Mon.Mar 27, 2023

article thumbnail

Hacks at Pwn2Own Vancouver 2023

Schneier on Security

An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver: On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day exploits and exploit chains to win $375,000 and a Tesla Model 3. The first to fall was Adobe Reader in the enterprise applications category after Haboob SA’s Abdul Aziz Hariri ( @abdhariri ) used an exploit chain targeting a 6-bug logic chain abusing multiple

Hacking 58
article thumbnail

GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

The Last Watchdog

Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the culture building approaches of high-risk industries like construction that devote sustained attention to embedding safety throughout the organization. For most organizations, building a cybersecurity culture is a necessary evil rather than a cherished goal.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hiring kit: Cybersecurity engineer

Tech Republic Security

PURPOSE Recruiting a cybersecurity engineer with the right combination of technical and industry experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS.

article thumbnail

Apple patches everything, including a zero-day fix for iOS 15 users

Naked Security

Got an older iPhone that can't run iOS 16? You've got a zero-day to deal with! That super-cool Studio Display monitor needs patching, too.

140
140
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to secure your GitHub account with two-factor authentication

Tech Republic Security

GitHub wants you to protect your account with the right type of authentication. The post How to secure your GitHub account with two-factor authentication appeared first on TechRepublic.

article thumbnail

Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare

Dark Reading

Indicators point to Twitter's source code being publicly available for around 3 months, offering a developer security object lesson for businesses.

140
140

LifeWorks

More Trending

article thumbnail

Source Code of Twitter leaked on GitHub

CyberSecurity Insiders

Twitter issued a public statement stating that parts of its source code were leaked on GitHub and that its officials were trying their best to file a DMCA to take down the leaked content from the web and identify the user who submitted the content to the web-based software development platform. The leaked information includes proprietary source code of the social media platform’s internal tools, and the staff are busy tracing out the culprit.

Media 124
article thumbnail

New MacStealer macOS malware steals passwords from iCloud Keychain

Bleeping Computer

A new info-stealing malware named MacStealer is targeting Mac users, stealing their credentials stored in the iCloud KeyChain and web browsers, cryptocurrency wallets, and potentially sensitive files. [.

Malware 127
article thumbnail

France bans TikTok, all social media apps from government devices

CSO Magazine

The French government has banned TikTok and all other “recreational apps” from phones issued to its employees. The Minister of Transformation and the Public Service Stanislas Guerini, said in a statement that recreational applications do not have sufficient levels of cybersecurity and data protection to be deployed on government equipment. This prohibition applies immediately and uniformly, although exemptions may be granted on an exceptional basis for professional needs such as the institutiona

article thumbnail

Twitter takes down source code leaked online, hunts for downloaders

Bleeping Computer

Twitter has taken down internal source code for its platform and tools that was leaked on GitHub for months. Now it's using a subpoena to search for those who leaked and downloaded its code. [.

126
126
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Survey Surfaces Need to Change SecOps Priorities

Security Boulevard

A survey of 250 senior cybersecurity and IT professionals found well over half of respondents (57%) reported that security operations (SecOps) are more chaotic today than two years ago, with 96% planning to reevaluate their priorities. Conducted by Enterprise Strategy Group on behalf of Anvilogic, a provider of a platform for automating threat detection, the.

article thumbnail

Microsoft assigns CVE to Snipping Tool bug, pushes patch to Store

Naked Security

Microsoft says "successful exploitation requires uncommon user interaction", but it's the innocent and accidental leakage of private data you should be concerned about.

117
117
article thumbnail

Best practices for protecting AWS RDS and other cloud databases

CSO Magazine

It’s no surprise that organizations are increasingly using cloud-native services, including for data storage. Cloud storage offers tremendous benefits such as replication, geographic resiliency, and the potential for cost-reduction and improved efficiency. The Amazon Web Services (AWS) Relational Database Service (RDS) is one of the most popular cloud database and storage services.

article thumbnail

Manage Open Source Risk With Improved Malware Detection

Security Boulevard

Malware targeting developers is a major concern that the industry is struggling to catch up with. We know open source software supply chain attacks are a problem with an estimated 700% increase in 2022. Gartner suggests that in the next two years “60% of organizations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements ( source ).

Risk 114
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Parts of Twitter`s Source Code Were Leaked on GitHub, According to Elon Musk

Heimadal Security

On Friday, March 24th, Twitter sent GitHub a copyright infringement notice, claiming some of the platform`s users leaked parts of their source code. GitHub, the Microsoft-owned service for software developers, reacted promptly and took down the code the same day. According to researchers, the leaked code had been public for at least several months. Twitter […] The post Parts of Twitter`s Source Code Were Leaked on GitHub, According to Elon Musk appeared first on Heimdal Security Blog.

Software 111
article thumbnail

Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences

Security Boulevard

Okta and Zoom today announced an integration through which cybersecurity administrators will be able to centrally manage end-to-end encryption across the Zoom videoconferencing platform. The Okta Authentication for End-to-End Encryption (E2EE) makes use of the Okta identity and access management platform to authenticate an attendee’s identity via email to enable organizations to ensure zero-trust policies.

article thumbnail

Researchers warn of two new variants of potent IcedID malware loader

CSO Magazine

Security researchers have seen attack campaigns using two new variants of IcedID, a banking Trojan program that has been used to deliver ransomware in recent years. The two new variants, one of which appears to be connected to the Emotet botnet, are lighter compared to the standard one because certain functionality has been stripped. "It is likely a cluster of threat actors is using modified variants to pivot the malware away from typical banking Trojan and banking fraud activity to focus on pay

Malware 109
article thumbnail

Streaming Services and Cybersecurity

Security Boulevard

The popularity of streaming platforms and apps have exploded in recent years. Streaming services have now become the norm, rather than the exception, as more households “cut the cord” with their cable providers. Streaming services provide almost an endless array of content that cater to the preferences of their viewers. The rapid growth of streaming […] The post Streaming Services and Cybersecurity appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Part of Twitter source code leaked on GitHub

CSO Magazine

Part of Twitter’s source code has been leaked and posted on GitHub by an unknown user. GitHub took down the post after the social media platform requested it to do so on Friday. Twitter has also filed a case in the US District Court for the Northern District of California seeking to order GitHub to identify the person who shared the code and any other individuals who downloaded it, according to The New York Times.

Media 109
article thumbnail

New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords

The Hacker News

A new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information from compromised devices. Dubbed MacStealer, it's the latest example of a threat that uses Telegram as a command-and-control (C2) platform to exfiltrate data. It primarily affects devices running macOS versions Catalina and later running on M1 and M2 CPUs.

Malware 107
article thumbnail

Can zero trust be saved?

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! Right now, “Zero Trust” is in serious danger of becoming an empty buzzword. The problem isn’t just that marketers have slapped the Zero Trust label on everything short of breakfast cereal–it’s that for … Continue reading "Can zero trust be saved?

Marketing 105
article thumbnail

Business Email Compromise Threats Soar Past Phishing Risks

Security Boulevard

The risk of business email compromise (BEC) is increasing annually and is estimated to be twice as severe as the overall threat of phishing, according to an Osterman Research/IronScales survey of 249 U.S.-based IT and security professionals. In the past 12 months, more than 93% of organizations encountered one or multiple forms of BEC attacks, The post Business Email Compromise Threats Soar Past Phishing Risks appeared first on Security Boulevard.

Phishing 105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

5 Common Hotel Scams and How to Avoid Them

Identity IQ

5 Common Hotel Scams and How to Avoid Them IdentityIQ Staying at a hotel should be an enjoyable experience. But unfortunately, there are many scams out there that can make it a nightmare. To help protect your personal information and money, it is important to be aware of the most common hotel scams and how to help avoid them. 5 Common Hotel Scams Hotels are a popular target for scammers due to the high volume of guests and transactions that take place.

Scams 104
article thumbnail

Weakness at the Network Edge: Mandiant Examines 2022’s Zero-Day Exploits

eSecurity Planet

Enterprise IT, network and security product vulnerabilities were among those actively exploited in zero-day attacks last year, according to a recent Mandiant report. Mandiant tracked 55 zero-day vulnerabilities that were actively exploited in 2022. That’s fewer than the 81 zero-days exploited in 2021, but far more than those exploited in any previous year.

Firewall 104
article thumbnail

Apple fixes recently disclosed WebKit zero-day on older iPhones

Bleeping Computer

Apple has released security updates to backport patches released last month, addressing an actively exploited zero-day bug for older iPhones and iPads. [.

104
104
article thumbnail

GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

Security Boulevard

Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the culture building approaches of high-risk industries like construction that devote sustained attention to embedding safety throughout the organization.… (more…) The post GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apple Issues Urgent Security Update for Older iOS and iPadOS Models

The Hacker News

Apple on Monday backported fixes for an actively exploited security flaw to older iPhone and iPad models. The issue, tracked as CVE-2023-23529, concerns a type confusion bug in the WebKit browser engine that could lead to arbitrary code execution. It was originally addressed by the tech giant with improved checks as part of updates released on February 13, 2023.

article thumbnail

Request for Comments: PCI TSP Security Requirements

PCI perspectives

From 27 March to 27 April 2023, eligible stakeholders are invited to review and provide feedback on the PCI Token Service Provider (TSP) Security Requirements v1.0 during a 30-day request for comments (RFC) period.

102
102
article thumbnail

CISA Releases Hunt Tool for Microsoft's Cloud Services

Dark Reading

CISA released the hunt and response tool to help defenders extract cloud artifacts without performing additional analytics.

101
101
article thumbnail

Microsoft Issues Patch for aCropalypse Privacy Flaw in Windows Screenshot Tools

The Hacker News

Microsoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool for Windows 10 and Windows 11. The issue, dubbed aCropalypse, could enable malicious actors to recover edited portions of screenshots, potentially revealing sensitive information that may have been cropped out. Tracked as CVE-2023-28303, the vulnerability is rated 3.

100
100
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!