Sat.Dec 24, 2022 - Fri.Dec 30, 2022

article thumbnail

Will the Crypto Crash Impact Cybersecurity in 2023? Maybe.

Dark Reading

Will the bottom falling out of the cryptocurrency market have a profound impact on cybercriminal tactics and business models? Experts weigh in on what to expect

article thumbnail

Recovering Smartphone Voice from the Accelerometer

Schneier on Security

Yet another smartphone side-channel attack: “ EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers “: Abstract: Eavesdropping from the user’s smartphone is a well-known threat to the user’s safety and privacy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Top 23 Security Predictions for 2023 (Part 2)

Lohrman on Security

After a year full of data breaches, ransomware attacks and real-world cyber impacts stemming from Russia’s invasion of Ukraine, what’s next? Here’s part 2 of your annual roundup of security industry forecasts for 2023 and beyond

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

KrebsOnSecurity turns 13 years old today. That’s a crazy long time for an independent media outlet these days, but then again I’m bound to keep doing this as long as they keep letting me. Heck, I’ve been doing this so long I briefly forgot which birthday this was!

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

My Philosophy and Recommendations Around the LastPass Breaches

Daniel Miessler

If you follow Information Security at all you are surely aware of the LastPass breach situation. It started back in August of 2022 as a fairly common breach notification on a blog, but it, unfortunately, turned into more of a blog series.

Passwords 280
article thumbnail

LastPass Breach

Schneier on Security

Last August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised.

Passwords 225

More Trending

article thumbnail

Weekly Update 328

Troy Hunt

We made it! That's 2022 done and dusted, and what a year it was, both professionally and personally.

article thumbnail

LastPass Data Breach: It's Time to Ditch This Password Manager

WIRED Threat Level

The password manager's most recent data breach is so concerning, users need to take immediate steps to protect themselves. Security Security / Cyberattacks and Hacks Security / Security Advice Security / Security News

article thumbnail

QR Code Scam

Schneier on Security

An enterprising individual made fake parking tickets with a QR code for easy payment. Uncategorized forgery QR codes scams

Scams 218
article thumbnail

How to deploy a self-hosted instance of the Passbolt password manager

Tech Republic Security

A password manager can keep your sensitive information in-house. Here's how to deploy Passbolt to your data center or cloud-hosted service. The post How to deploy a self-hosted instance of the Passbolt password manager appeared first on TechRepublic.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

article thumbnail

Weekly Update 327

Troy Hunt

It's my last weekly update on the road for a while! As enjoyable as travel is, I'm looking forward to getting back to a normal routine and really starting to smash out some of the goals I have for the coming year.

article thumbnail

Biden administration passes bill against Quantum Computing Data Breaches

CyberSecurity Insiders

Joe Biden and his administration seems be on a forward thinking gear for quantum technology linked cyber attacks leading to data breaches. On December 21st,2022, the Senate passed a bipartisan bill to prevent data breaches emerging from quantum computing.

article thumbnail

Extracting Encrypted Credentials From Common Tools

Dark Reading

Attackers are harvesting credentials from compromised systems. Here's how some commonly used tools can enable this

article thumbnail

FIN7 threat actor updated its ransomware activity

Tech Republic Security

Researchers from PRODAFT reveal that the infamous FIN7 threat actor updated its ransomware activities and provide a unique view into the structure of the group. Learn how to protect against it. The post FIN7 threat actor updated its ransomware activity appeared first on TechRepublic.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

article thumbnail

How One Jobseeker Used AI to Apply for 200 Jobs in 2 Days

Javvad Malik

The search for a job has never been easy, but with the commoditisation of AI tools, it’s becoming a bit easier for the ambitious jobseeker. Recently, one such individual used AI to apply for nearly 200 jobs in the span of two days – a feat most of us can only dream of achieving. jerryjhlee Replying to @jaymie_inc this is how you apply to 200 jobs in 2 days — perfect timing with the holidays #resume #jobtips ♬ Betty (Get Money) – Yung Gravy.

article thumbnail

Follow these simple tricks to keep your smart phone secure in 2023

CyberSecurity Insiders

Smart Phones have become a need for us these days as they assist us in commuting, help in entertaining us if/when bored, help communicate with near & dear, read news and do more such stuff.

article thumbnail

War and Geopolitical Conflict: The New Battleground for DDoS Attacks

Dark Reading

The effectiveness of attacks largely depends on organizations' distributed denial-of-service defenses

DDOS 109
article thumbnail

Don’t overlook supply chain security in your 2023 security plan

Tech Republic Security

Supply chain security concerns continue to grow. Does your company have a risk management strategy in place that addresses the possibility of a major supplier security failure? The post Don’t overlook supply chain security in your 2023 security plan appeared first on TechRepublic.

Risk 135
article thumbnail

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

article thumbnail

Year in review for 2022 – Where is Cybersecurity headed?

Security Boulevard

As another year wraps up, it’s time to take a look back at the cybersecurity trends that dominated the landscape. From the ongoing impact of the past years’ pandemic to major geopolitical events and nation-state cyber attacks, 2022 saw a surge in cyberattacks that shows no signs of slowing down.

article thumbnail

Data Breach leads to Comcast Customer Data Leak

CyberSecurity Insiders

A few days ago, Comcast hit the news headlines for increasing its service price so much that many of its customers weren’t ready for the surprise at all.

article thumbnail

Why Attackers Target GitHub, and How You Can Secure It

Dark Reading

The unfettered collaboration of the GitHub model creates a security headache. Follow these seven principles to help relieve the pain

104
104
article thumbnail

Farcical Recognition

Javvad Malik

It was bound to happen – welcome to the future! Mom took her daughter to see a show. AI facial recognition software recognizes her and she’s unceremoniously escorted out by security. . Her offence? Her employer, a huge law firm (not her) is in protracted litigation with the owner MSG Entertainment, and MSG has a policy that precludes attorneys pursuing active litigation against the company from attending events at their venues.

article thumbnail

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

article thumbnail

6 Reasons Why Today’s Cybersecurity Landscape is so Complex

Security Boulevard

Today’s cyber threat landscape is constantly expanding and evolving. On top of that, threat actors’ attack tactics are increasingly complex and difficult to detect.

article thumbnail

Insurance cover becoming impossible for Cyber Attacks

CyberSecurity Insiders

Insurance companies like Lloyd offer cyber insurance policies that cover a business from facing a business loss during a cyber-attack. However, in coming days, cyber attacks will become uninsurable, as per Mario Greco, the Chief of Zurich Insurance.

Insurance 108
article thumbnail

Beyond the Obvious: The Boldest Cybersecurity Predictions for 2023

Dark Reading

Dark Reading's panel of security experts deliver a magnum of bubbly hot takes on what 2023 will look like, featuring evil AIs, WWIII, wild workplace soon-to-be-norms, and more

article thumbnail

2022 in review: 10 of the year’s biggest cyberattacks

We Live Security

The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022. The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on WeLiveSecurity.

Hacking 92
article thumbnail

Gaming Companies Take Big Risks This Holiday

Security Boulevard

As the holiday season ramps up, online gamers spend more time in their favorite virtual worlds. From Nintendo to Xbox to “God of War” and “Call of Duty,” a flood of video games appear on the scene, encouraging players to invest even more time and money in this form of competitive entertainment.

Risk 103
article thumbnail

NATO tames AI Driven Cyber Threats

CyberSecurity Insiders

We all know that a technology can never be at fault, as it is the mind that does most of the damage. And the same applies to the usage of Artificial Intelligence (AI) technology that is now proving as a double-edged sword.

article thumbnail

6 Ways to Protect Your Organization Against LAPSUS$

Dark Reading

Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their security posture

article thumbnail

The Worst Hacks of 2022

WIRED Threat Level

The year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks. Security Security / Cyberattacks and Hacks Security / National Security

article thumbnail

Top 5 IoT Security Testing Companies to Rely on

Security Boulevard

The world is full of machines and gadgets, readily participating in the race to automation, though, this race incorporates a hoard of convolutions. Albeit, IoT is the escape route to push these convolutions at bay, so IoT security plays a prime role.

IoT 98
article thumbnail

Black Basta Ransomware hits two electric utilities in America

CyberSecurity Insiders

Black Basta Ransomware Group has reportedly hit two electric utilities in North America in October this year and the attack took place after they compromised the email account of a government contractor in May 2022.