Mon.Apr 17, 2023

article thumbnail

Swatting as a Service

Schneier on Security

Motherboard is reporting on AI-generated voices being used for “swatting”: In fact, Motherboard has found, this synthesized call and another against Hempstead High School were just one small part of a months-long, nationwide campaign of dozens, and potentially hundreds, of threats made by one swatter in particular who has weaponized computer generated voices.

article thumbnail

GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk

The Last Watchdog

No organization is immune to cybersecurity threats. Even the most well-protected companies can be susceptible to attacks if they are not careful about a proactive approach towards cyber security. Related: Why timely training is a must-have That’s why businesses of all sizes need to understand the biggest cybersecurity weaknesses and take steps to mitigate them.

Risk 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Credential harvesting malware appears on deep web

Tech Republic Security

New cloud-focused credential harvester available on encrypted messaging service Telegram is part of a trend of Python scrapers making it easier to bait multiple phishing hooks. The post Credential harvesting malware appears on deep web appeared first on TechRepublic.

Malware 190
article thumbnail

Drop Everything: Update Chrome NOW — 0-Day Exploit in Wild

Security Boulevard

It’s Help|About Time: Chrome’s “V8” JavaScript engine has high-severity vuln. Scrotes already exploiting it. The post Drop Everything: Update Chrome NOW — 0-Day Exploit in Wild appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to create Portainer teams for restricted development access

Tech Republic Security

Jack Wallen shows you how to create a team and add users in Portainer in a secure way. The post How to create Portainer teams for restricted development access appeared first on TechRepublic.

article thumbnail

Hackers abuse Google Command and Control red team tool in attacks

Bleeping Computer

The Chinese state-sponsored hacking group APT41 was found abusing the GC2 (Google Command and Control) red teaming tool in data theft attacks against a Taiwanese media and an Italian job search company. [.

Media 141

LifeWorks

More Trending

article thumbnail

Google urges users to update Chrome to address zero-day vulnerability

CSO Magazine

Google has released Chrome version 112.0.5615.121 to address a vulnerability that can allow malicious code execution on Windows, Mac, and Linux systems.

139
139
article thumbnail

FBI and FCC warn about “Juicejacking” – but just how useful is their advice?

Naked Security

USB charging stations - can you trust them? What are the real risks, and how can you keep your data safe on the road?

Risk 131
article thumbnail

7 cybersecurity mindsets that undermine practitioners and how to avoid them

CSO Magazine

It’s no secret that cybersecurity jobs are burning people out. It’s a high-pressure environment that ever seems to be ratcheting up the daily demand on security professionals. There are many reasons for this, but underlying them all is the way we think about security. By consciously recognizing these mindsets we can change them and better position everyone for success.

article thumbnail

New QBot email attacks use PDF and WSF combo to install malware

Bleeping Computer

QBot malware is now distributed in phishing campaigns utilizing PDFs and Windows Script Files (WSF) to infect Windows devices. [.

Malware 127
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

EU cyber laws ‘will’ make FOSS devs liable

Security Boulevard

European lawmakers want all software makers to be liable for security holes. Even non-profit or hobbyist developers could be sued for negligence. The post EU cyber laws ‘will’ make FOSS devs liable appeared first on Security Boulevard.

Software 122
article thumbnail

Ex-Conti members and FIN7 devs team up to push new Domino malware

Bleeping Computer

Ex-Conti ransomware members have teamed up with the FIN7 threat actors to distribute a new malware family named 'Domino' in attacks on corporate networks. [.

Malware 117
article thumbnail

Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites

The Hacker News

A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver an open source red teaming tool known as Google Command and Control (GC2) amid broader abuse of Google's infrastructure for malicious ends.

Media 116
article thumbnail

GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk

Security Boulevard

No organization is immune to cybersecurity threats. Even the most well-protected companies can be susceptible to attacks if they are not careful about a proactive approach towards cyber security. Related: Why timely training is a must-have That’s why businesses of … (more…) The post GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk appeared first on Security Boulevard.

Risk 116
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Cyber Insurance Landscape Has Grown More Complicated

SecureWorld News

When considering adding a cyber insurance policy, organizations, both public and private, must weigh the pros and cons of having insurance to cover against harm caused by a cybersecurity incident. Let's break it down to the pros and cons. Pros of cyber insurance Financial protection: Cyber insurance can help protect an organization from significant financial losses resulting from a cyberattack or data breach.

article thumbnail

Anti-malware tests: How to interpret them

Security Boulevard

It can be overwhelming navigating the world of anti-malware software. With so many different products and test results out there, it can be difficult to know which one to choose in order to keep your computer and information safe. With that in mind, let’s take a look at how to interpret anti-malware test results in a way that's easy to understand, so that you can find the best product for your needs.

Malware 110
article thumbnail

CISA updates zero trust maturity model to provide an easier launch

CSO Magazine

The United States Cybersecurity and Infrastructure Security Agency (CISA) has published its Zero Trust Maturity Model (ZTMM) version 2 , which incorporates recommendations from public comments it received on its first version of ZTMM. "CISA has been acutely focused on guiding agencies, who are at various points in their journey, as they implement zero trust architecture," said Chris Butera, technical director for cybersecurity, CISA.

article thumbnail

New Chameleon Android malware mimics bank, govt, and crypto apps

Bleeping Computer

A new Android trojan called 'Chameleon' has been targeting users in Australia and Poland since the start of the year, mimicking the CoinSpot cryptocurrency exchange, an Australian government agency, and the IKO bank. [.

Banking 109
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Modern AppSec Needs Code to Cloud Traceability

Security Boulevard

“Code to cloud” is an emerging capability that spans both application security and cloud security and has been gaining a lot of traction recently—and for good reason. In this blog we’ll talk about why you need code to cloud traceability, what it is, and 5 pillars for using it to modernize your application security program. The post Modern AppSec Needs Code to Cloud Traceability appeared first on Security Boulevard.

107
107
article thumbnail

Top 5 Data Security RSAC 2023 Sessions to Attend

Dark Reading

A little preconference reconnoitering of upcoming seminars, keynotes, and track sessions makes plotting your days easier. Here's one attendee's list.

105
105
article thumbnail

An Analysis of the BabLock (aka Rorschach) Ransomware

Trend Micro

This blog post analyzes a stealthy and expeditious ransomware called BabLock (aka Rorschach), which shares many characteristics with LockBit.

article thumbnail

BrandPost: Staying ahead of evolving consumer privacy regulations

CSO Magazine

By Microsoft Security When the California Consumer Privacy Act (CCPA) first went into effect in January 2020, it had far-reaching implications for the way that public and private businesses handle consumer data. Under the CCPA, for-profit businesses that do business in the state of California now have to disclose the personal information they collect, as well as how it is used and shared.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Apple's Macs Have Long Escaped Ransomware. That May Be Changing

WIRED Threat Level

The discovery of malicious encryptors for Apple computers could herald new risks for macOS users if the malware continues to evolve.

article thumbnail

Israeli Spyware Vendor QuaDream to Shut Down Following Citizen Lab and Microsoft Expose

The Hacker News

Israeli spyware vendor QuaDream is allegedly shutting down its operations in the coming days, less than a week after its hacking toolset was exposed by Citizen Lab and Microsoft.

Spyware 103
article thumbnail

How to Write A Website Privacy Policy

Security Boulevard

Data privacy attorneys are often called upon to draft a privacy policy for a company to link to their landing page. You know, the little link that says either “Privacy” or “Legal” that nobody clicks on and nobody reads—at least until there is a data breach or a misuse of data. Then, every comma, semicolon. The post How to Write A Website Privacy Policy appeared first on Security Boulevard.

article thumbnail

Vice Society Ransomware Using Stealthy PowerShell Tool for Data Exfiltration

The Hacker News

Threat actors associated with the Vice Society ransomware gang have been observed using a bespoke PowerShell-based tool to fly under the radar and automate the process of exfiltrating data from compromised networks.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ICE Records Reveal How Agents Abuse Access to Secret Data

WIRED Threat Level

Documents obtained by WIRED detail hundreds of investigations by the US agency into alleged database misuse that includes harassment, stalking, and more.

102
102
article thumbnail

7 countries unite to push for secure-by-design development

CSO Magazine

Ten agencies from across seven countries have joined forces to create a guide for software developer organizations to ensure their products are both secure by design and by default. The joint guidance, Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default , comes after several recently identified critical vulnerabilities in vendor software.

Software 102
article thumbnail

LockBit Ransomware gang focusing on MacOS

CyberSecurity Insiders

For the first time in the history of Apple Inc, a notorious ransomware-spreading gang seems to have shifted its focus to MacOS-loaded laptops. The LockBit Ransomware Group has now developed encryptors targeting Macs, thus extending their crimes from Windows, Linux, and VMware ESXi servers to Apple computers. According to the analysis of MalwareHunterTeam, the encryption was found on a ZIP file on the database of VirusTotal, which offers cloud-based security services.

article thumbnail

New QBot Banking Trojan Campaign Hijacks Business Emails to Spread Malware

The Hacker News

A new QBot malware campaign is leveraging hijacked business correspondence to trick unsuspecting victims into installing the malware, new findings from Kaspersky reveal. The latest activity, which commenced on April 4, 2023, has primarily targeted users in Germany, Argentina, Italy, Algeria, Spain, the U.S., Russia, France, the U.K., and Morocco.

Banking 99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!