Tue.Jul 04, 2023

article thumbnail

The Password Game

Schneier on Security

Amusing parody of password rules. BoingBoing : For example, at a certain level, your password must include today’s Wordle answer. And then there’s rule #27: “At least 50% of your password must be in the Wingdings font.

Passwords 193
article thumbnail

Deepfaking it: What to know about deepfake?driven sextortion schemes

We Live Security

Criminals increasingly create deepfake nudes from people’s benign public photos in order to extort money from them, the FBI warns The post Deepfaking it: What to know about deepfake‑driven sextortion schemes appeared first on WeLiveSecurity

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Analytics data transfer to U.S. brings $1 million fine to Swedish firms

Bleeping Computer

The Swedish Authority for Privacy Protection (Integritetsskyddsmyndigheten - IMY) has fined two companies with 12.3 million SEK (€1 million/$1.1 million) for using Google Analytics and warned two others about the same practice. [.

124
124
article thumbnail

How Organizations can Thrive Despite the Cybersecurity Skill Shortage

Security Boulevard

Introduction Organizations across industries face a common challenge – the Cybersecurity Skill Shortage. IBM Data Breach Report revealed that an alarming 83% of organizations experienced more than one data breach during 2022, underlining an urgent need for cybersecurity skills training. […] The post How Organizations can Thrive Despite the Cybersecurity Skill Shortage appeared first on WeSecureApp :: Simplifying Enterprise Security.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Ghostscript bug could allow rogue documents to run system commands

Naked Security

Even if you’ve never heard of the venerable Ghostscript project, you may have it installed without knowing.

133
133
article thumbnail

Breaking it Down: What You Need to Know About Data Breaches

IT Security Guru

One of the most pressing cybersecurity concerns for organisations today is preventing the exfiltration of sensitive data. Even companies whose main focus is not digital or technological in nature have to manage, store, send, and receive considerable amounts of data in the course of regular business operations. While cybersecurity is not always a top priority for all enterprises, it must be seriously considered and treated with the gravitas it deserves.

More Trending

article thumbnail

Why Schools are Low-Hanging Fruit for Cybercriminals

IT Security Guru

Hackers are increasingly targeting schools as technology is being integrated more deeply into teaching. Educational institutions own many sensitive data, such as personnel and financial information, as well as intellectual property. Unfortunately, many schools lack adequate cybersecurity measures, making them easy targets for fraudsters. In this blog post, we’ll look at the factors that make schools susceptible to cyberattacks and discuss why it’s crucial to have robust cybersecurity

Education 100
article thumbnail

Google plans to scrape everything you post online to train its AI

Malwarebytes

Additions to Google’s Privacy Policy are making some observers worry that all of your content is about to be fed into Google's AI tools. Alterations to the T&Cs now explicitly state that your “publicly available information” will be used to train in-house Google AI models alongside other products. From the Privacy Policy page: In some circumstances, Google also collects information about you from publicly accessible sources.

article thumbnail

Hackers stole millions of dollars worth of crypto assets from Poly Network platform

Security Affairs

Poly Network platform suspended its services during the weekend due to a cyber attack that resulted in the theft of millions of dollars in crypto assets. Threat actors have stolen millions of dollars worth of crypto assets from the Poly Network platform during the weekend. The platform suspended its services due to the cyber attack to investigate the security breach and assess the extent of the incident.

article thumbnail

HHS Data at Risk After MOVEit Hack Impacted Third-Party Vendors

Heimadal Security

A third-party security breach at the Department of Health and Human Services (HHS) may have exposed the personal information of at least 100,000 people, a department official stated last week, making it the latest US government agency to be hit by a widespread cyberattack tied to Russian-speaking cybercriminals. On June 27, HHS informed Congress of […] The post HHS Data at Risk After MOVEit Hack Impacted Third-Party Vendors appeared first on Heimdal Security Blog.

Risk 92
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Swedish Data Protection Authority Warns Companies Against Google Analytics Use

The Hacker News

The Swedish data protection watchdog has warned companies against using Google Analytics due to risks posed by U.S. government surveillance, following similar moves by Austria, France, and Italy last year. The development comes in the aftermath of an audit initiated by the Swedish Authority for Privacy Protection (IMY) against four companies CDON, Coop, Dagens Industri, and Tele2.

article thumbnail

How to Identify Phishing Emails and Prevent an Attack Using DNS Filtering

Heimadal Security

Identifying phishing emails and preventing phishing attacks continue to raise serious challenges for any company’s IT team. Although it`s been almost 30 years since the first phishing email was detected, threat actors still rely on this technique. Phishing attacks and their consequences have been largely discussed in the past years. Almost anyone with minimal digital […] The post How to Identify Phishing Emails and Prevent an Attack Using DNS Filtering appeared first on Heimdal Secur

DNS 83
article thumbnail

DDoSia Attack Tool Evolves with Encryption, Targeting Multiple Sectors

The Hacker News

The threat actors behind the DDoSia attack tool have come up with a new version that incorporates a new mechanism to retrieve the list of targets to be bombarded with junk HTTP requests in an attempt to bring them down.

article thumbnail

Self-driving cars are a privacy issue, says security expert

Malwarebytes

Self-driving cars peel off an extra layer from our privacy, says security expert Bruce Schneier. Theoretically, if you know the location of all the closed-circuit television (CCTV) cameras in a neighborhood, you might be able to move around without one of them ever catching a glimpse of your face. Although depending on where you live, that might already be hard to accomplish.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Mexico-Based Hacker Targets Global Banks with Android Malware

The Hacker News

An e-crime actor of Mexican provenance has been linked to an Android mobile malware campaign targeting financial institutions globally, but with a specific focus on Spanish and Chilean banks, from June 2021 to April 2023. The activity is being attributed to an actor codenamed Neo_Net, according to security researcher Pol Thill.

Banking 83
article thumbnail

ChatGPT Shared Links and Information Protection: Risks and Measures Organizations Must Understand

Trend Micro

Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organizations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.

Risk 66
article thumbnail

eIDAS 2.0 Broadens the Scope of Digital Identity Processes for B2B and Consumers

GlobalSign

eIDAS 2.0 is coming! Explore how the regulation has evolved and how it can broaden the scope of digital identity for B2B and consumers.

B2B 71
article thumbnail

MOVEit attack on Aon exposed data of the staff at the Dublin Airport

Security Affairs

Personal data of the personnel at the Dublin Airport was compromised due to a MOVEit attack on professional service provider Aon. Data of about 3000 employees of Dublin Airport (DDA) were compromised after professional service provider Aon fell victim to a MOVEit Transfer attack. Dublin Airport notified local authorities and Ireland’s Data Protection Commission.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Charming Kitten’s POWERSTAR Malware Boosts its Techniques

Heimadal Security

Cybersecurity researchers recently published an advisory on the evolution of POWERSTAR backdoor malware and advanced spear-phishing techniques used by Charming Kitten, a threat actor believed to be from Iran. The most recent version of POWERSTAR has improved operational security measures, making it more difficult to analyze and gather intelligence on this malware.

Malware 65
article thumbnail

Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges

Security Boulevard

Learn how an AWS service usage and permissions combination discovered by Ermetic may increase risk upon a certain non-compliance The post Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges appeared first on Ermetic. The post Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges appeared first on Security Boulevard.

Risk 57
article thumbnail

Still Unsure of Soft Opt- In? BH Consulting Has You Covered

BH Consulting

With the countless privacy and data protection terms now in circulation, it can be difficult to wrap your head around many of the concepts. One you may still be grappling with is the soft opt-in for marketing. It’s worth knowing because it’s a valuable tool that allows organisations to communicate with their customers without explicit marketing consent.

article thumbnail

Understanding the Top Changes in PCI DSS 4.0

Security Boulevard

There is a new version of PCI DSS - PCI DSS version 4.0. Here are the top changes that you must be aware of to help your business navigate. The post Understanding the Top Changes in PCI DSS 4.0 appeared first on Scytale. The post Understanding the Top Changes in PCI DSS 4.0 appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Neo_Net runs eCrime campaign targeting clients of banks globally

Security Affairs

A Mexican threat actor that goes online with the moniker Neo_Net is behind an Android malware campaign targeting banks worldwide. A joint study conducted by vx-underground and SentinelOne recently revealed that a Mexican threat actor that goes online with the moniker Neo_Net is behind an Android malware campaign targeting financial institutions worldwide.

Banking 86
article thumbnail

United States of America, Independence Day 2023

Security Boulevard

vi a our Library of Congress , United States of America The United States of America , Declaration of Independence Permalink The post United States of America, Independence Day 2023 appeared first on Security Boulevard.

57
article thumbnail

President Theodore Roosevelt’s Independence Day Speech, 1903

Security Boulevard

In which, Theodore Roosevelt , President of the United States of America , delivers his outstanding Independence Day 1903 oratory masterpiece one hundred and twenty years ago, and still relevant today. ### Mr. Chairman, and you, my fellow citizens, my old time friends and neighbors, men and women of Huntington: I thank you for having given me the chance of saying a few words to you this afternoon, and in greeting all of you I wish to say a word of special greeting to those whom none of us will o

article thumbnail

Six Benefits of Modernized PKI on Azure and How Keyfactor Can Help

Security Boulevard

In this guest blog post, Paul de Curnou, Senior Business Development Manager, Marketplaces at Keyfactor, explores the benefits of modernized PKI deployments on Microsoft Azure and how Keyfactor can help. The post Six Benefits of Modernized PKI on Azure and How Keyfactor Can Help appeared first on Keyfactor. The post Six Benefits of Modernized PKI on Azure and How Keyfactor Can Help appeared first on Security Boulevard.

52
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Benefits of Applying an Application Whitelisting Solution

Security Boulevard

Four enterprise-wide benefits of implementing an application whitelisting solution Application whitelisting is a proactive security technique that dictates which applications are permitted to run on a system, while blocking all others by default. It essentially creates a “whitelist” of approved applications based on their identifiable attributes, such as their file names, cryptographic hash, or publisher’s.

52
article thumbnail

How to exploit an API using prototype pollution

Security Boulevard

Learn how to use server-side prototype pollution (SSPP) to abuse an API written in NodeJS for privilege escalation and remote code execution. The post How to exploit an API using prototype pollution appeared first on Dana Epp's Blog. The post How to exploit an API using prototype pollution appeared first on Security Boulevard.

Hacking 52
article thumbnail

Cash App Scams & Fraud: How Can I Protect Myself?

Security Boulevard

We will discuss the different types of Cash App scams you should be aware of, how to protect yourself from fake Cash App transactions, and what steps you can take if you become a victim of one of these schemes. The post Cash App Scams & Fraud: How Can I Protect Myself? appeared first on Security Boulevard.

Scams 40