Sun.May 21, 2023

article thumbnail

North Dakota CISO Shares Cyber Plans and Priorities

Lohrman on Security

What is happening regarding cybersecurity operations, new developments and the future vision in the state of North Dakota? State CISO Michael Gregg shares his perspectives.

CISO 127
article thumbnail

Android phones are vulnerable to fingerprint brute-force attacks

Bleeping Computer

Researchers at Tencent Labs and Zhejiang University have presented a new attack called 'BrutePrint,' which brute-forces fingerprints on modern smartphones to bypass user authentication and take control of the device. [.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

KeePass Exploit Allows Attackers to Recover Master Passwords from Memory

The Hacker News

A proof-of-concept (PoC) has been made available for a security flaw impacting the KeePass password manager that could be exploited to recover a victim's master password in cleartext under specific circumstances. The issue, tracked as CVE-2023-32784, impacts KeePass versions 2.x for Windows, Linux, and macOS, and is expected to be patched in version 2.

Passwords 145
article thumbnail

Cyber Attack on European Space Agency to compromise satellite imaging data

CyberSecurity Insiders

Several ethical hackers recently accepted a challenge posed by the European Space Agency (ESA) to assess the resilience of satellite infrastructure by attempting to infiltrate servers and compromise satellite imaging sensors and data. Fortunately, this hacking exercise was conducted solely for the purpose of evaluating the satellites’ operational security, and we can assume that no sensitive data fell into the wrong hands, thus averting potential risks to millions of lives.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

Microsoft Edge is getting 'Edge for Gamers' mode

Bleeping Computer

Microsoft is doubling its efforts to court the gaming community with a new feature, "Edge for Gamers" mode, which promises to elevate the user experience inside and outside gaming sessions. [.

Software 135
article thumbnail

PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted

The Hacker News

The maintainers of Python Package Index (PyPI), the official third-party software repository for the Python programming language, have temporarily disabled the ability for users to sign up and upload new packages until further notice.

Software 130

More Trending

article thumbnail

BlackCat Ransomware Deploys New Signed Kernel Driver

Trend Micro

In this blog post, we will provide details on a BlackCat ransomware incident that occurred in February 2023, where we observed a new capability, mainly used for the defense evasion phase.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

As the field of cybersecurity continues to evolve and expand, pursuing a Master’s degree in this discipline offers an opportunity to delve into cutting-edge research and contribute to the advancement of knowledge in this critical area. Whether you’re passionate about securing networks, protecting data, or investigating cyber threats, choosing the right research topic is crucial for a successful and impactful Master’s journey.

article thumbnail

BatLoader campaign impersonates ChatGPT and Midjourney to deliver Redline Stealer

Security Affairs

Researchers identified an ongoing BatLoader campaign relying on Google Search Ads to deliver rogue web pages for ChatGPT and Midjourney. In early May, researchers at eSentire Threat Response Unit (TRU) spotted an ongoing BatLoader campaign using Google Search Ads to redirect victims to imposter web pages for AI-based services like ChatGPT and Midjourney.

Malware 95
article thumbnail

Update now: 9 vulnerabilities impact Cisco Small Business Series

Malwarebytes

Vulnerabilities have been found and fixed in the web-based user interface of various Cisco products in the Small Business Series. These nine issues are tied to the web-based user interface of the products, and in a worst case scenario could lead to denial of service (DoS) conditions or arbitrary code execution. Affected products The vulnerabilities affect all of the below if running vulnerable firmware: 250 Series Smart Switches 350 Series Managed Switches 350X Series Stackable Managed Switches

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

PyPI Repository temporarily suspends user sign-ups and package uploads due to ongoing attacks

Security Affairs

The Python Package Index (PyPI) maintainers have temporarily disabled the sign up and package upload processes due to an ongoing attack. The maintainers of Python Package Index (PyPI), the Python software repository, have temporarily disabled the sign up and package upload processes due to an ongoing attack. The maintainers opted to disable the above functionalities because they have observed a spike in the creation of malicious users and projects on the index in the past week. “New user a

Malware 90
article thumbnail

Dark Web 101: How To Access The Dark Web

SecureBlitz

Today, we will show you what the dark web is all about. Also, we will reveal how you can access the dark web and the precautions to apply. The term “dark web” often evokes a sense of mystery and intrigue. It represents a hidden realm within the vast expanse of the internet, shrouded in anonymity […] The post Dark Web 101: How To Access The Dark Web appeared first on SecureBlitz Cybersecurity.

article thumbnail

Security Affairs newsletter Round 420 by Pierluigi Paganini – International edition

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. We are in the final ! Please vote for Security Affairs ( [link] ) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini Please nom

article thumbnail

A week in security (May 15-21)

Malwarebytes

Last week on Malwarebytes Labs: Why we should be more open about ransomware attacks Windows 11 is showing its first signs of Rust Update now! Ruckus vulnerability added to CISA’s list of actively exploited bugs 3 reasons to use a VPN PharMerica breach impacts almost 6 million people Leaked Babuk ransomware builder code lives on as RA Group KeePass vulnerability allows attackers to access the master password Child safety app riddled with vulnerabilities: Update now!

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders. When done effectively, it can help interpret complex risk environments for leaders and inform their decision-making.

article thumbnail

The Real Risks in Google’s New.Zip and.Mov Domains

WIRED Threat Level

While the company’s new top-level domains could be used in phishing attacks, security researchers are divided on how big of a problem they really pose.

article thumbnail

ChatGPT: Cybersecurity friend or foe?

Malwarebytes

If you haven’t heard about ChatGPT yet, perhaps you’ve just been thawed from cryogenic slumber or returned from six months off the grid. ChatGPT—the much-hyped, artificial intelligence (AI) chatbot that provides human-like responses from an enormous knowledge base—has been embraced practically everywhere, from private sector businesses to K–12 classrooms.

article thumbnail

BSidesSF 2023 – Abhinav SP – Making of the BSides SF Astronaut Badge

Security Boulevard

Our thanks to BSidesSF for publishing their presenter’s superlative BSidesSF 2023 content on the organizations’ YouTube channel. Permalink The post BSidesSF 2023 – Abhinav SP – Making of the BSides SF Astronaut Badge appeared first on Security Boulevard.

InfoSec 75
article thumbnail

Webinar recap: EDR vs MDR for business success

Malwarebytes

Did you miss our recent webinar on EDR vs. MDR? Don't worry, we've got you covered! In this blog post, we'll be recapping the highlights and key takeaways from the webinar hosted by Marcin Kleczynski, CEO and co-founder of Malwarebytes, and featuring guest speaker Joseph Blankenship, Vice President and research director at Forrester. Introducing EDR and MDR : The webinar began with an overview of EDR and MDR.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma

Security Boulevard

In this episode, we explore the arrival of passwordless Google accounts that use “passkeys,” which offer enhanced usability and security. We discuss the benefits of passkeys over traditional passwords, but also why passkeys are not quite ready for prime time use. Next, we discuss Google Domains’ introduction of new top-level domains (TLDs) like.zip and […] The post Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma appeared first on Shared Security Podcast.

article thumbnail

The Threat Landscape: Emerging Viruses and Malware to Watch Out For in 2023

Quick Heal Antivirus

We’re Midway into 2023, and the threat landscape is evolving with new variants of viruses and malware that. The post The Threat Landscape: Emerging Viruses and Malware to Watch Out For in 2023 appeared first on Quick Heal Blog.

Malware 62
article thumbnail

Azure DevOps integration

Security Boulevard

GuardRails customers on Azure DevOps can now benefit from the platform's secure code review and automated remediation actions. The post Azure DevOps integration appeared first on GuardRails. The post Azure DevOps integration appeared first on Security Boulevard.

59
article thumbnail

Weekly Update 348

Troy Hunt

I feel like the.zip TLD debate is one of those cases where it's very easy for the purest security view to overwhelm the practical human reality. I'm yet to see a single good argument that is likely to have real world consequences as far as phishing goes and whilst I understand the sentiment surrounding the confusion new TLDs with common file types, all "the sky is falling" commentary I've seen is speculative at best.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

Cryptocurrency and non-fungible tokens (NFTs) - what are they and why should you care? With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises. Join this exclusive webinar with Ryan McInerny to learn: Cryptocurrency asset market trends How to manage risk and compliance to serve customers safely Best practices for identifying crypto transactions and companies Rev

article thumbnail

LogRhythm Announces New Distributor Partnership with ABPSecurite to Serve More Customers in Singapore

Security Boulevard

SINGAPORE – May 22, 2023 – LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, today announced their partnership with ABPSecurite, a leading cyber security and network performance Value-Added Distributor (VAD). With this partnership, ABPSecurite… The post LogRhythm Announces New Distributor Partnership with ABPSecurite to Serve More Customers in Singapore appeared first on LogRhythm.

52
article thumbnail

Google TLDs: some security controversy

Security Boulevard

I’ve been seeing a certain amount of panic about Google’s inclusion of.zip and.mov in its recent launch of eight new Top Level domains (TLDs). While I don’t think adding to the list of TLDs that can be confused with filename extensions, I think the risks may have been overstated by some companies with […] The post Google TLDs: some security controversy appeared first on Security Boulevard.

Risk 52