Tue.Dec 13, 2022

FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked

Krebs on Security

InfraGard , a program run by the U.S.

Business email compromise attacks now targeting people via SMS messages

Tech Republic Security

No longer limited to email, BEC attacks are hitting users through text messages in an attempt to steal money or commit other types of fraud, says Trustwave. The post Business email compromise attacks now targeting people via SMS messages appeared first on TechRepublic.

Mobile 154
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update

Dark Reading

Here's what you need to patch now, including six critical updates for Microsoft's final Patch Tuesday of the year

114
114

Top industrial IoT security solutions

Tech Republic Security

From safety to where? Find out the right way to turn with this comprehensive analysis of seven options for your business. The post Top industrial IoT security solutions appeared first on TechRepublic.

IoT 152

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

Uber Breached, Again, After Attackers Compromise Third-Party Cloud

Dark Reading

Threat actors leak employee email addresses, corporate reports, and IT asset information on a hacker forum after an attack on an Uber technology partner

Experts detailed a previously undetected VMware ESXi backdoor

Security Affairs

A new Python backdoor is targeting VMware ESXi servers, allowing attackers to take over compromised systems. Juniper Networks researchers spotted a previously undocumented Python backdoor targeting VMware ESXi servers.

More Trending

Indian government issues SOP to employees on Cyber Attacks

CyberSecurity Insiders

Central government employees of India will receive a Standard Operating Procedure (SOP) on Cyber Attacks by this month and suggesting measures to take before a cyber attack and steps to mitigate risks, if in case, an organization becomes a victim to a digital attack.

VMware fixed critical VM Escape bug demonstrated at Geekpwn hacking contest

Security Affairs

VMware fixed three flaws in multiple products, including a virtual machine escape issue exploited at the GeekPwn 2022 hacking competition.

The Cybersecurity Industry Doesn't Have a Stress Problem — It Has a Leadership Problem

Dark Reading

Organizations need servant leaders to step forward and make their teams' professional effectiveness and happiness a priority

Citrix and NSA urge admins to fix actively exploited zero-day in Citrix ADC and Gateway

Security Affairs

Citrix urges customers to update their installs to fix actively exploited zero-day (CVE-2022-27518) in Citrix ADC and Gateway. Citrix urges administrators to apply security updates for a zero-day vulnerability, tracked as CVE-2022-27518, in Citrix ADC and Gateway.

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

Citrix ADC, Gateway Users Race Against Hackers to Patch Critical Flaw

Dark Reading

Citrix issues a critical update as NSA warns that the APT5 threat group is actively trying to target ADC environments

108
108

Apple patches everything, finally reveals mystery of iOS 16.1.2

Naked Security

There's an update for everything this time, not just for iOS. Apple Vulnerability CVE-2022-42856

107
107

Cybersecurity Drives Improvements in Business Goals

Dark Reading

Deloitte's Future of Cyber study highlights the fact that cybersecurity is an essential part of business success and should not be limited to just mitigating IT risks

Risk 105

A New Lawsuit Accuses Meta of Inflaming Civil War in Ethiopia

WIRED Threat Level

The suit claims the company lacks adequate moderation to prevent widespread hate speech that has led to violence and death. Business Business / Social Media Security / National Security

Media 105

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

Security Flaw in Atlassian Products Affecting Multiple Companies

Dark Reading

Jira, Confluence,Trello, and BitBucket affected

101
101

India corona fighting digital platform COWIN gets hacked

CyberSecurity Insiders

India’s Corona fighting digital platform COWIN Portal has been reportedly been hacked by a hacker who is ready to sell the access details and some health worker data to interested parties.

Lockbit ransomware gang hacked California Department of Finance

Security Affairs

LockBit ransomware gang hacked the California Department of Finance and threatens to leak data stolen from its systems.

TrueBot Malware linked to Evil Corp

CyberSecurity Insiders

Evil Corp, the internationally acclaimed group of cyber criminals, is back in news for having links to the Silence Group developed new malware called ‘TrueBot’. The malware’s primary motive is to steal money and to launch DDoS attacks.

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

Accelerating Vulnerability Identification and Remediation

Dark Reading

Software teams can now fix bugs faster with faster release cycles, but breach pressure is increasing. Using SBOM and automation will help better detect, prevent, and remediate security issues throughout the software development life cycle

Royal Ransomware is after the healthcare sector of the United States

CyberSecurity Insiders

Day to day a new ransomware emerges on the web giving us a feeling that the threat seems to be a never-ending saga and is going through evolution with time.

Hackers Score Nearly $1M at Device-Focused Pwn2Own Contest

Dark Reading

Offensive security researchers found 63 previously unreported vulnerabilities in printers, phones, and network-attached storage devices in the Zero Day Initiative's latest hackathon

91

LockBit Ransomware strikes California Government

CyberSecurity Insiders

LockBit, the notorious gang spreading ransomware, has victimized the servers operating in/for the California’s Finance Department, disrupting the services to a certain extent.

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

Google Launches Scanner to Uncover Open Source Vulnerabilities

Dark Reading

OSV-Scanner generates a list of dependencies in a project and checks the OSV database for known vulnerabilities, Google says

91

Top tips for security? and privacy?enhancing holiday gifts

We Live Security

Think outside the (gift) box. Here are a few ideas for security and privacy gifts to get for your relatives – or even for yourself. Some don’t cost a penny! The post Top tips for security‑ and privacy‑enhancing holiday gifts appeared first on WeLiveSecurity. Cybersecurity

Cuba Ransomware Gang Abused Microsoft Certificates to Sign Malware

WIRED Threat Level

The company has taken measures to mitigate the risks, but security researchers warn of a broader threat. Security Security / Cyberattacks and Hacks Security / Security News

Risk 88

Enterprises Move Toward Passwordless, But There’s a Long Way to Go

Security Boulevard

Stop me if you’ve heard this one before: Next year is the year we will finally eliminate passwords. That statement has been a staple of annual cybersecurity predictions for at least a decade, but could 2023 actually be the year that we see a major shift toward the passwordless workplace?

Is your firewall stuck in the 80s?

Cisco CSR

Modernize your firewall for greater security resilience. Cybersecurity has changed dramatically since the dawn of firewalls in the 1980s. But despite all the upheaval and innovation, they have stood the test of time.

Patch Tuesday: 0-days, RCE bugs, and a curious tale of signed malware

Naked Security

Tales of derring-do in the cyberunderground! And some zero-days.). Microsoft Vulnerability driver signing Exploit Patch Tuesday vulnerability

Twitter says recently leaked user data are from 2021 breach

Security Affairs

Twitter confirmed that the recent leak of members’ profile information resulted from the 2021 data breach disclosed in August 2022. Twitter confirmed that the recent data leak of millions of profiles resulted from the 2021 data breach that the company disclosed in August 2022.

Regulation roundup part 2: opening the door to more data

BH Consulting

This regulations roundup uncovers how the European Union has been busy laying the groundwork for a world of open data sharing and digital sovereignty. The forthcoming EU Data Act and Data Governance Act aim to make more data available for society and the economy.

Hackers Planted Files to Frame Indian Priest Who Died in Custody

WIRED Threat Level

And new evidence suggests those hackers may have collaborated with the police who investigated him. Security Security / Cyberattacks and Hacks Security / Security News

Mobile BEC Attacks on the Rise

Security Boulevard

A recent uptick in the reports of SMS-based business email compromise (BEC) messages may indicate a wider trend that has seen a surge of phishing scams via text messages.