Wed.Jun 21, 2023

article thumbnail

Ethical Problems in Computer Security

Schneier on Security

Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “ Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversation “: Abstract: The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be “morally good” or at least “morally allowed / acceptable.” Among phil

Education 328
article thumbnail

Remote work and the cloud create new endpoint security challenges

Tech Republic Security

Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a host of new challenges. Experts weighed in on the subject at the recent Syxsense Synergy event. The post Remote work and the cloud create new endpoint security challenges appeared first on TechRepublic.

Internet 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: IRONSCALES beta-launches a new generative AI tool to improve email security

The Last Watchdog

Atlanta, Ga. June 20, 2023 – IRONSCALES, the leading enterprise cloud email security platform protecting more than 10,000 global organizations worldwide, today announced the Beta launch of Themis Co-pilot for Microsoft Outlook , a GPT-powered chat assistant for self-service threat reporting. Powering Themis Co-pilot is PhishLLM, a cutting-edge large language model (LLM) hosted within the IRONSCALES infrastructure, which is the first in the IRONSCALES suite of generative AI apps for email securit

Phishing 183
article thumbnail

Australia plans to mandate file scanning for all tech companies

Tech Republic Security

In an effort to target online child sexual abuse and pro-terror content, Australia may cause global changes in how tech companies handle data. The post Australia plans to mandate file scanning for all tech companies appeared first on TechRepublic.

Big data 158
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

GUEST ESSAY: Taking a fresh approach to privileged access management — to curtail abuse

The Last Watchdog

To be productive in an interconnected work environment, employees need immediate access to numerous platforms, both on- and off-premises. Related: Why SMBs need to do PAM well Keeping track of user activity and effecting proper on- and off-boarding are becoming more and more difficult, even as unauthorized access via unused, expired, or otherwise compromised access credentials has become the number one cybersecurity threat vector.

article thumbnail

Dissecting TriangleDB, a Triangulation spyware implant

SecureList

Over the years, there have been multiple cases when iOS devices were infected with targeted spyware such as Pegasus, Predator, Reign and others. Often, the process of infecting a device involves launching a chain of different exploits, e.g. for escaping the iMessage sandbox while processing a malicious attachment, and for getting root privileges through a vulnerability in the kernel.

Spyware 145

LifeWorks

More Trending

article thumbnail

List of victimized companies of MOVEit Cyber Attack

CyberSecurity Insiders

At the end of May 2023, a Zero Day vulnerability was discovered by risk analysing firm Kroll and on June 7th of this year, Clop ransomware gang published on its blog that they have gained access to the servers of MOVEit software via Zellis Payroll software and urged the victims to contact via the blog post, as their email response could go at snail pace as the number of victims related to the incident was large.

article thumbnail

Apple fixes zero-days used to deploy Triangulation spyware via iMessage

Bleeping Computer

Apple addressed three new zero-day vulnerabilities exploited in attacks installing Triangulation spyware on iPhones via iMessage zero-click exploits. [.

Spyware 132
article thumbnail

Over 100,000 ChatGPT Accounts Compromised by Cybercriminals

SecureWorld News

Cybersecurity firm Group-IB recently uncovered a significant security breach involving ChatGPT accounts. The company's Threat Intelligence platform detected more than 100,000 compromised devices with saved ChatGPT credentials traded on illicit Dark Web marketplaces over the past year. These compromised accounts pose a serious risk to businesses, especially in the Asia-Pacific region, which has experienced the highest concentration of ChatGPT credentials for sale.

article thumbnail

UPS discloses data breach after exposed customer info used in SMS phishing

Bleeping Computer

Multinational shipping company UPS is alerting Canadian customers that some of their personal information might have been exposed via its online package look-up tools and abused in phishing attacks. [.

Phishing 131
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

US DoJ creates a litigation section dedicated to Cybersecurity

CyberSecurity Insiders

Cybersecurity in today’s world is a matter of national security and so the Department of Justice (DoJ) has created a separate litigation section in its National Security Division dedicated to Cybersecurity. Matthew G. Olsen, the head of Justice Department has endorsed the news on Tuesday by announcing the same at the Stanford’s Hoover Institution. As per the update released by Matthew the new section will be called as NatSec Cyber and will be highly scalable as per the need/demand.

article thumbnail

Beware bad passwords as attackers co-opt Linux servers into cybercrime

Naked Security

Did you prevent password-only logins on your SSH servers? On ALL of them? Are you sure about that?

Passwords 119
article thumbnail

Chinese Hackers APT15 Use New Backdoor Malware to Target American Ministries

Heimadal Security

Researchers observed state-sponsored threat group APT15 using a new backdoor dubbed `Graphican`. The Chinese hackers used the new malware in a campaign targeting foreign affairs ministries in the Americas, between 2022 – 2023. According to security researchers, among the other targets were a government finance department, a corporation that markets products in the Americas, and […] The post Chinese Hackers APT15 Use New Backdoor Malware to Target American Ministries appeared first on

Malware 111
article thumbnail

Apple patch fixes zero-day kernel hole reported by Kaspersky – update now!

Naked Security

Apple didn’t use the words “Triangulation Trojan”, but you probably will.

111
111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Patch Alert! Critical Command Injection Flaw Discovered in NAS Devices

Heimadal Security

Zyxel announced patches are available and should be applied immediately for the newly discovered vulnerability CVE-2023-27992. The flaw is a pre-authentication command injection issue that affects some of the network-attached storage (NAS) versions. More about CVE-2023-27992 According to the Common Vulnerability Scoring System (CVSS), the flaw was marked 9.8, which rates it as “critical”.

article thumbnail

APT37 hackers deploy new FadeStealer eavesdropping malware

Bleeping Computer

The North Korean APT37 hacking group uses a new 'FadeStealer' information-stealing malware containing a 'wiretapping' feature, allowing the threat actor to snoop and record from victims' microphones. [.

Malware 111
article thumbnail

Malware Devs Update Legion Hacktool, Boost Capabilities

Security Boulevard

A recently discovered cloud-focused malware tool has seemingly been updated with additional functionality. The post Malware Devs Update Legion Hacktool, Boost Capabilities appeared first on Security Boulevard.

Malware 111
article thumbnail

Strengthening Cybersecurity Defenses: Cyber Assessment Framework

Heimadal Security

In today’s interconnected world, where cyber threats are constantly evolving and becoming more sophisticated, it is imperative for organizations to prioritize cybersecurity. One essential tool that aids in this endeavor is the Cyber Assessment Framework (CAF). Developed by the UK National Cyber Security Centre (NCSC), the CAF provides organizations with a structured approach to assess […] The post Strengthening Cybersecurity Defenses: Cyber Assessment Framework appeared first on Heim

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

New DoJ Cyber Prosecution Team Will Go After Nation-State Threat Actors

Dark Reading

The US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states.

article thumbnail

Smart Tvs require even smarter security measures

Security Boulevard

Smart TV Dilemmas It's hard nowadays to find a TV that is not "smart". They all come preloaded with apps to watch Netflix, Disney+ and the like. Not everyone has a new TV though. For older "dumb" TVs, streaming devices are very popular. And even for TVs with built-in apps, there are still reasons to use a separate streaming device. Maybe you don't want to be force-fed the TV manufacturer's recommendations ads.

Malware 105
article thumbnail

Avast, Norton Parent Latest Victim of MOVEit Ransomware Attacks

Dark Reading

Gen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to employee data being revealed.

article thumbnail

Cybersecurity Risk Management Framework: Key Components

Security Boulevard

Developing a cyber risk management program from the ground up can be daunting for many organizations, especially those establishing their program with a small team or limited resources. The security and risk team may need help deciding where to start or what to prioritize. What do they need immediately, and what can they build towards as their maturity progresses?

Risk 104
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Emerging Ransomware Group 8Base Doxxes SMBs Globally

Dark Reading

A threat you've never heard of is using double extortion attacks on mom-and-pop shops around the globe.

article thumbnail

Going on vacation soon? Stay one step ahead of travel scammers

We Live Security

From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels The post Going on vacation soon?

article thumbnail

20 Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks

Dark Reading

The notorious APT15 used common malware tools and a third-generation custom 'Graphican' backdoor to continue its information gathering exploits, this time against foreign ministries.

Malware 103
article thumbnail

How the Most Popular Cars in the US Track Drivers

WIRED Threat Level

Vehicles from Toyota, Honda, Ford, and more can collect huge volumes of data. Here’s what the companies can access.

100
100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

News Alert: NowSecure Achieves SOC 2 Type 2 certification for 4th consecutive year

The Last Watchdog

Chicago, Ill., June 21, 2023 – NowSecure, the recognized experts in mobile security and privacy, announced today that it has completed its latest annual SOC 2 Type 2 security audit – the industry benchmark for independent auditing of security controls for software vendors. This certification covers the NowSecure Platform for automated mobile app security testing.

Mobile 100
article thumbnail

Zero-Day Alert: Apple Releases Patches for Actively Exploited Flaws in iOS, macOS, and Safari

The Hacker News

Apple on Wednesday released a slew of updates for iOS, iPadOS, macOS, watchOS, and Safari browser to address a set of flaws it said were actively exploited in the wild. This includes a pair of zero-days that have been weaponized in a mobile surveillance campaign called Operation Triangulation that has been active since 2019. The exact threat actor behind the campaign is not known.

article thumbnail

Update now! Apple fixes three actively exploited vulnerabilities

Malwarebytes

Apple has released security updates for several products to address a set of flaws that it says are being actively exploited. Updates are available for these products: Safari 16.5.1 macOS Big Sur and macOS Monterey iOS 16.5.1 and iPadOS 16.5.1 iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later iOS 15.7.7 and iPadOS 15.7.7 iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad

article thumbnail

Critical 'nOAuth' Flaw in Microsoft Azure AD Enabled Complete Account Takeover

The Hacker News

A security shortcoming in Microsoft Azure Active Directory (AD) Open Authorization (OAuth) process could have been exploited to achieve full account takeover, researchers said. California-based identity and access management service Descope, which discovered and reported the issue in April 2023, dubbed it nOAuth.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!