Tue.Mar 28, 2023

article thumbnail

UK Sets Up Fake Booter Sites To Muddy DDoS Market

Krebs on Security

The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake booter sites.

DDOS 254
article thumbnail

Security Vulnerabilities in Snipping Tools

Schneier on Security

Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to prevent fork bombs on your Linux development servers

Tech Republic Security

Learn how to protect your Linux server from the fork bomb denial-of-service attack with this video tutorial by Jack Wallen. The post How to prevent fork bombs on your Linux development servers appeared first on TechRepublic.

article thumbnail

WiFi protocol flaw allows attackers to hijack network traffic

Bleeping Computer

Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to trick access points into leaking network frames in plaintext form. [.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

With political ‘hacktivism’ on the rise, Google launches Project Shield to fight DDos attacks

Tech Republic Security

In 2022, DDoS exploits included high-profile attacks against websites offering information on elections and candidates. In what it calls a bid to save “democratic processes worldwide,” Google Cloud has released Project Shield. The post With political ‘hacktivism’ on the rise, Google launches Project Shield to fight DDos attacks appeared first on TechRepublic.

DDOS 165
article thumbnail

GUEST ESSAY: AntiguaRecon – A call to train and promote the next generation of cyber warriors

The Last Watchdog

Imagine being a young person who wants a career, of whatever type you can find, as a cybersecurity professional. Related: Up-skilling workers to boost security Related Although you were born with an agile and analytical mind, you have very limited financial resources and few, if any, connections that can open doors to your future ambitions. Dennis If you were born in a country such as the US, Canada or the UK, you might have a wider range of options despite your financial limitations.

More Trending

article thumbnail

China asks Apple to bolster its data security and privacy protections

CyberSecurity Insiders

China has urged Apple CEO Tim Cook to bolster its products’ data security and privacy protections. While, most people in the United States believe that Apple offers iPhones and Macs with the utmost security, Zheng Shanjie, the Chairperson of the National Development and Reform Commission, met with Cook to discuss the issue of personal privacy protection.

article thumbnail

Become your organization’s cybersecurity expert with this $79 bundle

Tech Republic Security

The training covers CISSP, CASP+, CISM, and more. The post Become your organization’s cybersecurity expert with this $79 bundle appeared first on TechRepublic.

article thumbnail

How to Comply with the U.S. Federal Trade Commission’s (FTC) revised Safeguards Rule

CyberSecurity Insiders

If you handle consumer financial data, you need to be aware of the U.S. Federal Trade Commission ‘s ( FTC ) revised Safeguards Rule cybersecurity regulation. The rule applies to a wide range of businesses, including those that may not consider themselves to be financial institutions. The FTC has classified many companies as “non-banking financial institutions” subject to the rule, which requires them to implement specific measures to protect customer data.

article thumbnail

NullMixer Polymorphic Malware Variant Infects 8K Targets in Just a Month

Dark Reading

The NullMixer loader has compromised thousands of endpoints in the US, France, and Italy, stealing data and selling it to Dark Web data dealers, all without setting off alarm bells.

Malware 133
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

New OpcJacker Malware Distributed via Fake VPN Malvertising

Trend Micro

We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022.

Malware 129
article thumbnail

Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

The Hacker News

Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to offer "end-to-end defense at machine speed and scale.

article thumbnail

Hackers changed tactics, went cross-platform in 2022, says Trend Micro

CSO Magazine

Payouts from ransomware victims declined by 38% in 2022, prompting hackers to adopt more professional and corporate tactics to ensure higher returns, according to Trend Micro’s Annual Cybersecurity Report. Many ransomware groups have structured their organizations to operate like legitimate businesses, including leveraging established networks and offering technical support to victims.

article thumbnail

Microsoft Exchange Server vulnerability makes lawyers pay $200k as a settlement

CyberSecurity Insiders

In 2021, the LockBit Ransomware group breached the servers of New York-based law firm HPMB and stole sensitive information from one of its healthcare-related clients. The stolen data included names, DOBs, social security numbers, driving license details, biometric information of 114,979 individuals, and court-related documents in PDF form. A security analysis done in April 2022 revealed that the cybercriminals from China-funded Hafnium Group gained access to HPMB’s servers through a vulnerabilit

article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Communication is a core component of a resilient organization's risk management framework. However, risk communication involves more than just reporting information and populating dashboards, and we may be limiting our skillset. Storytelling is the ability to express ideas and convey messages to others, including stakeholders. When done effectively, it can help interpret complex risk environments for leaders and inform their decision-making.

article thumbnail

Trojanized Tor browsers target Russians with crypto-stealing malware

Bleeping Computer

A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users' cryptocurrency transactions. [.

Malware 141
article thumbnail

Legacy, password-based authentication systems are failing enterprise security, says study

CSO Magazine

Authentication-related attacks grew in 2022, taking advantage of outdated, password-based authentication systems, according to a study commissioned by HYPR, a passwordless multifactor authentication (MFA) provider based in the US. The study, conducted by independent technology market research firm Vanson Bourne, surveyed 1000 IT professionals from organizations around the world with more than 50 employees.

article thumbnail

Debating SIEM in 2023, Part 2

Anton on Security

So, we went through “Debating SIEM in 2023, Part 1” , now let’s debate a bit more. At this point, everybody who didn’t “rage stop” reading it should be convinced that yes, SIEM does matter in 2023. Debating SIEM in 2023, Part 1 But why? I bet the views on why SIEM matters differ a lot. So let’s dive into this! Let’s start with this: why should anyone buy an SIEM tool in 2023?

article thumbnail

Microsoft announces generative AI Security Copilot

CSO Magazine

Microsoft today announced its AI Security Copilot , a GPT-4 implementation that brings generative AI capabilities to its in-house security suite, and features a host of new visualization and analysis functions. AI Security Copilot’s basic interface is similar to the chatbot functionality familiar to generative AI users. It can be used in the same way, to answer security questions in a natural manner, but the more impressive features stem from its tight integration with Microsoft’s existing secur

124
124
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

The Chasm Between Cybersecurity Confidence and Actual Ability

Security Boulevard

A survey of 316 cybersecurity training strategy decision-makers in the UK, U.S, Canada, Germany and Sweden published today found there is a major disconnect in the confidence they have in their teams have in their abilities and their actual abilities. Conducted by Forrester Consulting on behalf of Immersive Labs, a provider of a cyberattack simulation.

article thumbnail

5 ways to tell you are not CISO material

CSO Magazine

As the role of the CISO continues to grow in importance and gain more responsibility, many cybersecurity practitioners may wonder if they have what it takes to be successful in the role. Technical expertise and experience are obviously huge assets. An effective CISO has the ability to evaluate and select security technology, communicate with technical staff and make crucial decisions about security infrastructure and architecture.

CISO 126
article thumbnail

Understanding the difference between attack simulation vs penetration testing

CyberSecurity Insiders

Attack simulation and penetration testing are both methods used to identify vulnerabilities in a company’s cybersecurity infrastructure, but there are some differences between the two. Penetration testing , also known as pen testing, involves a team of cybersecurity professionals attempting to breach a company’s systems, networks, or applications using a variety of methods that a real-world attacker might use.

article thumbnail

North Korea's Kimsuky Evolves into Full-Fledged, Prolific APT

Dark Reading

In cyberattacks against the US, South Korea, and Japan, the group (aka APT43 or Thallium) is using advanced social engineering and cryptomining tactics that set it apart from other threat actors.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

Cryptocurrency and non-fungible tokens (NFTs) - what are they and why should you care? With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises. Join this exclusive webinar with Ryan McInerny to learn: Cryptocurrency asset market trends How to manage risk and compliance to serve customers safely Best practices for identifying crypto transactions and companies Rev

article thumbnail

ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks

Security Boulevard

Tech companies large and small are all jumping on the AI chatbot bandwagon—Google just opened up access to its Bard offering and ChatGPT is already on version 4—and, not surprisingly, threat actors will likely press AI into action to carry out nefarious actions. For now, though, human social engineers still outperform AI when it comes. The post ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks appeared first on Security Boulevard.

article thumbnail

How Does Data Literacy Enhance Data Security?

Dark Reading

With the rise in cloud-based security concerns and other issues, organizations must improve data literacy across the enterprise.

139
139
article thumbnail

The Chip War’s Impact on Cybersecurity and the Supply Chain

Security Boulevard

Semiconductors had their moment in the spotlight during the worst of the pandemic-induced supply chain disruptions. The shortage of semiconductors wreaked havoc on the industries that rely on them, opening up devices to potential threats. “The semiconductor supply chain remains one of the most complicated and most critical supply chains that underpin the entire global.

article thumbnail

Newly exposed APT43 hacking group targeting US orgs since 2018

Bleeping Computer

A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the United States, Europe, Japan, and South Korea for the past five years. [.

Hacking 137
article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Did you know that 2021 was a record-breaking year for ransomware? The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue. With 495.1 million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.

article thumbnail

Data loss from insider events increase despite IRM programs, says study

CSO Magazine

A vast majority of companies are struggling with data losses from insider events despite having dedicated insider risk management (IRM) programs in place, according to a data exposure study commissioned by Code42. The study conducted by Vanson Bourne, an independent research firm for technology companies, interviewed 700 cybersecurity professionals, managers, and leaders in the US between January and February.

article thumbnail

Microsoft brings GPT-4-powered Security Copilot to incident response

Bleeping Computer

Microsoft today announced Security Copilot, a new ChatGPT-like assistant powered by artificial intelligence that takes advantage of Microsoft's threat intelligence footprint to make faster decisions during incident response and to help with threat hunting and security reporting. [.

article thumbnail

How Executive Cybersecurity Protection Limits Ransomware Threats

Security Boulevard

Ransomware, or malicious malware designed to shut down or block access to vital business data until ransom fees are paid, continues to disrupt organizations worldwide. In recent years, it’s become clear that every business, regardless of industry, requires robust and extensive cybersecurity protections against ransomware attacks. Comprehensive executive cybersecurity protection is an essential part of […] The post How Executive Cybersecurity Protection Limits Ransomware Threats appeared first on

article thumbnail

OPINION: Why Perfection is the Enemy of Progress in Cybersecurity

CyberSecurity Insiders

By Muhammad Chbib , CEO of Autobahn Security Is your organization suffering from cybersecurity paralysis? Many businesses are in cybersecurity panic-mode due to the steady stream of alarming news that ‘nobody is safe’ from hackers. While it’s true that all businesses are technically ‘hackable’, it’s important to see the bigger picture – cybercriminals tend to focus their efforts primarily on high-yield targets.

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

Global economic conditions are soft at best. From a budget standpoint, US banks are feeling the pinch. Many US banks are bracing for increased defaults and lower demand for mortgages and other loans as interest rates have increased. The largest banks have increased reserves to protect against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions?