Tue.Aug 16, 2022

article thumbnail

When Efforts to Contain a Data Breach Backfire

Krebs on Security

Earlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The missive alleged that an auction on the site for data stolen from 10 million customers of Mexico’s second-largest bank was fake news and harming the bank’s reputation. The administrator responded to this empty threat by purchasing the stolen banking data and leaking it on the forum for everyone to download.

article thumbnail

Remotely Controlling Touchscreens

Schneier on Security

This is more of a demonstration than a real-world vulnerability, but researchers can use electromagnetic interference to remotely control touchscreens. From a news article : It’s important to note that the attack has a few key limitations. Firstly, the hackers need to know the target’s phone passcode, or launch the attack while the phone is unlocked.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy

The Last Watchdog

Migrating to and utilizing cloud environments – public, hybrid, or multi – is a source of real investment and positive change for businesses. Cloud is the powerhouse that drives digital organizations. Related: Cloud security frameworks take hold. Gartner predicts that spending on public cloud alone is set to top $500 billion in 2022 – a 20% growth over last year.

article thumbnail

Are ethical hackers the digital security answer?

Tech Republic Security

TechRepublic speaks to HackerOne about how ethical hackers are helping to shrink the broader attack surface of cyber criminals. The post Are ethical hackers the digital security answer? appeared first on TechRepublic.

Hacking 167
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Two more malicious Python packages in the PyPI

SecureList

On August 8, CheckPoint published a report on ten malicious Python packages in the Python Package Index (PyPI), the most popular Python repository among software developers. The malicious packages were intended to steal developers’ personal data and credentials. Following this research, we used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI.

Passwords 145
article thumbnail

How to use Sendinc to encrypt your emails

Tech Republic Security

Sendinc lets you send encrypted messages using its own email client and third-party programs like Microsoft Outlook, Thunderbird and Gmail. The post How to use Sendinc to encrypt your emails appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

CISOs are taking on more responsibilities—and burning out

Tech Republic Security

A new report from Heidrick & Struggles also finds that many feel secure in their jobs despite breaches, and only 14% of all CISOs sit on a corporate board. The post CISOs are taking on more responsibilities—and burning out appeared first on TechRepublic.

CISO 158
article thumbnail

Is your Supply Chain Safe?

Security Boulevard

On July 25 this year, the FBI warned that supply chains are “increasingly a point of vulnerability for computer intrusions.” The warning comes at a time when supply chain attacks are on the rise. Security Intelligence reported that 62% of organizations surveyed experienced a supply chain attack in 2021. While many of those attacks were […]. The post Is your Supply Chain Safe?

article thumbnail

DevSecOps adoption is low but packing a punch in user organizations

Tech Republic Security

Technical limitations are barriers to success but a new report finds that DevSecOps could be a game changer and will see growing market traction. The post DevSecOps adoption is low but packing a punch in user organizations appeared first on TechRepublic.

Marketing 158
article thumbnail

South Staffordshire Water Confirms Cyberattack

Heimadal Security

South Staffordshire Water, a company that provides 1.6 consumers daily with 330 million liters of drinking water, has confirmed an IT outage caused by a cyberattack in an official statement. The supply of safe water to its customers and those of its subsidiaries, Cambridge Water and South Staffs Water, is unaffected by the disruption of […]. The post South Staffordshire Water Confirms Cyberattack appeared first on Heimdal Security Blog.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

BazarCall attack increasingly used by ransomware threat actors

Tech Republic Security

Already three independent threat groups are using it to heavily target companies. The post BazarCall attack increasingly used by ransomware threat actors appeared first on TechRepublic.

article thumbnail

How a spoofed email passed the SPF check and landed in my inbox

We Live Security

The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain. The post How a spoofed email passed the SPF check and landed in my inbox appeared first on WeLiveSecurity.

Phishing 126
article thumbnail

How to protect your industrial facilities from USB-based malware

Tech Republic Security

USB-borne malware can infect your industrial equipment unless you take the proper precautions, says Honeywell. The post How to protect your industrial facilities from USB-based malware appeared first on TechRepublic.

Malware 158
article thumbnail

Threat in your browser: what dangers innocent-looking extensions hold for users

SecureList

Whether you want to block ads, keep a to-do list or check your spelling, browser extensions allow you to do all of the above and more, improving convenience, productivity and efficiency for free, which is why they are so popular. Chrome, Safari, Mozilla — these and many other major Web browsers — have their own online stores to distribute thousands of extensions, and the most popular plug-ins there reach over 10 million users.

Adware 122
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

US offers reward “up to $10 million” for information about the Conti gang

Naked Security

Wanted - Reward Offered - Five unknown individuals (plus a man with a weird hat).

article thumbnail

Microsoft disrupts cyber espionage campaign against NATO Countries

CyberSecurity Insiders

It is a known fact that all NATO countries are against the Russian war on Ukraine and have denounced it, and that has probably not gone down well with Vladimir Putin. Apparently, the leader of the Russian Federation could have launched a cyber espionage campaign that was neutralized by Microsoft on a recent note. On August 15th this year, the American tech giant released a press update stating that it has disabled accounts related to the Seaborgium group as it was involved in email collection, p

article thumbnail

DEF CON – “don’t worry, the elections are safe” edition

We Live Security

Don't worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference. The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity.

article thumbnail

Kubernetes security incidents are on the rise – what can you do about it?

CyberSecurity Insiders

While the container orchestration platform has many benefits, Kubernetes security breaches are on the rise. We’ve seen massive adoption and growth rates as a result of flexibility in multi-cloud environments, scalability, cost, and system deployment time reductions; but amidst all of the benefits, it also presents a new set of challenges for enterprises when it comes to securing their data and applications.

Risk 120
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

4 Boxes You Must Check Before Leveraging Legitimate Interest as Your Basis for Data Processing

TrustArc

When can legitimate interests be used as a basis for data processing? Reasonable exceptions for legitimate interest can be shaped by transparency and clarity.

119
119
article thumbnail

Kentucky University Facebook account hacked to post inappropriate photos of Woman

CyberSecurity Insiders

Thomas Moore University, a university in Kentucky, has become a victim of a cyber attack as its official Facebook account was hacked to post inappropriate images and videos. Interestingly, the hack was carried out after a warning issued three weeks ago, that clearly stated that all the University administrators who had the privilege to access account credentials will be locked from their accounts, respectively.

article thumbnail

Exploit out for critical Realtek flaw affecting many networking devices

Bleeping Computer

Exploit code has been released for a critical vulnerability affecting networking devices with Realtek's RTL819x system on a chip (SoC), which are estimated to be in the millions. [.].

114
114
article thumbnail

DEF CON: A Woman's First Experience

Dark Reading

Omdia Senior Analyst Hollie Hennessy goes over her first experience of DEF CON as a woman in cybersecurity.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

IDIQ® Makes The 2022 Inc. 5000 Annual List Of Fastest-Growing Private Companies in America

Identity IQ

IDIQ® Makes The 2022 Inc. 5000 Annual List Of Fastest-Growing Private Companies in America. IdentityIQ. —For 3 rd year in a row, IDIQ earns a spot on the Inc. 5000 List, ranking No. 1036 with a three-year revenue growth of 615% —. Temecula, California, August 16, 2022 – IDIQ , an industry leader in identity theft protection and credit report monitoring, achieved the rank of No. 1036 on the 2022 Inc. 5000 List of Fastest-Growing Private Companies in America.

article thumbnail

Windows Vulnerability Could Crack DC Server Credentials Open

Dark Reading

The security flaw tracked as CVE-2022-30216 could allow attackers to perform server spoofing or trigger authentication coercion on the victim.

article thumbnail

Incident Response Teams Fight Back With Virtual Patching

Security Boulevard

Based solely on the dire cybersecurity headlines of the past few years, it’d be easy to assume that cybersecurity teams and incident responders were on their heels. But a just-released survey from VMware found that not only are incident response teams trying different ways to protect their systems, but they also feel confident in their. The post Incident Response Teams Fight Back With Virtual Patching appeared first on Security Boulevard.

article thumbnail

Xiaomi Phone Bug Allowed Payment Forgery

Threatpost

Mobile transactions could’ve been disabled, created and signed by attackers.

Mobile 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Protecting S3 from Malware: The Cold Hard Truth

Trend Micro

Cloud object storage is a core component of any modern application, but most cloud file storage security is insufficient.

Malware 101
article thumbnail

Lessons From the Cybersecurity Trenches

Dark Reading

Threat hunting not only serves the greater good by helping keep users safe, it rewards practitioners with the thrill of the hunt and solving of complex problems. Tap into your background and learn to follow your instincts.

article thumbnail

Zoom fixed two flaws in macOS App that were disclosed at DEF CON?

Security Affairs

Zoom addressed two high-severity vulnerabilities in its macOS app that were disclosed at the DEF CON conference. Zoom last week released macOS updates to fix two high-severity flaws in its macOS app that were disclosed at the DEF CON conference. Technical details of the vulnerabilities were disclosed at the DEF CON conference by security researcher Patrick Wardle during its talk “You’re M?

Passwords 101
article thumbnail

Analyzing the Hidden Danger of Environment Variables for Keeping Secrets

Trend Micro

While DevOps practitioners use environment variables to regularly keep secrets in applications, these could be conveniently abused by cybercriminals for their malicious activities, as our analysis shows.

Risk 100
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!