Fri.Jun 03, 2022

article thumbnail

What Counts as “Good Faith Security Research?”

Krebs on Security

The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute by which federal prosecutors pursue cybercrime cases. The new guidelines state that prosecutors should avoid charging security researchers who operate in “good faith” when finding and reporting vulnerabilities.

article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

The zero trust approach to enterprise security is well on its way to mainstream adoption. This is a very good thing. Related: Covid 19 ruses used in email attacks. At RSA Conference 2022 , which takes place next week in San Francisco, advanced technologies to help companies implement zero trust principals will be in the spotlight. Lots of innovation has come down the pike with respect to imbuing zero trust into two pillars of security operations: connectivity and authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Me on Public-Interest Tech

Schneier on Security

Back in November 2020, in the middle of the COVID-19 pandemic, I gave a virtual talk at the International Symposium on Technology and Society: “ The Story of the Internet and How it Broke Bad: A Call for Public-Interest Technologists.” It was something I was really proud of, and it’s finally up on the net.

Internet 227
article thumbnail

1Password vs Dashlane: Password manager comparison

Tech Republic Security

Learn about and compare the key features of two top password managers, 1Password and Dashlane, to choose the best option for your business. The post 1Password vs Dashlane: Password manager comparison appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Alert! Unpatched critical Atlassian Confluence Zero-Day RCE flaw actively exploited

Security Affairs

Atlassian warned of an actively exploited critical unpatched remote code execution flaw (CVE-2022-26134) in Confluence Server and Data Center products. Atlassian is warning of a critical unpatched remote code execution vulnerability affecting all Confluence Server and Data Center supported versions, tracked as CVE-2022-26134, that is being actively exploited in attacks in the wild. “Atlassian has been made aware of current active exploitation of a critical severity unauthenticated remote c

Internet 145
article thumbnail

Karakurt Team hits North America and Europe with data theft and extortion

Tech Republic Security

Karakurt Team attacks are hitting indiscriminate targets in North America and Europe with data theft, requesting a ransom to delete stolen data. Learn more about their methods and how to protect from it. The post Karakurt Team hits North America and Europe with data theft and extortion appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

Digital twins are moving into the mainstream

Tech Republic Security

Digital twins, popular in manufacturing for decades, are gaining traction across verticals. The post Digital twins are moving into the mainstream appeared first on TechRepublic.

article thumbnail

LuoYu APT delivers WinDealer malware via man-on-the-side attacks

Security Affairs

Chinese LuoYu Hackers Using Man-on-the-Side Attacks to Deploy WinDealer Backdoor. An “extremely sophisticated” China-linked APT tracked as LuoYu was delivering malware called WinDealer via man-on-the-side attacks. Researchers from Kaspersky have uncovered an “extremely sophisticated” China-linked APT group, tracked as LuoYu, that has been observed using a malicious Windows tool called WinDealer.

Malware 145
article thumbnail

Keeper vs LastPass: Which password manager is better for your business?

Tech Republic Security

Compare key features of password managers Keeper and LastPass, including zero trust and user authentication capabilities. The post Keeper vs LastPass: Which password manager is better for your business? appeared first on TechRepublic.

article thumbnail

Clipminer Botnet already allowed operators to make at least $1.7 Million

Security Affairs

The Clipminer botnet allowed operators to earn at least $1.7 million, according to a report published by security researchers at Symantec. Researchers at Symantec’s Threat Hunter Team uncovered a cryptomining operation that has potentially made the actors behind it at least $1.7 million in illicit gains. The bot focuses on cryptocurrency mining and cryptocurrency theft via clipboard hijacking.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Zero trust leaders avert 5 cyber disasters per year on average

Tech Republic Security

Illumio found that zero trust architecture has become the standard in cybersecurity. How can your organization best adopt this architecture? The post Zero trust leaders avert 5 cyber disasters per year on average appeared first on TechRepublic.

article thumbnail

Announcing the winners of the 2021 GCP VRP Prize

Google Security

Posted by Harshvardhan Sharma, Information Security Engineer, Google 2021 was another record-breaking year for our Vulnerability Rewards Program (VRP). We paid a total of $8.7 million in rewards, our highest amount yet. 2021 saw some amazing work from the security research community. It is worth noting that a significant portion of the reports we received were for findings in Google Cloud Platform (GCP) products.

article thumbnail

Conti reforms into several smaller groups, are they now more dangerous than ever?

Tech Republic Security

The cybercrime group has disbanded, but still may pose a severe threat to a number of businesses in a different way. The post Conti reforms into several smaller groups, are they now more dangerous than ever? appeared first on TechRepublic.

article thumbnail

Internet Safety Month: Avoiding the consequences of unsafe Internet practices

Malwarebytes

Welcome to Internet Safety Month, a once-a-year event in which you, the public, are told that anywhere between three and 30 different best practices will simplify your approach to staying safe online. Unfortunately, much of the well-intentioned advice surrounding Internet Safety Month ignores one basic fact about how people change their habits: We typically only correct our behavior after first making a mistake.

Internet 134
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Malwarebyes vs Norton: Compare top antivirus software solutions

Tech Republic Security

If you've been researching antivirus software, then Malwarebytes and Norton are likely two products you're considering. Get a feature comparison of the antivirus software to help you make your selection. The post Malwarebyes vs Norton: Compare top antivirus software solutions appeared first on TechRepublic.

Antivirus 148
article thumbnail

Unpatched Atlassian Confluence vulnerability is actively exploited

Malwarebytes

Researchers found a vulnerability in Atlassian Confluence by conducting an incident response investigation. Atlassian rates the severity level of this vulnerability as critical. Atlassian has issued a security advisory and is working on a fix for the affected products. This qualifies the vulnerability as an actively exploited in the wild zero-day vulnerability.

Firewall 133
article thumbnail

Atlassian fixes Confluence zero-day widely exploited in attacks

Bleeping Computer

Atlassian has released security updates to address a critical zero-day vulnerability in Confluence Server and Data Center actively exploited in the wild to backdoor Internet-exposed servers. [.].

Internet 132
article thumbnail

100 days of war in Ukraine: How the conflict is playing out in cyberspace

We Live Security

It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict. The post 100 days of war in Ukraine: How the conflict is playing out in cyberspace appeared first on WeLiveSecurity.

129
129
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

How to Prevent Software Supply Chain Attacks

eSecurity Planet

Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a security breach in their supply chain, and 38 percent said they have no way of knowing about any potential issues with a third-party supplier’s cybersecurity.

Software 126
article thumbnail

Microsoft disrupts Bohrium hackers’ spear-phishing operation

Bleeping Computer

The Microsoft Digital Crimes Unit (DCU) has disrupted a spear-phishing operation linked to an Iranian threat actor tracked as Bohrium that targeted customers in the U.S., Middle East, and India. [.].

Phishing 125
article thumbnail

Atlassian announces 0-day hole in Confluence Server – update soon!

Naked Security

Zero-day announced - here's what you need to know.

123
123
article thumbnail

Zero-day Exploited to Target Atlassian Confluence

Heimadal Security

A zero-day vulnerability is a newly discovered software security flaw that has not yet been patched by the developers and, as a result, can be exploited. The term “zero-day” is an imaginative time, as this type of cyberattack happens in a very short timeframe from the awareness of the security flaw. What Makes the CVE-2022-26134 Important? […].

Software 122
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Healthcare providers prefer paying ransom in ransomware attacks

CyberSecurity Insiders

Healthcare providers are opting to pay a ransom in the event of ransomware attacks, instead of recovering it from data backups. The reason is as it is easy and guarantees 100% encrypted data return- Of course, as per their perspective! According to the data released by Sophos that was also commissioned by global market research company Vanson Bourne, up to two third’s of ransomware victims from Global Healthcare Organizations (HCOs) were bent to pay their attackers as the cost of remediation and

article thumbnail

YourCyanide Ransomware Propagates With PasteBin, Discord, Microsoft Links

Dark Reading

The latest iteration of CMD-based ransomware is sophisticated and tricky to detect – and integrates token theft and worming capabilities into its feature set.

article thumbnail

GitLab Issues Security Patch for Critical Account Takeover Vulnerability

The Hacker News

GitLab has moved to address a critical security flaw in its service that, if successfully exploited, could result in an account takeover. Tracked as CVE-2022-1680, the issue has a CVSS severity score of 9.9 and was discovered internally by the company. The security flaw affects all versions of GitLab Enterprise Edition (EE) starting from 11.10 before 14.9.5, all versions starting from 14.

article thumbnail

For Ransomware, Speed Matters

Dark Reading

Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

GitLab security update fixes critical account take over flaw

Bleeping Computer

GitLab has released a critical security update for multiple versions of its Community and Enterprise Edition products to address eight vulnerabilities, one of which allows account takeover. [.].

article thumbnail

What’s hot at #RSAC? Here’s our picks for the big show

Security Boulevard

It's two years in, and COVID is still threatening to steal RSA Conference's mojo. But for those willing to brave Moscone in San Francisco (and those attending virtually), you won’t be disappointed. Here are our picks for must-see talks. The post What’s hot at #RSAC? Here’s our picks for the big show appeared first on Security Boulevard.

116
116
article thumbnail

Novartis says no sensitive data was compromised in cyberattack

Bleeping Computer

Pharmaceutical giant Novartis says no sensitive data was compromised in a recent cyberattack by the Industrial Spy data-extortion gang. [.].

117
117
article thumbnail

Microsoft Blocks Iran-linked Lebanese Hackers Targeting Israeli Companies

The Hacker News

Microsoft on Thursday said it took steps to disable malicious activity stemming from abuse of OneDrive by a previously undocumented threat actor it tracks under the chemical element-themed moniker Polonium.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!