Wed.Oct 12, 2022

article thumbnail

Recovering Passwords by Measuring Residual Heat

Schneier on Security

Researchers have used thermal cameras and ML guessing techniques to recover passwords from measuring the residual heat left by fingers on keyboards. From the abstract: We detail the implementation of ThermoSecure and make a dataset of 1,500 thermal images of keyboards with heat traces resulting from input publicly available. Our first study shows that ThermoSecure successfully attacks 6-symbol, 8-symbol, 12-symbol, and 16-symbol passwords with an average accuracy of 92%, 80%, 71%, and 55% respec

Passwords 348
article thumbnail

Google Cybersecurity Action Team Threat Horizons Report #4 Is Out!

Anton on Security

This is my completely informal, uncertified, unreviewed and otherwise completely unofficial blog inspired by my reading of our fourth Threat Horizons Report ( full version ) that we just released ( the official blog for #1 report , my unofficial blog for #2 , my unofficial blog for #3 ). My favorite quotes from the report follow below: “in Q2 threat actors frequently targeted weak and default-password issues for initial compromise, factoring in over half of identified Incidents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Practices for Hospitals To Manage Risks To CyberSecurity Created By Medical Technology And Information Systems: A Webinar With The CIA’s Former CyberSecurity Director And The Top CyberSecurity Columnist

Joseph Steinberg

What can hospitals learn from an ex-CIA cybersecurity director and a cybersecurity-expert columnist read by millions of people? Join Bonnie Stith, former Director of the CIA’s Center for Cyber Intelligence , and and Joseph Steinberg, renowned cybersecurity expert witness and columnist , for a special, free educational webinar, Best Practices for Asset Risk Management in Hospitals.

article thumbnail

Get a Windscribe VPN Pro Plan for 43% off

Tech Republic Security

Protect your personal and business information from snoops with a Windscribe VPN Pro Plan—now available for just $39. The post Get a Windscribe VPN Pro Plan for 43% off appeared first on TechRepublic.

VPN 158
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Malicious WhatsApp mod distributed through legitimate apps

SecureList

Last year, we wrote about the Triada Trojan inside FMWhatsApp, a modified WhatsApp build. At that time, we discovered that a dropper was found inside the distribution, along with an advertising SDK. This year, the situation has repeated, but with a different modified build, YoWhatsApp version 2.22.11.75. Inside it, we found a malicious module that we detect as Trojan.AndroidOS.Triada.eq.

Malware 145
article thumbnail

Credential phishing attacks continue to exploit COVID-19 to target businesses

Tech Republic Security

Recent phishing emails claim to offer a COVID-19 grant application from the SBA but are actually looking to capture banking details and other confidential data, says Inky. The post Credential phishing attacks continue to exploit COVID-19 to target businesses appeared first on TechRepublic.

Phishing 148

LifeWorks

More Trending

article thumbnail

Get 10 cybersecurity courses for just $35

Tech Republic Security

Be prepared for the latest cybersecurity threats with the 2023 Complete Cyber Security Ethical Hacking Certification Bundle. The post Get 10 cybersecurity courses for just $35 appeared first on TechRepublic.

article thumbnail

Unofficial WhatsApp Android app caught stealing users’ accounts

Bleeping Computer

A new version of an unofficial WhatsApp Android application named 'YoWhatsApp' has been found stealing access keys for users' accounts. [.].

article thumbnail

WhatsApp Users Beware: Dangerous Mobile Trojan Being Distributed via Malicious Mod

Dark Reading

Among other things, users who download the app could end up having their WhatsApp account details stolen.

Mobile 144
article thumbnail

How scammers target Zelle users – and how you can stay safe

We Live Security

Fraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep your money safe while using the popular P2P payment service. The post How scammers target Zelle users – and how you can stay safe appeared first on WeLiveSecurity.

Scams 137
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild

Dark Reading

Drone-based cyberattacks to spy on corporate targets are no longer hypothetical, one incident from this summer shows.

138
138
article thumbnail

Microsoft adds new RSS feed for security update notifications

Bleeping Computer

Microsoft has now made it possible to receive notifications about new security updates through a new RSS feed for the Security Update Guide. [.].

135
135
article thumbnail

Aruba fixes critical vulnerabilities in EdgeConnect Enterprise Orchestrator

Security Affairs

Aruba addressed multiple critical severity vulnerabilities in the EdgeConnect Enterprise Orchestrator. Aruba addressed multiple critical severity vulnerabilities in the EdgeConnect Enterprise Orchestrator that can be exploited by remote attackers to compromise the vulnerable host. Aruba EdgeConnect Orchestrator is a centralized SD-WAN management solution that allows enterprises to control their WAN.

article thumbnail

KnowBe4 to Be Acquired for $4.6B by Private Equity Firm Vista

Dark Reading

Vista Equity Partners plans take the publicly traded security-awareness training vendor private.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Vulnerable API Exposes Private npm Packages

eSecurity Planet

Aqua Nautilus security researchers have revealed that threat actors could perform a timing attack on npm’s API to uncover private packages. The timing attack on the JavaScript package manager can work even if npm returns a 404 error to unauthorized or unauthenticated users who try to request the following endpoint (generic pattern): [link]. A malicious attacker can send multiple consecutive requests to determine if the package exists or has been removed.

Software 129
article thumbnail

Patch Tuesday in brief – one 0-day fixed, but no patches for Exchange!

Naked Security

There's a zero-day patch, but it's not for the zero-day you thought.

127
127
article thumbnail

Android Leaks Wi-Fi Traffic Even When VPN Protection Features Are On

Dark Reading

The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.

VPN 125
article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso. This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology.

CISO 125
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft Patch Tuesday for October 2022 doesn’t fix Exchange Server flaws

Security Affairs

Microsoft Patch Tuesday security updates for October 2022 addressed a total of 85 security vulnerabilities, including an actively exploited zero-day. Microsoft Patch Tuesday security updates for October 2022 addressed 85 new vulnerabilities in multiple products, including Microsoft Windows and Windows Components; Azure, Azure Arc, and Azure DevOps; Microsoft Edge (Chromium-based); Office and Office Components; Visual Studio Code; Active Directory Domain Services and Active Directory Certificate

Hacking 124
article thumbnail

Portnox adds IoT fingerprinting to network access control service

CSO Magazine

Network security firm Portnox on Wednesday announced it is adding IoT fingerprinting features to the Portnox Cloud NAC-as-a-Service to allow companies to more easily identify and authorize devices on their networks. The IoT fingerprinting features add new device-identification techniques to the network access control product, including MAC address clustering and DHCP (Dynamic Host Configuration Protocol) gleaning.

IoT 121
article thumbnail

Cisco released Duo Mobile for added Security

CyberSecurity Insiders

To all those searching for 2FA apps, here’s a new product from the stable of Cisco Systems. The networking giant has released an authentication app that works on both Google and iOS platforms and informs its users whenever somebody logs into their account by using their username and password. It is like that of Google Authentication, where a notification is sent by the web search giant to the registered mobile of the user, after which they can decide whether to approve or decline the login reque

Mobile 119
article thumbnail

Signal will remove support for SMS text messages on Android

Bleeping Computer

Signal says it will start to phase out SMS and MMS message support from its Android app to streamline the user experience and prioritize security and privacy. [.].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Using Vishing to Trick Victims into Installing Android Banking Malware

The Hacker News

Malicious actors are resorting to voice phishing (vishing) tactics to dupe victims into installing Android malware on their devices, new research from ThreatFabric reveals. The Dutch mobile security company said it identified a network of phishing websites targeting Italian online-banking users that are designed to get hold of their contact details.

Banking 118
article thumbnail

Microsoft Defender adds command and control traffic detection

Bleeping Computer

Microsoft has added command-and-control (C2) traffic detection capabilities to its Microsoft Defender for Endpoint (MDE) enterprise endpoint security platform. [.].

119
119
article thumbnail

Microsoft Patch Tuesday Leaves ProxyNotShell Exposed

eSecurity Planet

Microsoft’s October 2022 Patch Tuesday includes security updates that fix well over 80 vulnerabilities in more than 50 different parts of its product range – but the ProxyNotShell flaws in Exchange Server that were reported last month are not on the list. Key vulnerabilities patched include CVE-2022-41033 , a zero-day flaw in the Windows COM+ Event System Service that’s being actively exploited and can provide an attacker with system privileges; and CVE-2022-34689 , a Windows CryptoA

Passwords 118
article thumbnail

Information overload, burnout, talent retention impacting SOC performance

CSO Magazine

While most security teams believe that security operations centers (SOCs) play a pivotal role in cybersecurity programs, several challenges are impacting SOC performance within businesses, according to a new report. Among these are information overload, worker burnout, and talent retention. The data comes from cybersecurity firm Devo following an independent survey of global SOC leaders (553) and staff members (547), and it adds evidence to reports of security operations becoming harder for team

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google Rolling Out Passkey Passwordless Login Support to Android and Chrome

The Hacker News

Google on Wednesday officially rolled out support for passkeys, the next-generation authentication standard, to both Android and Chrome. "Passkeys are a significantly safer replacement for passwords and other phishable authentication factors," the tech giant said. "They cannot be reused, don't leak in server breaches, and protect users from phishing attacks.

article thumbnail

Malwarebytes pairs new MDR, EDR for overwhelmed cybersecurity teams

CSO Magazine

Addressing the shortage of skilled cybersecurity professionals, Malwarebytes on Wednesday launched Malwarebytes MDR (managed detection and response), pairing EDR (end point detection and response) technology with a dedicated team of security analysts, providing both automated and human lines of defense. In doing so, the company says, the new MDR service helps reduce the need for security teams to dedicate a large staff to prioritize, triage and respond to threats.

article thumbnail

Critical Bug in Siemens SIMATIC PLCs Could Let Attackers Steal Cryptographic Keys

The Hacker News

A vulnerability in Siemens Simatic programmable logic controller (PLC) can be exploited to retrieve the hard-coded, global private cryptographic keys and seize control of the devices.

article thumbnail

LockBit Ransomware Spread through Microsoft Exchange Servers

Heimadal Security

Microsoft is once again confronted with reports of a new zero-day vulnerability being used to hack Exchange servers which might have led to the launch LockBit ransomware attacks. In July 2022, two servers operated by a customer of the South Korean AhnLab cybersecurity firm were infected with LockBit 3.0 ransomware. Another Zero-Day Vulnerability As reported, threat actors […].

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!