eventually use that technology to launch attacks. Take the cloud, for example. Cybercriminals are using cloud services to their advantage with ransomware-as-a-service (RaaS). In a recent report from Venafi, the authors found that “In addition to.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cisco fixed two high-severity bugs in Communications, Networking Products

Security Affairs

Cisco fixed high-severity flaws in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. Cisco announced it has addressed high-severity vulnerabilities affecting some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. “Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) S

article thumbnail

Digital Guardian Wins CyberSecurity Breakthrough Award for Data Leak Detection Solution of the Year

Digital Guardian

Judges looked at criteria, including innovation, performance, ease of use, functionality, value, and impact, for the award.

article thumbnail

City of Tucson Data Breach impacted 123,500 individuals

Security Affairs

The City of Tucson, Arizona disclosed a data breach, the incident was discovered in May 2022 and impacted 123,500 individuals. The security breach was discovered at the end of May 2022 and concluded the investigation in September. According to the notification letter sample provided to the Maine Attorney General’s Office, over 123,500 were impacted have been impacted by the incident. “On August 4, 2022, the City learned that certain files may have been copied and taken from the City’s ne

article thumbnail

Employee Volunteer Program Supports Youth Globally

Cisco Security

Giving back is part of the ethos at Cisco. Part of how that happens is through employees volunteering as part of Cisco’s Time2Give benefit in which employees can use paid time to contribute to their communities and support the causes they’re passionate about. During the pandemic, Cisco increased this benefit from five paid volunteering days to 10 and encourages virtual volunteering, too.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!