Tue.Feb 06, 2024

article thumbnail

Documents about the NSA’s Banning of Furby Toys in the 1990s

Schneier on Security

Via a FOIA request, we have documents from the NSA about their banning of Furby toys.

330
330
article thumbnail

Spear Phishing vs Phishing: What Are The Main Differences?

Tech Republic Security

There are a few differences between spear phishing and phishing that can help you identify and protect your organization from threats. Learn about these differences.

Phishing 209
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google fixed an Android critical remote code execution flaw

Security Affairs

Google released Android ’s February 2024 security patches to address 46 vulnerabilities, including a critical remote code execution issue. Google released Android February 2024 security patches to address 46 vulnerabilities, including a critical remote code execution flaw tracked as CVE-2024-0031. The vulnerability resides in the System and impacts Android Open Source Project (AOSP) versions 11, 12, 12L, 13, and 14. “Source code patches for these issues have been released to the Android Op

Hacking 143
article thumbnail

Top 7 Cyber Threat Hunting Tools for 2024

Tech Republic Security

Here are the top cyber threat hunting tools that can enhance your organization's cybersecurity defenses. Learn how their features compare.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

China-linked APT deployed malware in a network of the Dutch Ministry of Defence

Security Affairs

China-linked APT group breached the Dutch Ministry of Defence last year and installed malware on compromised systems. Dutch Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) published a joint report warning that a China-linked APT group breached the Dutch Ministry of Defence last year. The effects of the attack were limited because of the network segmentation implemented in the government infrastructure. “The Ministry of Defence (MOD

Malware 137
article thumbnail

Securden Password Vault Review 2024: Security, Pricing, Pros & Cons

Tech Republic Security

Securden Password Vault’s reporting and auditing features make it a good option for IT supervisors tasked to secure and manage multiple accounts and passwords.

Passwords 170

LifeWorks

More Trending

article thumbnail

Unveiling Atlassian Confluence Vulnerability CVE-2023-22527: Understanding and Mitigating Remote Code Execution Risks

Trend Micro

In this blog entry, we discuss CVE-2023-22527, a vulnerability in Atlassian Confluence that has a CVSS score of 10 and could allow threat actors to perform remote code execution.

Risk 133
article thumbnail

A man faces up to 25 years in prison for his role in operating unlicensed crypto exchange BTC-e

Security Affairs

A Belarusian and Cypriot national linked with the cryptocurrency exchange BTC-e is facing charges that can lead maximum penalty of 25 years in prison. Aliaksandr Klimenka, a Belarusian and Cypriot national linked with the now-defunct cryptocurrency exchange BTC-e, is facing charges with money laundering conspiracy and operation of an unlicensed money services business. “An indictment was unsealed on Tuesday charging a Belarusian and Cypriot national with money laundering conspiracy and ope

article thumbnail

Left to their own devices: Security for employees using personal devices for work

We Live Security

A cavalier approach to bring-your-own-device security won’t cut it as personal devices within corporate networks make for a potentially combustible mix.

131
131
article thumbnail

Why an HR-IT Partnership is Critical for Managing Cybersecurity Risk

Security Boulevard

By aligning priorities into a shared game plan, HR and IT can finally set their organizations up to defend against modern cyberthreats. The post Why an HR-IT Partnership is Critical for Managing Cybersecurity Risk appeared first on Security Boulevard.

Risk 130
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Known ransomware attacks up 68% in 2023

Malwarebytes

Today, Malwarebytes released its 2024 State of Malware report, detailing six cyberthreats that resource-constrained IT teams should pay attention to in 2024. Top of the list is “Big Game” ransomware, the most serious cyberthreat to businesses all around the world. Big game attacks extort vast ransoms from organizations by holding their data hostage—either with encryption, the threat of damaging data leaks, or both.

article thumbnail

Google says spyware vendors behind most zero-days it discovers

Bleeping Computer

Commercial spyware vendors (CSV) were behind 80% of the zero-day vulnerabilities Google's Threat Analysis Group (TAG) discovered in 2023 and used to spy on devices worldwide. [.

Spyware 129
article thumbnail

Report Surfaces Extent of SaaS Application Insecurity

Security Boulevard

A Wing Security survey found nearly all respondents experienced a security incident involving at least one SaaS application. The post Report Surfaces Extent of SaaS Application Insecurity appeared first on Security Boulevard.

article thumbnail

Ski & bike helmets protect your head, not location or voice

Pen Test Partners

TL;DR Livall smart ski and bike helmet app leaks the wearers real time position Group audio chat allows snooping on conversations Both issues are due to missing authorisation Bike app affects ~1 million users, ski app affects a few thousand users Fixed by the vendor, but after we had to call on a trusted journalist to escalate at Livall Backstory Some of us at PTP are keen skiers, and all of us are into IoT and connected devices.

IoT 128
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

A Deepfake Scammed a Bank out of $25M — Now What?

Trend Micro

A finance worker in Hong Kong was tricked by a deepfake video conference. The future of defending against deepfakes is as much as human challenge as a technological one.

Banking 127
article thumbnail

AI and Payments: Exploring Pitfalls and Potential Security Risks

PCI perspectives

With the rapid rise in popularity of AI services like ChatGPT, Dall-E, and GitHub Copilot, many people are looking at ways they can leverage the new abilities of these systems to improve their existing businesses.

Risk 125
article thumbnail

CISA warns of a patched Chrome flaw now exploited in attacks

Penetration Testing

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding an actively exploited security vulnerability in the widely used Google Chrome web browser. Tracked as CVE-2023-4762, this high-severity flaw poses a significant... The post CISA warns of a patched Chrome flaw now exploited in attacks appeared first on Penetration Testing.

article thumbnail

WhatsApp Chats Will Soon Work With Other Encrypted Messaging Apps

WIRED Threat Level

New EU rules mean WhatsApp and Messenger must be interoperable with other chat apps. Here’s how that will work.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Announcing Identity Intelligence With Duo

Duo's Security Blog

The idea that “identity is the new perimeter” is not new. It has been a foundational component in many approaches to zero trust. However, over the past 18 months, there has been an unprecedented wave of identity-based cyberattacks with devastating consequences. According to Cisco Talos, three of the top five MITRE ATT@CK techniques used in 2023 were identity-based.

article thumbnail

Cyberattacks Deal Heavy Financial Blows to Clorox, Johnson Controls

SecureWorld News

New regulatory filings have exposed the skyrocketing costs of major cyber incidents, as big brands Clorox and Johnson Controls admitted collectively suffering more than $75 million in attack-related expenditures last year. Cleaning giant Clorox was struck by an unspecified cyber event discovered in August 2023. The incident disrupted operations so severely that the company reverted to manual ordering and processing as a containment measure—a response indicating ransomware, experts say.

Insurance 119
article thumbnail

One Click, System Exposed: cpio Vulnerability (CVE-2023-7216) Threatens Unix Security

Penetration Testing

Primarily found on Unix-like operating systems, the `cpio` command-line utility weaves a fundamental thread, enabling users to package and unpackage files within archive files. Esteemed for its versatility and support for multiple archive formats,... The post One Click, System Exposed: cpio Vulnerability (CVE-2023-7216) Threatens Unix Security appeared first on Penetration Testing.

article thumbnail

Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network

The Hacker News

Chinese state-backed hackers broke into a computer network that's used by the Dutch armed forces by targeting Fortinet FortiGate devices. "This [computer network] was used for unclassified research and development (R&D)," the Dutch Military Intelligence and Security Service (MIVD) said in a statement.

111
111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Safer Internet Day, or why Brad Pitt needed an internet bodyguard

Malwarebytes

February 6, 2024 is Safer Internet Day. When I was asked to write about the topic, I misunderstood the question and heard: “can you cover save the internet” and we all agreed that it might be too late for that. While we laughed about it, it made me think. The internet has been around for quite some time now, and most of us wouldn’t know what to do without it.

Internet 111
article thumbnail

The Cloudflare source code breach: Lessons learned

Security Boulevard

The high-profile web hosting company Cloudflare said last week that a sophisticated attacker gained access to code repositories used by the company, and made off with sensitive internal code. This was just the latest such attack targeting the firm. The post The Cloudflare source code breach: Lessons learned appeared first on Security Boulevard.

111
111
article thumbnail

Verizon insider data breach hits over 63,000 employees

Bleeping Computer

Verizon Communications is warning that an insider data breach impacts almost half its workforce, exposing sensitive employee information. [.

article thumbnail

What Is a Host-Based Firewall? Definition & When to Use

eSecurity Planet

A host-based firewall is installed directly on individual networked devices to filter network traffic on a single device by inspecting both incoming and outgoing data. Larger enterprises use this to manage the spread of malware throughout a network in the event that one device is infected. Its goal is to establish a uniform security posture throughout the network and improve endpoint security by creating a protective barrier at the individual computer level.

Firewall 109
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Chinese hackers infect Dutch military network with malware

Bleeping Computer

A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the Military Intelligence and Security Service (MIVD) of the Netherlands. [.

Malware 106
article thumbnail

Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials

The Hacker News

Threat actors are leveraging bogus Facebook job advertisements as a lure to trick prospective targets into installing a new Windows-based stealer malware codenamed Ov3r_Stealer. "This malware is designed to steal credentials and crypto wallets and send those to a Telegram channel that the threat actor monitors," Trustwave SpiderLabs said in a report shared with The Hacker News.

article thumbnail

State of Malware 2024: What consumers need to know

Malwarebytes

Released today, the Malwarebytes State of Malware 2024 report takes a deep dive into the latest developments in the world of cybercrime. As home users, many of the threats we cover will only affect you second hand, such as disruptions after a company suffers a ransomware attack, or when your private information is sold online after a data breach. Sadly, there’s not a lot you can do to prevent incidents like these yourself, other than stay on top of the news and protect yourself against ide

Malware 106
article thumbnail

Hackers Exploit Job Boards in APAC, Steal Data of Millions of Job Seekers

The Hacker News

Employment agencies and retail companies chiefly located in the Asia-Pacific (APAC) region have been targeted by a previously undocumented threat actor known as ResumeLooters since early 2023 with the goal of stealing sensitive data.

Retail 106
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!