Tue.Mar 14, 2023

article thumbnail

How AI Could Write Our Laws

Schneier on Security

By Nathan E. Sanders & Bruce Schneier Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests. In some cases, the objective of that money is obvious. Google pours millions into lobbying on bills related to antitrust regulation.

article thumbnail

Two U.S. Men Charged in 2022 Hacking of DEA Portal

Krebs on Security

Two U.S. men have been charged with hacking into a U.S. Drug Enforcement Agency (DEA) online portal that taps into 16 different federal law enforcement databases.

Hacking 241
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NetWire Remote Access Trojan Maker Arrested

Schneier on Security

From Brian Krebs : A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords.

Spyware 242
article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

The Last Watchdog

A new report from the Bipartisan Policy Center ( BPC ) lays out — in stark terms – the prominent cybersecurity risks of the moment. Related: Pres. Biden’s impact on cybersecurity. The BPC’s Top Risks in Cybersecurity 2023 analysis calls out eight “top macro risks” that frame what’s wrong and what’s at stake in the cyber realm. BPC is a Washington, DC-based think tank that aims to revitalize bipartisanship in national politics. This report has a dark tone, as well it should.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the foundational elements you need to start or validate your ERM program. He will also dive into topic definitions, governance structures, and framework components for success.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking on “ How to Reclaim Power in the Digital World ” at EPFL in Lausanne, Switzerland, on Thursday, March 16, 2023, at 5:30 PM CET.

207
207
article thumbnail

The slow Tick?ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

We Live Security

ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group The post The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia appeared first on WeLiveSecurity ESET Research

Software 141

More Trending

article thumbnail

Using AI Cybersecurity Solutions to Stop Ransomware

Security Boulevard

Growing interconnectedness makes it harder to detect ransomware before it causes harm. Whether data is processed locally or in the cloud, the risk of a breach is the same.

article thumbnail

Learn the basics of cybersecurity with this $60 web-based training package

Tech Republic Security

The Premium Ethical Hacking Certification Bundle features eight courses that introduce students to the fundamentals and prepare them to earn important credentials from CompTIA. The post Learn the basics of cybersecurity with this $60 web-based training package appeared first on TechRepublic.

article thumbnail

Access Control Gap in Microsoft Active Directory Widens Enterprise Attack Surface

Dark Reading

One researcher thinks trust is broken in AD. Microsoft disagrees that there's a security vulnerability. But enterprise IT environments should be aware of an authentication gap either way

article thumbnail

SHARED INTEL Q&A: Bi-partisan report calls a for a self-sacrificing approach to cybersecurity

Security Boulevard

A new report from the Bipartisan Policy Center ( BPC ) lays out — in stark terms – the prominent cybersecurity risks of the moment. Related: Pres. Biden’s impact on cybersecurity.

Risk 98
article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Join this exclusive webinar with Dr. Karen Hardy, where she will explore the power of storytelling in risk communication as a core component of a resilient organization's management framework!

article thumbnail

Google Proposes Reducing TLS Cert Life Span to 90 Days

Dark Reading

Organizations will likely have until the end of 2024 to gain visibility and control over their keys and certificates

96
article thumbnail

‘Black Skills’ Is Killnet’s Attempt to Form a ‘Private Military Hacking Company’

Security Boulevard

A clear riff on the growing presence of private military companies in Russia (primarily the Wagner Group), Killmilk’s so-called 'Private Military Hacking Company' is an apparent overture to Russia to leverage its services The post ‘Black Skills’ Is Killnet’s Attempt to Form a ‘Private Military Hacking Company’ appeared first on Flashpoint.

Hacking 97
article thumbnail

India to use Artificial Intelligence to curb power thefts and check usage

CyberSecurity Insiders

India is probably the only country in the world to provide free power to all of their farmers, as these folks provide the nation much needed food for survival.

article thumbnail

Success of National Cybersecurity Strategy Rests on Swift Action

Security Boulevard

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Broken Object Level Authorization: API security’s worst enemy

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.

article thumbnail

Website Security Check: How Secure Is Your Website?

SecureBlitz

Here, I’ll talk about website security check. How secure is your website? Read on to find out. One of the most insidious things about hackers is that they will happily hide their access to your website until they need it.

article thumbnail

Blackbaud Fined $3M for Withholding Details of Ransomware Attack

SecureWorld News

Blackbaud, a cloud-based software provider for nonprofits, universities, healthcare organizations, and more, fell victim to a ransomware attack in May 2020 that compromised the data of more than 13,000 customers.

article thumbnail

How Superior Web Hosting Support Can Drive Business Success

IT Security Guru

The landscape that businesses operate on is ever-changing and transforming. Companies of all shapes and sizes are looking for the best ways to stand out from the competition. Making themselves known in an increasingly crowded market is getting harder and harder every day.

DDOS 82
article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

LockBit Threatens to Leak Stolen SpaceX Schematics

Dark Reading

The ransomware group sent a message directly to Elon Musk: Pay or the confidential SpaceX information goes up for grabs on the Dark Web

article thumbnail

Microsoft Rolls Out Patches for 80 New Security Flaws — Two Under Active Attack

The Hacker News

Microsoft's Patch Tuesday update for March 2023 is rolling out with remediations for a set of 80 security flaws, two of which have come under active exploitation in the wild. Eight of the 80 bugs are rated Critical, 71 are rated Important, and one is rated Moderate in severity.

116
116
article thumbnail

Why Healthcare Boards Lag Other Industries in Preparing for Cyberattacks

Dark Reading

Only by working collaboratively can boards and security leaders make progress and agree about cybersecurity threats and priorities

article thumbnail

LockBit Ransomware gang claims to have stolen SpaceX confidential data from Maximum Industries

Security Affairs

The LockBit ransomware group claims to have stolen confidential data belonging to SpaceX from the systems of Maximum Industries. The LockBit ransomware gang claims to have stolen confidential data of SpaceX after they hacked the systems of production company Maximum Industries.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Emotet, QSnatch Malware Dominate Malicious DNS Traffic

Dark Reading

An analysis of trillions of DNS requests shows a shocking amount of malicious traffic inside enterprise networks, with threats using DNS as a sort of malicious Autobahn

DNS 78
article thumbnail

How To Choose The Right Low Code Platform For Your Business Needs

SecureBlitz

Learn how to choose the right low code platform for your business needs. In today’s fast-paced business world, agility is the key to success. Low code development platforms have emerged as a valuable tool for organizations to develop and deploy business applications with minimal coding quickly.

article thumbnail

Microsoft Zero-Day Bugs Allow Security Feature Bypass

Dark Reading

Security vendors urge organizations to fix the actively exploited bugs, in Microsoft Outlook and the Mark of the Web feature, immediately

77
article thumbnail

Dissecting the malicious arsenal of the Makop ransomware gang

Security Affairs

Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from a recent intrusion authored by Makop ransomware operators show persistence capability through dedicated.NET tools.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust

Dark Reading

Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation

Media 77
article thumbnail

Adobe fixed ColdFusion flaw listed as under active exploit

Security Affairs

Adobe is warning that a critical zero-day flaw in ColdFusion web app development platform was exploited in very limited attacks.

article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Network security creates shielded, monitored, and secure communications between users and assets.

article thumbnail

Spotlight on Cybersecurity Leaders: David Lingenfelter

SecureWorld News

In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.