Sat.Apr 23, 2022 - Fri.Apr 29, 2022

article thumbnail

You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results

Krebs on Security

Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or physical address. The move comes just months after Google rolled out a new policy enabling people under the age of 18 (or a parent/guardian) to request removal of their images from Google search results.

article thumbnail

Video Conferencing Apps Sometimes Ignore the Mute Button

Schneier on Security

New research: “ Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps “: Abstract: In the post-pandemic era, video conferencing apps (VCAs) have converted previously private spaces — bedrooms, living rooms, and kitchens — into semi-public extensions of the office. And for the most part, users have accepted these apps in their personal space, without much thought about the permission models that govern the use of their personal data during me

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will Supply Chain Delays Impact Your Next Project?

Lohrman on Security

Where next for supply chain disruptions? How will this impact technology projects and plans? Let’s explore.

article thumbnail

GUEST ESSAY: Why automating distribution of strong passwords to employees is wise to do

The Last Watchdog

Passwords have become ubiquitous with digital. Yet most people don’t know how to use them properly. The humble password is nothing more than a digital key that opens a door. Related: The coming of passwordless access. People use keys to open their house, office, garage or car. And they use passwords to open a device, a system, an account, a file and so on.

Passwords 237
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

T-Mobile hit by data breaches from Lapsus$ extortion group

Tech Republic Security

Through multiple breaches, the Lapsus$ cybercriminal group was able to steal source code from T-Mobile, says KrebsOnSecurity. The post T-Mobile hit by data breaches from Lapsus$ extortion group appeared first on TechRepublic.

article thumbnail

SMS Phishing Attacks are on the Rise

Schneier on Security

SMS phishing attacks — annoyingly called “smishing” — are becoming more common. I know that I have been receiving a lot of phishing SMS messages over the past few months. I am not getting the “Fedex package delivered” messages the article talks about. Mine are usually of the form: “thank you for paying your bill, here’s a free gift for you.

Phishing 333

LifeWorks

More Trending

article thumbnail

GUEST ESSAY: A call to blur the lines between cybersecurity training, up-skilling and higher ed

The Last Watchdog

In a recent survey of US-based CEOs, talent shortages and cybersecurity were listed as two of the top five business concerns in 2022. Related: Cultivating ‘human sensors’ They may not entirely realize that when compounded, these two concerns could pose a critical security threat for their organization. CEOs who are looking to secure their data and build a cyber-resilient infrastructure are facing a quadruple whammy: •Expanding their digital infrastructure faster than they can secure

article thumbnail

Emotet malware launches new email campaign

Tech Republic Security

The malicious software had been slowly returning since November 2021, and saw a large number of phishing emails sent out with Emotet attached in April 2022. The post Emotet malware launches new email campaign appeared first on TechRepublic.

Malware 174
article thumbnail

Microsoft Issues Report of Russian Cyberattacks against Ukraine

Schneier on Security

Microsoft has a comprehensive report on the dozens of cyberattacks — and even more espionage operations — Russia has conducted against Ukraine as part of this war: At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military forces attack the country by land, air, and sea.

article thumbnail

Russia Is Being Hacked at an Unprecedented Scale

WIRED Threat Level

From “IT Army” DDoS attacks to custom malware, the country has become a target like never before.

DDOS 145
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Improvise, Adapt, Overcome: Building Security Resilience in a World of Uncertainty

Cisco Security

For my very first interview for the Security Stories podcast , I met a wonderful person called Mick Jenkins, MBE. Mick is sadly no longer with us, but his story will stay with me forever. One of Mick’s philosophies was centred around the importance of cyber resilience. “Improvise, adapt, overcome” are the words he used. This philosophy helped him when he got lost in the wilderness at age 14.

CISO 145
article thumbnail

Top DRaaS providers and disaster recovery services 2022

Tech Republic Security

Disaster recovery as a service offerings are plentiful for a reason. Here's how the cloud-based disaster recovery services work and how the best providers stack up. The post Top DRaaS providers and disaster recovery services 2022 appeared first on TechRepublic.

166
166
article thumbnail

Zero-Day Vulnerabilities Are on the Rise

Schneier on Security

Both Google and Mandiant are reporting a significant increase in the number of zero-day vulnerabilities reported in 2021. Google: 2021 included the detection and disclosure of 58 in-the-wild 0-days, the most ever recorded since Project Zero began tracking in mid-2014. That’s more than double the previous maximum of 28 detected in 2015 and especially stark when you consider that there were only 25 detected in 2020.

article thumbnail

Watch out for this SMS phish promising a tax refund

Malwarebytes

Imagine logging into your bank’s website after responding to a text message claiming you’re due a refund, only to see a warning to watch out for bogus texts: Beware of SMS phishing! For those who don’t read Dutch, the warning reads: Never respond to unusual emails or texts! Fraudsters often send e-mails under the guise of renewing your debit card or digipas.

Phishing 145
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Security resilience from the classroom to the cloud

Cisco Security

A conversation with Shawnee Heights School District . You have likely heard us talking more about security resilience in recent weeks. Resilience has always been a key part of cybersecurity, but the last few years have really highlighted its importance. . At Cisco, we define security resilience as: The ability to protect the integrity of every aspect of your business to withstand unpredictable threats or changes, and then emerge stronger.

article thumbnail

Top 5 things about zero-trust security that you need to know

Tech Republic Security

If malicious actors are already on your network, then typical cybersecurity measures aren’t enough. Learn how to further protect your organization’s data with these five facts about zero-trust security from Tom Merritt. The post Top 5 things about zero-trust security that you need to know appeared first on TechRepublic.

article thumbnail

How to Generate an SBOM in Veracode SCA

Veracode Security

Emerging government regulations have driven the advancement of standards for securing software supply chains. The production of a Software Bill of Materials (SBOM) in a standard format is an increasing audit and compliance need for large organizations. Having an SBOM can help Identify and avoid security risks Understand and manage licensing risks Veracode Software Composition Analysis (SCA) helps teams qualify and manage risks from software running in their environments, better plan and control

Software 142
article thumbnail

The top 5 most routinely exploited vulnerabilities of 2021

Malwarebytes

A joint Cybersecurity Advisory, coauthored by cybersecurity authorities of the United States (CISA, NSA, and FBI), Australia (ACSC), Canada (CCCS), New Zealand (NZ NCSC), and the United Kingdom (NCSC-UK) has detailed the top 15 Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other CVEs frequently exploited.

Internet 142
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The More You Know: Job Searching & Interviewing

Cisco Security

In the midst of global change and virtual hiring, the landscape of job searching has changed. We sat down (via WebEx) with recruiting leaders, accessibility experts and career changers at Cisco Secure and Duo Security to find out the top 10 ways to make the virtual job search, application and interview process as easeful as possible. Stay tuned for future topics in this series including advice for career changers and environmental aspects to consider for long-term fulfillment at work. 1.

article thumbnail

IAM software: Okta vs Azure Active Directory

Tech Republic Security

Okta and Microsoft Azure Active Directory are both robust and capable IAM solutions. Okta wins out on ease of use and streamlined implementation; Azure Active Directory is best for existing Azure infrastructures where more complex user access permissions are needed. The post IAM software: Okta vs Azure Active Directory appeared first on TechRepublic.

Software 148
article thumbnail

Iran announced to have foiled massive cyberattacks on public services

Security Affairs

State television announced that Iran has foiled massive cyberattacks that targeted public services operated by both government and private organizations. According to the Iran state television, the attack attempts took place in recent days and aimed at the infrastructure of more than 100 public sector agencies. The report did not name entities that were targeted by the cyberattacks.

article thumbnail

CISA adds 7 vulnerabilities to list of bugs exploited in attacks

Bleeping Computer

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added seven vulnerabilities to its list of actively exploited security issues, including those from Microsoft, Linux, and Jenkins. [.].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

10 top anti-phishing tools and services

CSO Magazine

Phishing continues to be one of the primary attack mechanisms for bad actors with a variety of endgames in mind, in large part because phishing attacks are trivial to launch and difficult to fully protect against. Some phishing attacks target customers rather than employees, and others simply aim to damage your corporate reputation rather than compromise your systems.

Phishing 136
article thumbnail

Protect your environment with deception and honeytokens

Tech Republic Security

Trick attackers into exposing themselves when they breach your systems using decoys that are easy to deploy and act like tripwires. The post Protect your environment with deception and honeytokens appeared first on TechRepublic.

148
148
article thumbnail

Threat Detection Software: A Deep Dive

CyberSecurity Insiders

As the threat landscape evolves and multiplies with more advanced attacks than ever, defending against these modern cyber threats is a monumental challenge for almost any. organization. Threat detection is about an organization’s ability to accurately identify threats, be it to. the network, an endpoint, another asset or application – including cloud infrastructure. and assets.

article thumbnail

Ukraine’s postal service prints stamp mocking sunken Russian ship, and gets hit by DDoS attack

Graham Cluley

Someone isn't happy that Ukraine's post office has issued stamps mocking the sunken Russian navy flagship.

DDOS 135
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

‘Crypto Bug of the Year’ Fixed — Update Java NOW

Security Boulevard

A ridiculously dumb flaw in Java’s signature checking code is patched. This isn’t some crufty legacy Sun code, but actual garbage Oracle sloppiness that’s causing IT people to chase their tails yet again. The post ‘Crypto Bug of the Year’ Fixed — Update Java NOW appeared first on Security Boulevard.

IoT 134
article thumbnail

Survey: Recovery from Log4Shell vulnerability is ongoing with 77% of organizations still in patching mode

Tech Republic Security

New research shows that the weakness shattered confidence in cloud defenses and motivated a new set of cybersecurity priorities. The post Survey: Recovery from Log4Shell vulnerability is ongoing with 77% of organizations still in patching mode appeared first on TechRepublic.

article thumbnail

Rogue ads phishing for cryptocurrency: Are you secure?

Malwarebytes

Bad ads are at it again. Rogue Google ads caused no end of misery for cryptocurrency enthusiasts, costing them roughly $4.31 million between the 12th and the 21st of April. This is an astonishing slice of cryptocurrency cash to lose for the sake of clicking on something in a search engine. The bogus links were at the top of results for Terra blockchain projects.

article thumbnail

BlackCat Ransomware gang breached over 60 orgs worldwide

Security Affairs

At least 60 entities worldwide have been breached by BlackCat ransomware, warns a flash report published by the U.S. FBI. The U.S. Federal Bureau of Investigation (FBI) published a flash report that states that at least 60 entities worldwide have been breached by BlackCat ransomware (aka ALPHV and Noberus) since it started its operations in November. “The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with attacks in

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!