Thu.Oct 06, 2022

Former Uber CISO Faces Prison Time For Mishandling Cyberattack: Justice, Scapegoating, or Both?

Joseph Steinberg

A jury yesterday found former Uber security chief Joe Sullivan guilty of covering up a massive data breach; the conviction makes Sullivan likely to become the first executive to face prison time over the mishandling of a cyberattack.

CISO 170

Russian Hackers Shut Down US State Government Websites

Dark Reading

Russian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

CyberSecurity Breakthrough Awards Recognizes DTEX as “User Behavior Analytics Platform of the Year”

Security Boulevard

We are thrilled to announce that DTEX’s Workforce Cyber Intelligence & Security platform was named User Behavior Analytics Platform of the Year in the 2022 CyberSecurity Breakthrough Awards, an industry awards program that recognizes the world’s best information security companies, products, and people.

“Egypt Leaks” – Hacktivists are Leaking Financial Data

Security Affairs

Researchers at cybersecurity firm Resecurity spotted a new group of hacktivists targeting financial institutions in Egypt, Resecurity, a California-based cybersecurity company protecting Fortune 500 corporations globally, has noticed a new group of hacktivists targeting financial institutions in Egypt.

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

Employee Volunteer Program Supports Youth Globally

Cisco CSR

Giving back is part of the ethos at Cisco. Part of how that happens is through employees volunteering as part of Cisco’s Time2Give benefit in which employees can use paid time to contribute to their communities and support the causes they’re passionate about.

7 IoT Devices That Make Security Pros Cringe

Dark Reading

A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications

IoT 82

More Trending

Hackers Have It Out for Microsoft Email Defenses

Dark Reading

Cybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security

81

Ransomware-as-a-Service: The Cloud Model Escalates Ransomware Attacks

Security Boulevard

Cybersecurity teams know that any technology is not only vulnerable to a cyberattack but also that threat actors will eventually use that technology to launch attacks. Take the cloud, for example. Cybercriminals are using cloud services to their advantage with ransomware-as-a-service (RaaS).

Russia-Linked Cybercrime Group Hawks Combo of Malicious Services With LilithBot

Dark Reading

The malware-as-a-service group Eternity is selling a one-stop shop for various malware modules it's been distributing individually via a subscription model on Telegram

Watch out, a bug in Linux Kernel 5.19.12 can damage displays on Intel laptops

Security Affairs

A bug in Linux Kernel 5.19.12 that was released at the end of September 2022 can potentially damage the displays of Intel laptops. Linux users reported the displays of their Intel laptops rapidly blinking, flickering, and showing white flashes after upgrading to Linux kernel version 5.19.12.

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

School Is in Session: 5 Lessons for Future Cybersecurity Pros

Dark Reading

Opportunities in the field continue to grow — and show no signs of slowing down

Phishing attack spoofs Zoom to steal Microsoft user credentials

Tech Republic Security

Targeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox. The post Phishing attack spoofs Zoom to steal Microsoft user credentials appeared first on TechRepublic. Security Microsoft phishing zoom

Two New Exchange Zero-Days Raise Questions About Microsoft Security

Security Boulevard

Microsoft finally issued CVEs—CVE-2022–41040 and CVE-2022–41082—for two new zero-day vulnerabilities in Exchange, ending a few days of speculation that the duo were, in fact, ProxyShell flaws uncovered in 2021. “I

A Coordinated Swatting Spree Is Targeting US Schools

WIRED Threat Level

Sixteen states collectively suffered more than 90 false reports of school shooters during three weeks in September—and many appear to be connected. Security Security / Cyberattacks and Hacks

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

For Second Consecutive Year, DataDome Wins “e-Commerce Security Solution of the Year” Award in CyberSecurity Breakthrough Awards Program

Security Boulevard

DataDome won the “e-Commerce Security Solution of the Year” award in the CyberSecurity Breakthrough Awards for the second year in a row!

Ransomware news headlines trending on Google

CyberSecurity Insiders

Lloyd’s London, a leading insurance trader in the world, has apparently experienced cyber attack that is currently being deeply probed. The company issued a press statement that it has hired a cyber experts team to investigate the incident and those behind the attack.

LogRhythm Wins Best SIEM Solution in the 2022 CyberSecurity Breakthrough Awards

Security Boulevard

Leading cybersecurity analytics company recognized as best in the industry LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, today announced its recognition as the industry’s Best SIEM Solution in the 2022 CyberSecurity Breakthrough Awards.….

Cisco fixed two high-severity bugs in Communications, Networking Products

Security Affairs

Cisco fixed high-severity flaws in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence.

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

The Hacker News

In yet another case of bring your own vulnerable driver (BYOVD) attack, the operators of the BlackByte ransomware are leveraging a flaw in a legitimate Windows driver to bypass security solutions.

City of Tucson Data Breach impacted 123,500 individuals

Security Affairs

The City of Tucson, Arizona disclosed a data breach, the incident was discovered in May 2022 and impacted 123,500 individuals. The security breach was discovered at the end of May 2022 and concluded the investigation in September.

Eternity Group Hackers Offering New LilithBot Malware as a Service to Cybercriminals

The Hacker News

The threat actor behind the malware-as-a-service (MaaS) called Eternity has been linked to new piece of malware called LilithBot. "It

New SonicWall Survey Data Reveals 91% of Organizations Fear Ransomware Attacks in 2022

Dark Reading

Amid an economic downturn, cybersecurity staffing shortages, and endless cyberattacks, financially motivated attacks are the top concern among IT professionals

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

19-Year-Old Teen Arrested for Using Leaked Optus Breach Data in SMS Scam

The Hacker News

The Australian Federal Police (AFP) has arrested a 19-year-old teen from Sydney for allegedly attempting to leverage the data leaked following the Optus data breach late last month to extort victims.

LilithBot Malware, a new MaaS offered by the Eternity Group

Security Affairs

Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a recently discovered sample of a new malware called LilithBot to the Eternity group (aka EternityTeam; Eternity Project).

DDOS 67

4 Essential Tactics For Increasing Sales Today

SecureBlitz

Sales are one of the essential elements of any business. However, in today’s economic and social environment, selling has become a task of great complexity. What was effective a few years ago may now fail to deliver results.

Top 5 best practices for cloud security

Tech Republic Security

Find out the best practices for securely deploying applications and managing data in the cloud. The post Top 5 best practices for cloud security appeared first on TechRepublic. Cloud Security cloud cloud computing cloud security

95

Details Released for Recently Patched new macOS Archive Utility Vulnerability

The Hacker News

Security researchers have shared details about a now-addressed security flaw in Apple's macOS operating system that could be potentially exploited to run malicious applications in a manner that can bypass Apple's security measures.

66

The need to change cybersecurity for the next generation

We Live Security

Healthy habits that are instilled and nurtured at an early age bring lifelong benefits – the same applies to good cybersecurity habits. The post The need to change cybersecurity for the next generation appeared first on WeLiveSecurity. Cybersecurity

S3 Ep103: Scammers in the Slammer (and other stories) [Audio + Text]

Naked Security

Latest episode - listen and learn now (or read and revise, if the written word is your thing). Law & order Microsoft Podcast :ProxyNotShell BEC bust exchange Exploit Naked Security Podcast robocalls romance scam vulnerability

Scams 64

The Ultimate SaaS Security Posture Management Checklist, 2023 Edition

The Hacker News

It's been a year since the release of The Ultimate SaaS Security Posture Management (SSPM) Checklist. If SSPM is on your radar, here's the 2023 checklist edition, which covers the critical features and capabilities when evaluating a solution.

63

US Consumers Are Finally Becoming More Security & Privacy Conscious

Dark Reading

The trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges

63

The Three Tenets of Zero Trust Security

SecureWorld News

Before early 2020, people had a somewhat different view of cybersecurity than they do today. Sure, there were plenty of sources of threats and lots of risks, such as ransomware, data breaches, and other cyber events. But it was nothing like the challenges security leaders and teams are now facing.