Tue.May 30, 2023

article thumbnail

Discord Admins Hacked by Malicious Bookmarks

Krebs on Security

A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark. This attack involves malicious Javascript that is added to one’s browser by dragging a component from a web page to one’s browser bookmarks.

Hacking 303
article thumbnail

Brute-Forcing a Fingerprint Reader

Schneier on Security

It’s neither hard nor expensive : Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint authentication determines a match using a reference threshold. As a result, a successful fingerprint brute-force attack requires only that an inputted image provides an acceptable approximation of an image in the fingerprint database.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: the global cyber security market is on a steady path to swell to $376 billion by 2029 up from $ 156 billion in 2022, according to Fortune Business Insights.

article thumbnail

Windows 11: Enforcing password resets for local group users

Tech Republic Security

Admins can force users to reset their respective passwords during their next Windows 11 login by making a few simple changes on a difficult-to-find configuration screen. The post Windows 11: Enforcing password resets for local group users appeared first on TechRepublic.

Passwords 155
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

9M Dental Patients Affected by LockBit Attack on MCNA

Dark Reading

The government-sponsored dental and oral healthcare provider warned its customers that a March attack exposed sensitive data, some of which was leaked online by the ransomware group.

article thumbnail

Get 9 cybersecurity courses for just $46

Tech Republic Security

Learn ethical hacking and other cybersecurity skills to protect your business from potential attacks. The post Get 9 cybersecurity courses for just $46 appeared first on TechRepublic.

More Trending

article thumbnail

Android apps with spyware installed 421 million times from Google Play

Bleeping Computer

A new Android malware distributed as an advertisement SDK has been discovered in multiple apps, many previously on Google Play and collectively downloaded over 400 million times. [.

Spyware 138
article thumbnail

Disaster recovery in the cloud

InfoWorld on Security

It’s late on a Friday. You get a call from your CIO that data has been removed from XYZ public cloud server, and they need it back ASAP. It gets worse. First, there is no current backup copy of the data. The backups you expected your cloud provider to perform on your behalf only include the provider’s core system backups. That means it’s functionally unusable.

Backups 131
article thumbnail

RomCom malware spread via Google Ads for ChatGPT, GIMP, more

Bleeping Computer

A new campaign distributing the RomCom backdoor malware is impersonating the websites of well-known or fictional software, tricking users into downloading and launching malicious installers. [.

Malware 134
article thumbnail

AI-automated malware campaigns coming soon, says Mikko Hyppönen

CSO Magazine

Cybersecurity pioneer Mikko Hyppönen began his cybersecurity career 32 years ago at Finnish cybersecurity company F-Secure, two years before Tim Berners-Lee released the world's first web browser. Since then, he has defused global viruses, searched for the first virus authors in a Pakistani conflict zone, and traveled the globe advising law enforcement and governments on cybercrime.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

The Rush to SaaS Modernization Can Result in Reputational Damage

CyberSecurity Insiders

By Hananel Livneh, Head of Product Marketing, Adaptive Shield Successful cyberattacks tend to hit companies with the force of an 80-foot wave. The initial damage is quickly apparent. Like ships that lose railings and experience instability, businesses are immediately faced with lost data, ransom payments, and revenue losses, depending on the nature of the attack.

article thumbnail

Leadership Lessons on How Women Trust & Build Successful Trusted Relationships

Jane Frankland

Most people understand that trust is foundational to successful leadership, collaboration, and overall business operations. Building on last week’s blog, and considering the growth of women leaders and the visible roles women are increasingly occupying within larger organisations, I thought you might be interesed to understand more about the differences of how women build and gain trust while operating within fast-paced corporate environments.

article thumbnail

How Generative AI Will Remake Cybersecurity

eSecurity Planet

In March, Microsoft announced its Security Copilot service. The software giant built the technology on cutting-edge generative AI – such as large language models (LLMs) – that power applications like ChatGPT. In a blog post , Microsoft boasted that the Security Copilot was the “first security product to enable defenders to move at the speed and scale of AI.

article thumbnail

Women & Trust: Keep this Between us!

Jane Frankland

Do you ever think about how different men and women are when it comes to trust? Have you ever wondered whether women are trusted more than men, or noticed in your own organisation or daily life that trust sometimes seems easier for men, but tougher for women? I believe as leaders, we must constantly be aware of the uniqueness of our people when developing an atmosphere conducive to effective workflows.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

421M Spyware Apps Downloaded Through Google Play

Dark Reading

A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.

Spyware 143
article thumbnail

WordPress force installs critical Jetpack patch on 5 million sites

Bleeping Computer

Automattic, the company behind the open-source WordPress content management system, has started force installing a security patch on millions of websites today to address a critical vulnerability in the Jetpack WordPress plug-in. [.

127
127
article thumbnail

‘Predator’ — Nasty Android Spyware Revealed

Security Boulevard

Intellexa mercenary spyware chains five unpatched bugs—plus ‘Alien’ technology The post ‘Predator’ — Nasty Android Spyware Revealed appeared first on Security Boulevard.

Spyware 120
article thumbnail

Microsoft finds macOS bug that lets hackers bypass SIP root restrictions

Bleeping Computer

Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install "undeletable" malware and access the victim's private data by circumventing Transparency, Consent, and Control (TCC) security checks. [.

Malware 116
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

The Transformative Power of Artificial Intelligence in Healthcare

CyberSecurity Insiders

Artificial Intelligence (AI) has emerged as a disruptive force across various industries, and its potential impact on healthcare is nothing short of revolutionary. With advancements in machine learning and data analytics, AI has the ability to transform healthcare delivery, improve patient outcomes, and enhance overall efficiency. This article explores the key areas where AI is making a significant impact in healthcare and discusses the benefits and challenges associated with its implementation.

article thumbnail

Tricks of the trade: How a cybercrime ring operated a multi?level fraud scheme

We Live Security

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys The post Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme appeared first on WeLiveSecurity

article thumbnail

Undetected Attacks Against Middle East Targets Conducted Since 2020

Dark Reading

Targeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that's been in the wild since 2020.

124
124
article thumbnail

BrandPost: Strategies for improving your hybrid and multicloud management

CSO Magazine

By Microsoft Security Hybrid and multicloud adoption are par for the course for enterprise businesses, with 86% of organizations planning to increase their investment in the technology. And while cloud technology does bring inherent advantages—namely flexibility, cost-effectiveness, improved disaster recovery, increased security, better compliance, and better performance—it can also lead to increased cybersecurity risks if not managed properly.

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders. When done effectively, it can help interpret complex risk environments for leaders and inform their decision-making.

article thumbnail

Understanding the Progression of a Ransomware Attack

Security Boulevard

Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are familiar with the entire ransomware attack life cycle from the time threat actors get into your system until you make the decision whether. The post Understanding the Progression of a Ransomware Attack appeared first on Security Boulevard.

article thumbnail

Upskilling the non-technical: finding cyber certification and training for internal hires

CSO Magazine

Finding qualified staff to replace vacancies or build out an expanding team can be a nightmare for already overburdened CISOs, especially given there’s a pernicious and ongoing shortage of skilled cybersecurity workers in the job market. One creative alternative to frustratedly trolling job-search sites is to look inward, rather than outward — to find capable, smart people already working at a company in other areas and train them to fill roles on the cyber team.

CISO 109
article thumbnail

Introduction to the purpose of AWS Transit Gateway

CyberSecurity Insiders

Introduction Today you look at the Global/Multi-site Enterprise Security Architecture of an organization and see a myriad of concerns. Increased levels of complexity, difficulties managing multiple third parties, difficulties implementing consistent levels of security, and so on. This makes it imperative for organizations to identify opportunities to simplify, streamline, and generally improve their infrastructure wherever possible.

article thumbnail

Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots

Dark Reading

On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.

124
124
article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Did you know that 2021 was a record-breaking year for ransomware? The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue. With 495.1 million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Security Boulevard

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: the global cyber security market is … (more…) The post Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration appeared first on Security Boulevard.

article thumbnail

Barracuda zero-day abused since 2022 to drop new malware, steal data

Bleeping Computer

Network and email security firm Barracuda today revealed that a recently patched zero-day vulnerability had been exploited for at least seven months to backdoor customers' Email Security Gateway (ESG) appliances with custom malware and steal data. [.

Malware 113
article thumbnail

Things ChatGPT cannot but Google Bard can do

CyberSecurity Insiders

Google has released its new AI chat service dubbed Bard in over 180 countries, with 15 more to follow by the end of next month. Bard is nothing but a Google owned and a sure-shot competitor to Microsoft-owned OpenAI-developed ChatGPT service that can answer anything and everything. But there’s more to the release of the Alphabet Inc. company, and here’s some knowledge to share about it: 1.

article thumbnail

Pentagon Leaks Emphasize the Need for a Trusted Workforce

Dark Reading

Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.

Risk 117
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

Cryptocurrency and non-fungible tokens (NFTs) - what are they and why should you care? With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises. Join this exclusive webinar with Ryan McInerny to learn: Cryptocurrency asset market trends How to manage risk and compliance to serve customers safely Best practices for identifying crypto transactions and companies Rev