Thu.Jun 23, 2022

article thumbnail

On the Subversion of NIST by the NSA

Schneier on Security

Nadiya Kostyuk and Susan Landau wrote an interesting paper: “ Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process “: Abstract: In recent decades, the U.S. National Institute of Standards and Technology (NIST), which develops cryptographic standards for non-national security agencies of the U.S. government, has emerged as the de facto international source for cryptographic standards.

article thumbnail

GUEST ESSAY: New SEC rules aim to help C-levels, board members quantify cyber risks

The Last Watchdog

The U.S. Securities and Exchange Commission (SEC) is taking steps to crack down on insufficient cyber risk reporting. Related : Making third-party risk audits actionable. Seeking to minimize cybersecurity threat effects, the SEC has proposed several amendments requiring organizations to report on cyber risk in a “fast, comparable, and decision-useful manner.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Does the World Need Cloud Detection and Response (CDR)?

Anton on Security

Let’s play a game and define a hypothetical market called Cloud Detection and Response (CDR). Note that it is no longer my job to define markets , so I am doing it for fun here (yes, people find the weirdest things to be fun! ) So, let’s define CDR as a type of a security tool primarily focused on detecting, confirming and investigating suspicious activities and other security problems in various public cloud environments , including, but not limited to IaaS, PaaS, SaaS.

article thumbnail

The current cybersecurity shortage and how to resolve it

Tech Republic Security

CEO Alexander García-Tobar advises IT professionals on addressing the cybersecurity shortage. The post The current cybersecurity shortage and how to resolve it appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

SecureList

These days ransomware analysis gets a lot of coverage in commercial and public reports, with vendors issuing dozens of ransomware-related publications each year. These reports provide analysis on specific malware families or new samples, describe the activities of a particular ransomware group, give general tips on how to prevent ransomware from working, and so on.

article thumbnail

Study to ace four core CompTIA certification exams for $29

Tech Republic Security

Trying to break into cybersecurity? These certification exams will come in handy. The post Study to ace four core CompTIA certification exams for $29 appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

How to import passwords into 1Password

Tech Republic Security

Jack Wallen walks you through the process of importing passwords from a CSV list into 1Password. The post How to import passwords into 1Password appeared first on TechRepublic.

Passwords 148
article thumbnail

CISA: Log4Shell exploits still being used to hack VMware servers

Bleeping Computer

CISA warned today that threat actors including state-backed hacking groups are still targeting VMware Horizon and Unified Access Gateway (UAG) servers using the Log4Shell (CVE-2021-44228) remote code execution vulnerability. [.].

Hacking 145
article thumbnail

Avos ransomware threat actor updates its attack arsenal

Tech Republic Security

The Avos ransomware threat actor has recently updated its tooling, not only using malicious software but also commercial products. The post Avos ransomware threat actor updates its attack arsenal appeared first on TechRepublic.

article thumbnail

Top Security Tools & Software for SMBs in 2022

eSecurity Planet

Small businesses generally don’t have time to dip into logs several times a day, monitor every aspect of endpoint security via complex management consoles, or jump from point product to point product to stay on top of security. Instead, they want a few good tools that do a lot for them and don’t require much in the way of babysitting. At the same time, they don’t want to pay an arm and a leg for security tools that contain every bell and whistle imaginable.

Software 134
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to transfer Authy to a new phone

Tech Republic Security

Jack Wallen walks you through the steps of transferring Authy from one phone to another. The post How to transfer Authy to a new phone appeared first on TechRepublic.

Software 148
article thumbnail

Chinese Hackers Are Now Using the Nimbda Loader and a New Form of the Yahoyah Trojan

Heimadal Security

Tropic Trooper is an independent terrorist organization that has conducted operations directed at specific targets in Taiwan, the Philippines, and Hong Kong. Since 2011, Tropic Trooper has been operating with the goal of targeting organizations in the public sector, the healthcare industry, the transportation sector, and the high technology sector. What Happened?

article thumbnail

A Detailed Guide on ASP.NET Core Authentication

Security Boulevard

Security is always in the top priority and objective whenever a company starts developing an application with any technology. And same is the scenario with ASP.NET Core development. Some of the primary goals of data security are ensuring data integrity and allowing only valid users to utilize the assets. Further, to accomplish this objective, the [.].

article thumbnail

Chinese Tropic Trooper APT spreads a hacking tool laced with a backdoor

Security Affairs

China-linked APT group Tropic Trooper has been spotted previously undocumented malware written in Nim language. Check Point Research uncovered an activity cluster with ties to China-linked APT Tropic Trooper (aka Earth Centaur, KeyBoy, and Pirate Panda) which involved the use of a previously undescribed loader (dubbed “Nimbda”) written in Nim language.

Hacking 121
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

HIPAA Compliance: Privacy Challenges and Solutions

TrustArc

TrustArc’s HIPAA assessment helps health care entities with HIPAA compliance and HIPAA audit challenges when collecting, storing and sharing individuals’ protected health information.

120
120
article thumbnail

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

The Hacker News

The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. "We're trying to do the right thing and that's more than other companies working in the industry," Chaim Gelfand, the company's general counsel and chief compliance officer, said, according to a report from Politico.

Spyware 119
article thumbnail

The Great Resignation in the Tech Sector and Tips to Solve the Issue

Hacker Combat

Human resource managers are finding it hard to close the growing skills disparities in their companies. For many, the issue is that the conventional method of addressing skills shortages has started to lose its effectiveness. Hiring developers, cloud professionals, and cybersecurity specialists are at a rate that implies every firm on the planet appears to be on a drive to create a superstar tech staff.

Insurance 119
article thumbnail

Rogue cryptocurrency billboards go phishing for wallets

Malwarebytes

Billboards and digital real world advertising has raised many questions of privacy and anonymity in recent years. Until now, the primary concern has been (mostly) legal, yet potentially objectionable geolocation and user profiling. Bluetooth beacons work in tandem with geofenced billboards to send you offers. Stores follow your movements and tailor products accordingly, occasionally with very bad results.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

QNAP warns of a critical PHP flaw that could lead to remote code execution

Security Affairs

Taiwanese company QNAP is addressing a critical PHP vulnerability that could be exploited to achieve remote code execution. Taiwanese vendor QNAP is addressing a critical PHP vulnerability, tracked as CVE-2019-11043 (CVSS score 9.8 out of 10), that could be exploited to achieve remote code execution. In certain configurations of FPM setup it is possible to trigger a buffer overflaw related to the memory space reserved for FCGI protocol data, potentially leading to the remote code execution.

article thumbnail

Police seize and dismantle massive phishing operation

Malwarebytes

Europol has coordinated a joint operation to arrest members of a cybercrime gang and effectively dismantle their campaigns that netted million in Euros. This operation also led the Belgian Police (Police Fédérale/Federale Politie) and the Dutch Police (Politie) to nine arrests, 24 house searches, and the seizure of firearms, ammunition, jewelry, electronic devices, cash, and cryptocurrency.

Phishing 118
article thumbnail

New 'Quantum' Builder Lets Attackers Easily Create Malicious Windows Shortcuts

The Hacker News

A new malware tool that enables cybercriminal actors to build malicious Windows shortcut (.LNK) files has been spotted for sale on cybercrime forums. Dubbed Quantum Lnk Builder, the software makes it possible to spoof any extension and choose from over 300 icons, not to mention support UAC and Windows SmartScreen bypass as well as "multiple payloads per.LNK" file.

article thumbnail

S3 Ep88: Phone scammers, hacking bust, and data breach fines [Podcast]

Naked Security

Latest epsiode - listen now!

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Identity and Access Management at NIST: A Rich History and Dynamic Future

NSTIC

Digital identity for access control is a fundamental and critical cybersecurity capability that ensures the right people and things have the right access to the right resources at the right time. NIST has a rich history in digital identity standardization spanning more than 50 years. We have conducted research, developed prototypes and reference implementations, and supported pilots to better understand new and emerging technologies that inform our digital identity standards, guidelines, and res

article thumbnail

Cyberattackers Abuse QuickBooks Cloud Service in 'Double-Spear' Campaign

Dark Reading

Malicious invoices coming from the accounting software's legitimate domain are used to harvest phone numbers and carry out fraudulent credit-card transactions.

article thumbnail

NSO Group told lawmakers that Pegasus spyware was used by at least 5 European countries

Security Affairs

The Israeli surveillance firm NSO Group revealed that its Pegasus spyware was used by at least five European countries. The controversial Israeli surveillance vendor NSO Group told the European Union lawmakers that its Pegasus spyware was used by at least five countries in the region. NSO Group’s General Counsel Chaim Gelfand admitted that the company had “made mistakes,” but that after the abuses of its software made the headlines it has canceled several contracts. “We’re trying to

Spyware 108
article thumbnail

Virtual private networks: 5 common questions about VPNs answered

We Live Security

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask. The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity.

106
106
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

IDIQ Announces Partnership with Updater to Bring Resident-Link Rent Reporting to Millions of Consumers

Identity IQ

IDIQ Announces Partnership with Updater to Bring Resident-Link Rent Reporting to Millions of Consumers. IdentityIQ. — Company to utilize relocation technology platform for rent reporting service —. Temecula, California, June 22, 2022 – IDIQ , an industry leader in identity theft protection and credit report monitoring, today announces a new strategic partnership with Updater, the leading relocation technology platform in the multi-family housing industry.

article thumbnail

Website Heatmap: What It Is, Why You Need It, And How To Use It

SecureBlitz

In this post, I will show you all you need to know about the website heatmap. A heatmap is a. Read more. The post Website Heatmap: What It Is, Why You Need It, And How To Use It appeared first on SecureBlitz Cybersecurity.

article thumbnail

Researchers found flaws in MEGA that allowed to decrypt of user data

Security Affairs

Researchers at ETH Zurich discovered several critical flaws in the MEGA cloud storage service that could have allowed the decryption of user data. MEGA has addressed multiple vulnerabilities in its cloud storage service that could have allowed threat actors to decrypt user data stored in encrypted form. Data on Mega services is end-to-end encrypted client-side using the AES algorithm, this means that the company does not know the encryption keys to uploaded files and cannot view the content.

article thumbnail

Scalper bots out of control in Israel, selling state appointments

Bleeping Computer

Out-of-control scalper bots have created havoc in Israel by registering public service appointments for various government services and then offering to sell them to disgruntled citizens. [.].

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!