Sat.May 13, 2017 - Fri.May 19, 2017

article thumbnail

United flight attendant accidentally leaked cockpit security codes to public website

Tech Republic Security

United Airlines recently alerted staff that cockpit access codes has been posted online, raising concerns about the chain of ownership for sensitive data.

167
167
article thumbnail

*bleed continues: 18 byte file, $14k bounty, for leaking private Yahoo! Mail images

Scary Beasts Security

Overview *bleed attacks are hot right now. Most notably, there's been Heartbleed and Cloudbleed. In both cases, out-of-bounds reads in server side code resulted in private server memory content being returned to clients. This leaked sensitive secrets from the server process' memory space, such as keys, tokens, cookies, etc. There was also a recent client-side bleed in Microsoft's image libraries , exposed through Internet Explorer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Plans To Examine Internet of Things (IoT) For Its Cybersecurity Framework

Privacy and Cybersecurity Law

The National Institute of Standards and Technology (NIST) is holding a Cybersecurity Framework Workshop this week at its headquarters in Gaithersburg, Maryland. […].

article thumbnail

Empire 5.8.1 releases: PowerShell & Python post-exploitation agent

Penetration Testing

Empire Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. The Empire server is written in Python 3 and is modular to allow operator flexibility.... The post Empire 5.8.1 releases: PowerShell & Python post-exploitation agent appeared first on Penetration Testing.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

FTC looks to shut down fake tech support scams with Operation Tech Trap

Tech Republic Security

The Federal Trade Commission recently announced new efforts to end scams that target consumers through fake security alerts. Here's how to spot them and stay safe.

Scams 155
article thumbnail

*bleed, more powerful: dumping Yahoo! authentication secrets with an out-of-bounds read

Scary Beasts Security

Overview In my previous post on Yahoobleed #1 (YB1) , we saw how an uninitialized memory vulnerability could lead to disclosure of private images belonging to other users. The resulting leaked memory bytes were subject to JPEG compression, which is not a problem for image theft, but is somewhat lacking if we wanted to steal memory content other than images.

LifeWorks

More Trending

article thumbnail

5 ways to reduce insider security risks

Tech Republic Security

Known (and trusted) insiders can pose an even bigger security threat than faceless hackers. Learn how to reduce associated risks.

Risk 153
article thumbnail

WannaCrypt makes an easy case for Linux

Tech Republic Security

Ransomware got you down? There's a solution that could save you from dealing with this issue ever again. That's right. It's Linux.

article thumbnail

Top 5: Ways to stay safe online

Tech Republic Security

Chances are, you've heard these tips before. But as recent news stories indicate, reminders about online security are never a bad thing.

148
148
article thumbnail

Video: How a cyberweapon developed by the NSA infected machines around the world

Tech Republic Security

Protonmail CEO Andy Yen explains how government backdoors and zero day exploits made the British hospital system, SMBs, and enterprise organizations vulnerable to the WannaCry exploit.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Despite security risks, 75% of CEOs use applications that aren't approved by IT

Tech Republic Security

Despite understanding the risks, a majority of CEOs and business decision makers do not adhere to enterprise security practices, according to a new survey from Code42.

Risk 141
article thumbnail

How to create stronger passwords by using data-driven feedback

Tech Republic Security

Check out researchers' password meter on GitHub to see how the open source web app determines a password's strength and then uses data-driven feedback to make it stronger.

Passwords 134
article thumbnail

Why patching Windows XP forever won't stop the next WannaCrypt

Tech Republic Security

Security experts argue there would be unintended consequences were Microsoft to provide critical security updates to old operating systems.

134
134
article thumbnail

mSecure 5 password manager: Why Dropbox, iCloud, Wi-Fi, or shared file cloud syncing aren't available

Tech Republic Security

mSecure assists Apple, Windows, and Android users in securely managing passwords across various devices, though some syncing features are not included in the latest release. Erik Eckel explores why.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to upgrade an ASA 5506-X to the new Firepower Threat Defense software

Tech Republic Security

Firepower Threat Defense is the latest iteration of Cisco's Security Appliance product line. This article explains the steps required to migrate an existing Cisco ASA with FirePOWER services to the new Firepower Threat Defense image.

Software 134
article thumbnail

Patching WannaCrypt: Dispatches from the frontline

Tech Republic Security

The WannaCrypt ransomware exploit is wreaking havoc around the world. This is a first-hand perspective of how one company kept the threat under control.

article thumbnail

Former DOJ employee on what businesses can learn from government's approach to cybersecurity

Tech Republic Security

Morrison Foerster's John Carlin, a former DOJ employee, said that business leaders must own the risks associated with their business and champion cybersecurity efforts.

article thumbnail

3 crucial issues businesses don't understand about ransomware

Tech Republic Security

Brian Vecci, technology evangelist at Varonis, spoke with TechRepublic about how businesses don't fully understand how ransomware behaves, and whether or not their security is adequate.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Should Microsoft Patch Windows XP Forever?

Tech Republic Security

The answer is not simple

122
122
article thumbnail

How Google hopes to finally solve the Android update problem with Treble

Tech Republic Security

Google has announced a significant change to Android that is intended to make pushing updates easier for device manufacturers.

article thumbnail

Video: How protect your employees from phishing and pretexting attacks

Tech Republic Security

Everything in an email can be faked. Hackers and cybercriminals rely on identity deception to fool employees. Agari CTO John Wilson explains how to restore trust to the inbox.

Phishing 113
article thumbnail

How one ransomware campaign was actually a front for a terrorist kill list

Tech Republic Security

Morrison Foerster's John Carlin, a former Department of Justice employee, spoke with TechRepublic about the concept of blended threats, and what businesses can learn from them.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

5 quick tips for online safety

Tech Republic Security

The internet can be a threatening place. Follow these tips and stay safe out there.

article thumbnail

Video: How ransomware and file-less cyber-attacks proliferate

Tech Republic Security

Cyberbit builds cybersecurity solutions for military, government, and enterprise organizations. CEO Adi Dar details the best practices for threat intelligence sharing and the repercussions of delayed threat detection.

article thumbnail

Video: Did your HP laptop come with preinstalled spyware?

Tech Republic Security

Several of HP's laptops have a keylogging problem: The audio driver is actually saving every press you make to an unsecured log file.

Spyware 86
article thumbnail

Gallery: 10 major organizations affected by the WannaCry ransomware attack

Tech Republic Security

The WannaCry ransomware attack of the past week has been brutal, and while it has been temporarily stopped experts say it will probably come back. Here's a list of some of the biggest victims so far.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Video: How can AI systems remain secure?

Tech Republic Security

TechRepublic caught up with Mårten Mickos, CEO of HackerOne, who runs a bug bounty program, to learn about the most common security issues that are threatening AI systems and how to secure them.

75
article thumbnail

What companies need to know about blended threats and their impact on IT

Tech Republic Security

John Carlin, of Morrison Foerster, said that businesses need to know about partnerships between cyber attackers and terrorists and how they, and the growth of IoT, will change security.

IoT 66
article thumbnail

Are we doing memory corruption mitigations wrong?

Scary Beasts Security

Introduction Before we get into it, let's start by stating that the progression of memory corruption mitigations over the years has been intensely valuable. The progression of mitigations continues to make exploiting bugs harder and more time consuming. The pool of people who have both the skill and commitment to exploit any given bug (either reliably or at all) is shrinking.

article thumbnail

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

On May 15, 2017, the US Government Accountability Office (GAO) released a new report entitled “ Internet of Things: Status and implications of an increasingly connected world.” In the report, the GAO provides an introduction to the Internet of Things (IoT), describes what is known about current and emerging IoT technologies, and examines the implications of their use.

IoT 40
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!