Thu.Oct 14, 2021

article thumbnail

Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Krebs on Security

On Wednesday, the St. Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social Security numbers of 100,000 elementary and secondary teachers. In a press conference this morning, Missouri Gov. Mike Parson (R) said fixing the flaw could cost the state $50 million, and vowed his administration would seek to prosecute and investigate the “hackers” and anyone who aided the publication

Education 343
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’ll be speaking at an Informa event on November 29, 2021. Details to come. The list is maintained on this page.

324
324
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcom Software's Symantec Threat Hunter Team discovers first-of-its-kind ransomware

Tech Republic Security

The new ransomware family, called Yanluowang, appears to still be under development and lacks some sophisticated features found in similar code. Nonetheless, Symantec said, it's dangerous.

article thumbnail

Recovering Real Faces from Face-Generation ML System

Schneier on Security

New paper: “ This Person (Probably) Exists. Identity Membership Attacks Against GAN Generated Faces. Abstract: Recently, generative adversarial networks (GANs) have achieved stunning realism, fooling even human observers. Indeed, the popular tongue-in-cheek website [link] taunts users with GAN generated images that seem too real to believe. On the other hand, GANs do leak information about their training data, as evidenced by membership attacks recently demonstrated in the literature.

245
245
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How a vishing attack spoofed Microsoft to try to gain remote access

Tech Republic Security

A voice phishing campaign spotted by Armorblox tried to convince people to give the attackers access to their computer.

Phishing 196
article thumbnail

AI Driving Foreign Influence, Disinformation and Espionage

Security Boulevard

In early October 2021, director of the NSA and U.S. Cyber Command General Paul Nakasone spoke at the 2021 Mandiant Cyber Defense Summit. In his speech, Nakasone detailed numerous ongoing influence operations and outlined how the entities he commands are tackling nation-state threats. He noted that the main challenge his organizations face can be summed.

LifeWorks

More Trending

article thumbnail

The XDR Solution to the Ransomware Problem

Cisco Security

During a ransomware attack, it is critical to detect and respond early and quickly. By decreasing your mean time to detection in identifying the attacker’s behavior, your security team can quickly investigate and respond timely to prevent a ransomware incident. And, if you can interrupt the attacker’s tools, tactics, or techniques early in the process that will force most attackers to abandon the campaign as they cannot progress further along in the “kill chain”.

article thumbnail

Employee offboarding: Why companies must close a crucial gap in their security strategy

We Live Security

There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe? The post Employee offboarding: Why companies must close a crucial gap in their security strategy appeared first on WeLiveSecurity.

article thumbnail

WhatsApp starts offering password enabled encryption to user backups

CyberSecurity Insiders

From now on, all WhatsApp backups will be protected by a password enabled encryption method offering an extra layer of security protection to users from spying eyes. The Facebook giant’s subsidiary has notified to all its global iOS and Android users that it will provide a 64 digit key to secure the messages stored on the user cloud accounts, respectively.

Backups 137
article thumbnail

Analysis of 80 million ransomware samples reveals a world under attack

The State of Security

VirusTotal's first Ransomware Activity Report reveals that it received ransomware submissions from 140 different countries around the world, and discovered at least 130 different ransomware families had been active since January 2020. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Inside Apple: How Apple’s attitude impacts security

Malwarebytes

Last week saw the fourth occurrence of the Objective by the Sea (OBTS) security conference, which is the only security conference to focus exclusively on Apple’s ecosystem. As such, it draws many of the top minds in the field. This year, those minds, having been starved of a good security conference for so long, were primed and ready to share all kinds of good information.

Spyware 134
article thumbnail

REvil ransomware explained: A widespread extortion operation

CSO Magazine

REvil is a ransomware-as-a-service (RaaS) operation that has extorted large amounts of money from organizations worldwide over the past year. Its name stands for Ransomware Evil and was inspired by the Resident Evil movie series. According to recent reports from security firms, it is the most widespread ransomware threat and the group behind it doubles down on its extortion efforts by also stealing business data and threatening to release it. [ Read our blue team's guide for ransomware preventio

article thumbnail

Adblocker promises to blocks ads, injects them instead

Malwarebytes

Researchers at Imperva uncovered a new ad injection campaign based on an adblocker named AllBlock. The AllBlock extension was available at the time of writing for Chrome and Opera in the respective web stores. While disguising your adware as an adblocker may seem counterintuitive, it is actually a smart thing to do. But let’s have a look at what they did and how, first.

article thumbnail

These Six Security Capabilities Will Keep Applications, Hybrid Environments Secure

CyberSecurity Insiders

By Shira Sagiv, VP of Product at Radware. As employees increasingly worked remotely during the pandemic, businesses quickened their pace toward the cloud. Already, the need for application agility was driving cloud adoption. As such, according to Radware’s The State of Web Application and API Protection report, 70% of production web applications now run in cloud environments.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Since 2020, at least 130 different ransomware families have been active

Security Affairs

The popular Google’s VirusTotal scanning service has published an interesting analysis of more than 80 Million ransomware samples. VirusTotal has published its first ransomware activity report based on the analysis of more than 80 million samples that have been uploaded from 140 countries worldwide. Since 2020, at least 130 different ransomware families have been active.

article thumbnail

Security Risks with Private 5G in Manufacturing Companies Part. 2

Trend Micro

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However, the "democratization of communications" entails its own risks that have not yet been made clear.

article thumbnail

2021 to Date Has Seen More Data Breaches Than 2020

Digital Guardian

We're poised to break records this year when it comes to statistics on breaches, ransomware, and phishing, according to a new report.

article thumbnail

Google: We're Tracking 270 State-Sponsored Hacker Groups From Over 50 Countries

The Hacker News

Google's Threat Analysis Group (TAG) on Thursday said it's tracking more than 270 government-backed threat actors from more than 50 countries, adding it has approximately sent 50,000 alerts of state-sponsored phishing or malware attempts to customers since the start of 2021.

Phishing 121
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Anonymous Domain Registration Might Be Prohibited Shortly

Heimadal Security

The European Union is currently working on laws that would make it illegal for everybody to register domains before going through an identification process. This new law would apply to all the individuals living in Europe. How Does the Domain Registration Usually Work? In order to get a domain name, you have to register the […]. The post The Anonymous Domain Registration Might Be Prohibited Shortly appeared first on Heimdal Security Blog.

article thumbnail

Blackswan vulnerability puts billions of Windows Systems to risk

CyberSecurity Insiders

A discovery of seven zero day vulnerabilities in Microsoft Windows Operating System has reportedly put billions of PC users to risk. And reports are in that the bug/s have existed in the wild since 2007, the time when the Satya Nadella led company released the Vista version of its Windows OS. Field Effect is the Cybersecurity firm that discovered the details and collectedly named its find as Blackswan, a susceptibility that could affect individuals, government organizations and even private comp

Risk 120
article thumbnail

Ransomware Operators Found Using New "Franchise" Business Model

Trend Micro

We found a relatively new and interesting ransomware operation that takes inspiration from franchise business models. It seems that the operators are rebranding a "supplier" ransomware before deployment instead of simply distributing it under the original name.

article thumbnail

WhatsApp made available end-to-end encrypted chat backups

Security Affairs

WhatsApp made available end-to-end encrypted chat backups on iOS and Android to prevent anyone from accessing user chats. WhatsApp is rolling out end-to-end encrypted chat backups on both iOS and Android devices, the move aims at implementing an optional layer of security to protect backups stored on Google Drive or iCloud cloud storage. Currently, WhatsApp allows users to backup their chats on cloud storage services, but these backups are not end-to-end encrypted.

Backups 119
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Top 10 GitHub Actions You Should Use to set up your CI/CD Pipeline

Security Boulevard

. Photo by GitHub. GitHub announced GitHub Actions in late 2018 as a new CI/CD platform where users can automate workflows and build development cycles. The post Top 10 GitHub Actions You Should Use to set up your CI/CD Pipeline appeared first on Security Boulevard.

article thumbnail

For the first time, an Israeli hospital was hit by a major ransomware attack

Security Affairs

The Hillel Yaffe Medical Center in Hadera, Israel, was hit by a ransomware attack that was defined by Israel’s National Cyber Directorate as a “major” attack. The Hillel Yaffe Medical Center in Hadera, Israel was hit by a ransomware attack that impacted the system of the hospital. Local media outlets reported that the hospital has been using alternate systems to provide treatments to patients.

article thumbnail

S3 Ep54: Another 0-day, double Apache patch, and Fight The Phish [Podcast]

Naked Security

Latest episode - listen now!

Phishing 114
article thumbnail

How shape-shifting threat actors complicate attack attribution

CSO Magazine

The already difficult task of attributing a cybersecurity attack to a particular threat actor is made harder by the shape-shifting nature of threat groups. Despite the best efforts of researchers, some attackers may never be identified. At last week's VB2021 conference, cybersecurity analysts and researchers walked through the breadcrumbs they followed to identify the malicious actors behind the Colonial Pipeline , Sony Pictures, and Iran railway system attacks.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft releases Linux version of the Windows Sysmon tool

Bleeping Computer

Microsoft has released a Linux version of the very popular Sysmon system monitoring utility for Windows, allowing Linux administrators to monitor devices for malicious activity. [.].

Software 111
article thumbnail

Rickroll Grad Prank Exposes Exterity IPTV Bug

Threatpost

IPTV and IP video security is increasingly under scrutiny, even by high school kids.

108
108
article thumbnail

8 Beginner Tips To Elevate Your Gaming Skills [From A Game Addict]

SecureBlitz

This post will show you beginner tips to elevate your gaming skills… Many video games are very challenging and demanding. That’s why you must hone your skills to match the requirements. Even though these games differ in gameplay, mechanics, play style, or objectives, there’re still some aspects where they’re similar. So, if you improve your.

article thumbnail

This Week’s Trends in Privacy with Nymity Research – October 14, 2021

TrustArc

Below are snapshots of recent global updates courtesy of Nymity Research. Law Enforcement: South Korea PIPC Requirements for Emergency Disclosures Personal information handlers may be required to disclose personal data to law enforcement to protect an individual’s life or if required by law (i.e., disaster prevention, locate missing children, emergency rescue requests); personal data disclosed […].

105
105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!