Mon.May 22, 2023

article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible for a series of aggressive crypto spam campaigns that recently prompted several large Mastodon communities to temporarily halt new registrations.

Scams 244
article thumbnail

Google Is Not Deleting Old YouTube Videos

Schneier on Security

Google has backtracked on its plan to delete inactive YouTube videos—at least for now. Of course, it could change its mind anytime it wants. It would be nice if this would get people to think about the vulnerabilities inherent in letting a for-profit monopoly decide what of human creativity is worth saving.

Media 238
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: More organizations still plan to increase their tech staff

Tech Republic Security

A new Linux Foundation report finds that the global focus is on cloud/containers, cybersecurity and AI/ML skills, and that upskilling is key. The post Report: More organizations still plan to increase their tech staff appeared first on TechRepublic.

article thumbnail

Cyber Warfare Lessons From the Russia-Ukraine Conflict

Dark Reading

Techniques used in cyber warfare can be sold to anyone — irrespective of borders, authorities, or affiliations. We need to develop strategies to respond at scale.

145
145
article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

How to manage and share files online using NordLocker

Tech Republic Security

With NordLocker, you can store, manage and share individual files. Learn how with this step-by-step guide. The post How to manage and share files online using NordLocker appeared first on TechRepublic.

article thumbnail

Microsoft reports jump in business email compromise activity

CSO Magazine

Cybersecurity activity around business email compromise (BEC) spiked between April 2022 and April 2023, with over 150,000 daily attempts, on average, detected by the Microsoft Microsoft’s Digital Crimes Unit (DCU). The findings were highlighted in the latest edition of Microsoft’s Cyber Signals , a cyberthreat intelligence report that spotlights security trends and insights gathered from Microsoft’s 43 trillion security signals and 8,500 security experts.

More Trending

article thumbnail

Leaked EU Document Shows Spain Wants to Ban End-to-End Encryption

WIRED Threat Level

In response to an EU proposal to scan private messages for illegal material, the country's officials said it is “imperative that we have access to the data.

article thumbnail

How and why to use multiple Apple IDs on the same Mac

Tech Republic Security

There are a few reasons Apple users should sometimes employ a pair of Apple IDs on the same Mac. Here’s how to make it work. The post How and why to use multiple Apple IDs on the same Mac appeared first on TechRepublic.

article thumbnail

Malicious Windows kernel drivers used in BlackCat ransomware attacks

Bleeping Computer

The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks. [.

article thumbnail

Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations

The Hacker News

A financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services (AWS) Elastic Compute Cloud (EC2) instances to carry out illicit crypto mining operations. Cloud security company's Permiso P0 Labs, which first detected the group in November 2021, has assigned it the moniker GUI-vil (pronounced Goo-ee-vil).

122
122
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Improving Cybersecurity Requires Building Better Public-Private Cooperation

Dark Reading

Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.

article thumbnail

Meta fined $1.3B for violating EU GDPR data transfer rules on privacy

CSO Magazine

Meta has been fined $1.3 billion (€1.2 billion) by the Irish Data Protection Commission (DPC) for violating the terms of the EU’s GDPR by continuing to transfer EU users’ data to the US without adequate safeguards. Meta has failed to “address the risks to the fundamental rights and freedoms" of Facebook's European users, the DPC said in a statement.

Risk 126
article thumbnail

Facebook Meta faces €1.3 billion penalty by GDPR

CyberSecurity Insiders

Facebook parent company Meta has been slapped with a penalty of €1.2 billion for transferring data of European users to the servers operating in the United States. A move that is dead-against the GDPR rules that came into existence since May 2018. The Irish Data Protection Commission pronounced a penalty and imposed a $1.3 billion fine for transferring the generated data to computers operating on other country soil, a move that is been exploited under the Standard Contractual Clause (SCC) that c

article thumbnail

What cybersecurity professionals can learn from the humble ant

CSO Magazine

When an ant colony is threatened, individual ants release pheromones to warn of the impending danger. Each ant picking up the warning broadcasts it further, passing it from individual to individual until the full defenses of the colony are mobilized. Instead of a single ant facing the danger alone, thousands of defenders with a single purpose swiftly converge on the threat.

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders. When done effectively, it can help interpret complex risk environments for leaders and inform their decision-making.

article thumbnail

Sharing your business’s data with ChatGPT: How risky is it?

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. As a natural language processing model, ChatGPT – and other similar machine learning-based language models – is trained on huge amounts of textual data.

article thumbnail

PyPI Shuts Down Over the Weekend, Says Incident Was Overblown

Dark Reading

The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.

144
144
article thumbnail

Future Exploitation Vector: File Extensions as Top-Level Domains

Trend Micro

In this blog entry, we will examine the security risks related to file extension-related Top-Level Domains (TLDs) while also providing best practices and recommendations on how both individual users and organizations can protect themselves from these hazards.

Risk 113
article thumbnail

Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations

Dark Reading

The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

Microsoft 365 hit by new outage causing connectivity issues

Bleeping Computer

Microsoft is investigating service issues preventing users from accessing their Microsoft 365 ccounts and blocking access to installed apps. [.

143
143
article thumbnail

IBM's Polar Buy Creates Focus on a New 'Shadow Data' Cloud Security Area

Dark Reading

The purchase gives IBM access to a new category of products called "data security posture management" for security data in cloud and SaaS repositories.

128
128
article thumbnail

Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight

Security Boulevard

GDPR Move for Mark’s Money: No legal way to move Europeans’ data to the US since 2015. U.S. cloud industry better take note. The post Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight appeared first on Security Boulevard.

article thumbnail

EU slaps Meta with $1.3 billion fine for moving data to US servers

Bleeping Computer

The Irish Data Protection Commission (DPC) has announced a $1.3 billion fine on Facebook after claiming that the company violated Article 46(1) of the GDPR (General Data Protection Regulation). [.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

Cryptocurrency and non-fungible tokens (NFTs) - what are they and why should you care? With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises. Join this exclusive webinar with Ryan McInerny to learn: Cryptocurrency asset market trends How to manage risk and compliance to serve customers safely Best practices for identifying crypto transactions and companies Rev

article thumbnail

Who Owns Security in Multi-Cloud Operations?

Security Boulevard

The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they are often interacting with multiple cloud providers or even combining the cloud with on-premises systems for a distributed environment. According to a recent.

article thumbnail

Cyber threat with iPhone Phone Link feature on Windows 11 laptops

CyberSecurity Insiders

Attention Windows 11 users who rely on their PCs to respond to messages and phone calls from their iPhones, an important cybersecurity alert requires your immediate attention. Recently, Apple Inc, the renowned technology giant, introduced a feature called Phone Link, enabling iPhone users to sync their messages and calls with their Windows 11 laptops, allowing for convenient interaction.

article thumbnail

EU Regulators Hit Meta with Record $1.3 Billion Fine for Data Transfer Violations

The Hacker News

Facebook's parent company Meta has been fined a record $1.3 billion by European Union data protection regulators for transferring the personal data of users in the region to the U.S.

Media 106
article thumbnail

Google launches bug bounty program for its Android applications

Bleeping Computer

Google has launched the Mobile Vulnerability Rewards Program (Mobile VRP), a new bug bounty program that will pay security researchers for flaws found in the company's Android applications. [.

Mobile 127
article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Did you know that 2021 was a record-breaking year for ransomware? The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue. With 495.1 million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.

article thumbnail

Bad Magic's Extended Reign in Cyber Espionage Goes Back Over a Decade

The Hacker News

New findings about a hacker group linked to cyber attacks targeting companies in the Russo-Ukrainian conflict area reveal that it may have been around for much longer than previously thought. The threat actor, tracked as Bad Magic (aka Red Stinger), has not only been linked to a fresh sophisticated campaign, but also to an activity cluster that first came to light in May 2016.

article thumbnail

New Type of Attack: BrutePrint Can Breach Your Smartphone’s Fingerprint Security

Heimadal Security

Chinese researchers discovered a new type of attack targeting smartphones. BrutePrint is a brute-force attack that can bypass fingerprint authentication. They managed to breach security measures enabled for brute-force attacks like attempt limits and liveness detection. Brute-force attacks use numerous trial-and-error attempts to decipher a key, or password in order to obtain access to accounts […] The post New Type of Attack: BrutePrint Can Breach Your Smartphone’s Fingerprint Security ap

Passwords 104
article thumbnail

BrandPost: Combining threat intelligence, data at scale, and AI to fortify cyber defenses

CSO Magazine

By Microsoft Security Cybersecurity can be a thankless battle at times, demanding constant vigilance to thwart malicious attacks. But while bad news tends to grab headlines, we do see cybersecurity success stories emerging. Every day, our defenders quietly share information that helps raise the cost of crime for attackers and their vast criminal syndicates.

article thumbnail

Platform Engineering and Security: A Very Short Introduction

Security Boulevard

Is DevOps really dead? Learn about the rise of platform engineering and how it differs from DevOps in terms of self-service capabilities and automation. Discover how security fits into this new paradigm and the benefits of platform engineering for software development teams of various sizes. The post Platform Engineering and Security: A Very Short Introduction appeared first on Security Boulevard.

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

Global economic conditions are soft at best. From a budget standpoint, US banks are feeling the pinch. Many US banks are bracing for increased defaults and lower demand for mortgages and other loans as interest rates have increased. The largest banks have increased reserves to protect against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions?