Thu.Jun 22, 2023

article thumbnail

SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

Krebs on Security

The United Parcel Service (UPS) says fraudsters have been harvesting phone numbers and other information from its online shipment tracking tool in Canada to send highly targeted SMS phishing (a.k.a. “smishing”) messages that spoofed UPS and other top brands. The missives addressed recipients by name, included details about recent orders, and warned that those orders wouldn’t be shipped unless the customer paid an added delivery fee.

Phishing 325
article thumbnail

AI as Sensemaking for Public Comments

Schneier on Security

It’s become fashionable to think of artificial intelligence as an inherently dehumanizing technology , a ruthless force of automation that has unleashed legions of virtual skilled laborers in faceless form. But what if AI turns out to be the one tool able to identify what makes your ideas special, recognizing your unique perspective and potential on the issues where it matters most?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to bypass CAPTCHAs online with Safari on iOS 16

Tech Republic Security

Tired of those annoying CAPTCHA images that leave you feeling like you're solving a puzzle just to log in online? Learn how to use Apple’s "CAPTCHA killer" feature called Automatic Verification in iOS 16. The post How to bypass CAPTCHAs online with Safari on iOS 16 appeared first on TechRepublic.

Mobile 158
article thumbnail

Microsoft Teams bug allows malware delivery from external accounts

Bleeping Computer

Security researchers have found a simple way to deliver malware to an organization with Microsoft Teams, despite restrictions in the application for files from external sources. [.

Malware 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Get three years of a powerful VPN plus 30 days of anti-virus protection for $30

Tech Republic Security

UltraVPN offers up to 10 simultaneous secure connections with unlimited bandwidth, over 1,000 servers in more than 100 virtual global locations and cool extra features. Protect your most sensitive data with this UltraVPN Secure USA VPN Proxy for 3 Years Subscription plus Free Antivirus for 30 Days while it’s available for just $30. The post Get three years of a powerful VPN plus 30 days of anti-virus protection for $30 appeared first on TechRepublic.

VPN 148
article thumbnail

DuckDuckGo browser for Windows available for everyone as public beta

Bleeping Computer

DuckDuckGo has released its privacy-centric browser for Windows to the general public. It is a beta version available for download with no restrictions. [.

Software 136

LifeWorks

More Trending

article thumbnail

An Overview of the Different Versions of the Trigona Ransomware

Trend Micro

The Trigona ransomware is a relatively new ransomware family that began activities around late October 2022 — although samples of it existed as early as June 2022. Since then, Trigona’s operators have remained highly active, and in fact have been continuously updating their ransomware binaries.

article thumbnail

Camaro Dragon Hackers Strike with USB-Driven Self-Propagating Malware

The Hacker News

The Chinese cyber espionage actor known as Camaro Dragon has been observed leveraging a new strain of self-propagating malware that spreads through compromised USB drives.

Malware 124
article thumbnail

New Duo Device Health Application Enhancements: More Security, Increased Confidence

Duo's Security Blog

Confidence in data can be a lot like having a good friend. When we trust the source, our confidence in the truth of the information we receive grows. And like any relationship, there’s room to develop that trust. Originally built to support contractors using personal devices, the Duo Device Health application (DHA) took on an expanded role to help establish device trust by checking both the health and management status of endpoints before granting application access.

article thumbnail

Maltego: Check how exposed you are online

We Live Security

A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources The post Maltego: Check how exposed you are online appeared first on WeLiveSecurity

120
120
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

$10 million reward offered for information on Cl0p ransomware gang

Graham Cluley

Fancy $10 million? Of course you do! Well, all you have to do is provide information that helps identify or locate members of the notorious Cl0p ransomware gang.

article thumbnail

S3 Ep140: So you think you know ransomware?

Naked Security

Lots to learn this week – listen now! (Full transcript inside.

article thumbnail

LockBit Developing Ransomware for Apple M1 Chips, Embedded Systems

Dark Reading

Under construction: The world's leading ransomware gang is workshopping ransomware for less obvious systems beyond Windows environments. Experts weigh in on how worried we should be.

article thumbnail

Generative-AI apps & ChatGPT: Potential risks and mitigation strategies

The Hacker News

Losing sleep over Generative-AI apps? You're not alone or wrong. According to the Astrix Security Research Group, mid size organizations already have, on average, 54 Generative-AI integrations to core systems like Slack, GitHub and Google Workspace and this number is only expected to grow. Continue reading to understand the potential risks and how to minimize them.

Risk 109
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What is a VLAN? Ultimate Guide to How VLANs Work

eSecurity Planet

A VLAN (Virtual Local Area Network) is a logical grouping of devices that are all connected to the same network regardless of physical location. VLANs are an essential component of contemporary networking, allowing network traffic to be segmented and managed. VLANs enable logical partitioning inside a single switch, resulting in multiple virtual local area networks where physical switch segmentation is not a possibility.

article thumbnail

First Directory of Virtual CISO Providers Launched by Cynomi

CyberSecurity Insiders

The vCISO Directory comes to answer the increasing need of SMBs to manage their cybersecurity and helps them find and engage with the right vendor TEL AVIV, ISRAEL, JUNE 22, 2023 – The industry’s first-ever directory of virtual Chief Information Security Officer service providers has gone live today at www.thevcisodirectory.com. This extensive list of virtual CISO (vCISO) providers, collated by Cynomi , means that small- and medium-sized businesses (SMBs) can easily tap the expertise of qu

CISO 108
article thumbnail

Alert: Million of GitHub Repositories Likely Vulnerable to RepoJacking Attack

The Hacker News

Millions of software repositories on GitHub are likely vulnerable to an attack called RepoJacking, a new study has revealed. This includes repositories from organizations such as Google, Lyft, and several others, Massachusetts-based cloud-native security firm Aqua said in a Wednesday report.

Software 108
article thumbnail

Azure AD 'Log in With Microsoft' Authentication Bypass Affects Thousands

Dark Reading

The "nOAuth" attack allows cross-platform spoofing and full account takeovers, and enterprises need to remediate the issue immediately, researchers warn.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Web Application Security Vulnerabilities

Security Boulevard

Web applications have become a vital part of any business, especially as many businesses continue to realize their digital transformations. As such, web application security vulnerabilities are security risks for businesses of all sizes, regardless of industry. Cybercriminals are constantly looking for ways to exploit vulnerabilities inherent to web applications and APIs and gain access […] The post Web Application Security Vulnerabilities appeared first on Security Boulevard.

article thumbnail

What is Dynamic Application Security Testing (DAST)?

eSecurity Planet

Dynamic Application Security Testing (DAST) combines elements of pentesting, vulnerability scanning and code security to evaluate the security of web applications. The cyber security team adopts the role of a simulated hacker and expertly scrutinizes the application’s defenses, thoroughly assessing its vulnerability to potential threats. By doing this, DAST helps determine how secure the web application is and pinpoint areas that need improvement.

Software 104
article thumbnail

How to Avoid Online Shopping Scams on Amazon Prime Day

Security Boulevard

Prime Day is Amazon’s largest, most highly anticipated retail event, often thought as bigger than Cyber Monday and Black Friday combined. Shoppers enjoy two days of special sales, this year running from July 11th-12th, on everything from Amazon devices such as the Echo and Kindle to stylish furniture. While shoppers flock to Amazon’s website to… Continue reading How to Avoid Online Shopping Scams on Amazon Prime Day The post How to Avoid Online Shopping Scams on Amazon Prime Day appeared first o

Scams 105
article thumbnail

Millions of GitHub repos likely vulnerable to RepoJacking, researchers say

Bleeping Computer

Millions of GitHub repositories may be vulnerable to dependency repository hijacking, also known as "RepoJacking," which could help attackers deploy supply chain attacks impacting a large number of users. [.

101
101
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Mature SOC’s Role in Security Operations

Security Boulevard

There is a lot of talk about building an effective cybersecurity program, with security analysts recommending that your organization strive for cybersecurity maturity. But what do they mean by maturity, and what is the role of the SOC in reaching that point? Cybersecurity maturity measures the success of the security systems and protocols that your.

article thumbnail

Apple issues fix for zero-day flaws used in spy attacks against Kaspersky. Patch now!

Graham Cluley

If you have an Apple computer, watch, or smartphone you have hopefully already received a notification that you should install an update to your operating system. And yes, you really should update your devices.

Malware 101
article thumbnail

Resisting Identity-Based Threats With Identity Management

Security Boulevard

We all authenticate ourselves multiple times in a day, whether online shopping, logging into our bank account or booking flights. And with authentication, we confirm our digital identities so often that it doesn’t seem like a security action; instead, it seems like a step in the process of gaining access to services/resources. However, the reality. The post Resisting Identity-Based Threats With Identity Management appeared first on Security Boulevard.

article thumbnail

More than a million GitHub repositories potentially vulnerable to RepoJacking

Security Affairs

Researchers reported that millions of GitHub repositories are likely vulnerable to an attack called RepoJacking. A study conducted by Aqua researchers revealed that millions of GitHub repositories are potentially vulnerable to RepoJacking. In the RepoJacking attack, attackers claim the old username of a repository after the legitimate creator changed the username, then publish a rogue repository with the same name to trick users into downloading its content.

Hacking 101
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Lessons From a Pen Tester: 3 Steps to Stay Safer

Dark Reading

From hardening Windows systems to adding access control and segmenting the network, there are steps organizations can take to better secure corporate data.

100
100
article thumbnail

How to Deploy Generative AI Safely and Responsibly

Trend Micro

New uses for generative AI are being introduced every day—but so are new risks.

Risk 100
article thumbnail

Patch Now: Cisco AnyConnect Bug Exploit Released in the Wild

Dark Reading

A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild.

VPN 100
article thumbnail

News Alert: Fortra researchers find email impersonation attacks climbing to an all-time high

The Last Watchdog

Eden Prairie, Minn., June 22, 2023 — Malicious emails have reached a crescendo in 2023 according to the latest report from cybersecurity software and services provider Fortra. Email impersonation threats such as BEC currently make up nearly 99 percent of threats, and of those 99 percent of threats observed in corporate inboxes are response-based or credential theft attacks.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!