Sat.Dec 17, 2022 - Fri.Dec 23, 2022

article thumbnail

The top cyber security stories of 2022

Security Boulevard

A look in the rearview can tell you a lot about the future, so we revisited the top cyber security stories of 2022 with experts in the field. The post The top cyber security stories of 2022 appeared first on Security Boulevard.

Internet 109
article thumbnail

The Top 23 Security Predictions for 2023 (Part 1)

Lohrman on Security

After a year full of data breaches, ransomware attacks and real-world cyber impacts stemming from Russia’s invasion of Ukraine, what’s next? Here’s part 1 of your annual roundup of security industry forecasts for 2023 and beyond

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Surrender to a Drone

Schneier on Security

The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone: “Seeing the drone in the field of view, make eye contact with it,” the video instructs. Soldiers should then raise their arms and signal they’re ready to follow.

236
236
article thumbnail

Hacked Ring Cams Used to Record Swatting Victims

Krebs on Security

Photo: BrandonKleinPhoto / Shutterstock.com. Two U.S.

Hacking 226
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

On-premises vs cloud security: What are the pros and cons?

Tech Republic Security

Is on-premises or cloud computing operations more secure for your business? Consider the security pros and cons with our guide. The post On-premises vs cloud security: What are the pros and cons? appeared first on TechRepublic.

137
137
article thumbnail

2022 Cyber Review: The Year the Ukraine War Shocked the World

Lohrman on Security

This past year will be remembered as another year of ransomware attacks, data breaches impacting critical infrastructure and, most of all, global cybersecurity impacts from the Russian war with Ukraine

More Trending

article thumbnail

The Equifax Breach Settlement Offer is Real, For Now

Krebs on Security

Millions of people likely just received an email or snail mail notice saying they’re eligible to claim a class action payment in connection with the 2017 megabreach at consumer credit bureau Equifax.

article thumbnail

Google unveils beta of client-side encryption for Gmail

Tech Republic Security

Customers of Google Workspace Enterprise Plus, Education Plus, or Education Standard can apply for the beta until Jan. 20, 2023. The post Google unveils beta of client-side encryption for Gmail appeared first on TechRepublic.

article thumbnail

Weekly Update 326

Troy Hunt

Despite having both my tripod and mic in the wrong suitcase in the wrong place, Scott and I still pulled together a weekly vid from the Norwegian mountains.

187
187
article thumbnail

Hacking the JFK Airport Taxi Dispatch System

Schneier on Security

Two men have been convicted of hacking the taxi dispatch system at the JFK airport. This enabled them to reorder the taxis on the list; they charged taxi drivers $10 to cut the line. Uncategorized air travel hacking transportation

Hacking 185
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

article thumbnail

GUEST ESSAY: Achieving trust — in a tumultuous 2023 that’s likely to come — can lead to success

The Last Watchdog

The 2020s are already tumultuous. Related: The Holy Grail of ‘digital resiliency’ Individuals are experiencing everything from extraordinary political and social upheaval to war on the European continent to the reemergence of infectious diseases to extreme weather events. Against this unsettling backdrop, citizens, consumers, employees, and partners will look to organizations that they trust for stability and positive long-term relationships.

Banking 127
article thumbnail

Ransomware, DDoS see major upsurge led by upstart hacker group

Tech Republic Security

Cyber threat actors Cuba and Royal are driving a 41% boom in ransomware and other attacks hitting industry and consumer goods and services. The post Ransomware, DDoS see major upsurge led by upstart hacker group appeared first on TechRepublic.

DDOS 129
article thumbnail

Business Communication Compromise (BCC) Predictions for 2023

CyberSecurity Insiders

By Steven Spadaccini, VP Threat Intelligence, SafeGuard Cyber. In 2022, cybersecurity further became a top priority for businesses around the world following critical attacks on both the public and private sectors and of course, the use of cyber warfare as a Russian tactic in its invasion of Ukraine.

article thumbnail

Trojaned Windows Installer Targets Ukraine

Schneier on Security

Mandiant is reporting on a trojaned Windows installer that targets Ukrainian users.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

article thumbnail

GUEST ESSAY: ‘Initial access brokers’ — IABs — specialize in enabling surreptitious access

The Last Watchdog

Cybercrime is a big business. And like any other large industry, specialization has emerged. Related: IABs fuel ransomware surge. As data becomes more valuable, criminals can profit more from stealing, selling or holding it for ransom, leading to a massive black market of information. Initial access brokers (IABs) play an increasingly central role in this cyber underworld. IABs specialize in finding vulnerable targets and sell their details to other cybercriminals.

article thumbnail

Cisco Talos report: Threat actors use known Excel vulnerability

Tech Republic Security

The use of.XLL Excel files by threat actors to infect computers with malware is growing fast. Learn more about this relatively new technique and how to protect from it. The post Cisco Talos report: Threat actors use known Excel vulnerability appeared first on TechRepublic.

Malware 126
article thumbnail

Cybersecurity Predictions: 2023 Brings New Threats from Hybrid Working and Economic Downturn

CyberSecurity Insiders

John Stock, Product Manager, Outpost24. With continued challenges from remote and hybrid working, increased economic unrest and geopolitical conflict, and a new gang of teenage hackers , 2022 has certainly thrown cybersecurity professionals some curveballs.

Scams 113
article thumbnail

GitHub Secret Scanning is now Free (as in Beer)

Security Boulevard

Microsoft’s GitHub source control service will help stop devs accidentally embedding secrets in public code repositories. It’s a big problem. The post GitHub Secret Scanning is now Free (as in Beer) appeared first on Security Boulevard.

article thumbnail

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

article thumbnail

Old vulnerabilities in Cisco products actively exploited in the wild

Security Affairs

IT giant Cisco is warning of threat actors exploiting many old vulnerabilities in attacks in the wild. Cisco has updated multiple security advisories to warn of the active exploitation of several old vulnerabilities impacting its products.

Wireless 108
article thumbnail

Study: Consumer security savvy is way behind IoT threat landscape

Tech Republic Security

A new Comcast study hints at a major risk to businesses, governments and public systems due to poor cybersecurity in the booming Internet of Things industry. The post Study: Consumer security savvy is way behind IoT threat landscape appeared first on TechRepublic.

IoT 127
article thumbnail

Few things are certain except cyberattacks: Security predictions for 2023

CyberSecurity Insiders

Darren James, Head of Internal IT, Specops Software. It’s that time of year again, when IT and security experts line up to reflect on the past year and share their industry predictions for what’s to come.

article thumbnail

Why do cyber-attacks increase during holidays?

Security Boulevard

Why do cyber-attacks increase during holidays? Why do cyber-attacks increase during holidays?

article thumbnail

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

ChatGPT, a chatbot developed by OpenAI, is all the rage right now, and is so popular the site continually throws up an overcapacity message. Launched in November of this year, ChatGPT is designed to provide detailed responses and articulate answers across many domains of knowledge.

InfoSec 107
article thumbnail

What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

Tech Republic Security

Microsoft has open sourced its framework for managing open source in software development. The post What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it? appeared first on TechRepublic.

Software 126
article thumbnail

Why Out-of-Scope Assets are Prime Targets for Attackers

CyberSecurity Insiders

By Marcos Lira, Lead Sales Engineer at Halo Security. Nearly 10 years ago, Mark Zuckerberg pivoted away from a phrase he coined : “Move fast and break things.” Silicon Valley is largely still living by that mantra.

article thumbnail

A Robot’s View of AI in Cybersecurity

Security Boulevard

An AI chatbot wrote the following article on AI in cybersecurity. For real. No humans were harmed in the drafting of this article. Artificial intelligence (AI) and machine learning (ML) are rapidly advancing technologies that have the potential to greatly impact cybersecurity.

article thumbnail

North Korea-linked hackers stole $626 million in virtual assets in 2022

Security Affairs

North Korea-linked threat actors have stolen an estimated $1.2 billion worth of cryptocurrency and other virtual assets in the past five years. South Korea’s spy agency, the National Intelligence Service, estimated that North Korea-linked threat actors have stolen an estimated 1.5 trillion won ($1.2

article thumbnail

GitHub offers secret scanning for free

Tech Republic Security

Open source software development service has made it easier for developers using its public repositories to keep coding secrets and tokens close to the chest. The post GitHub offers secret scanning for free appeared first on TechRepublic. Developer Security data breaches github Microsoft

Software 124
article thumbnail

Ukraine defense email systems infected by malware

CyberSecurity Insiders

Ukraine’s war miseries emerging from Russia seem to be never-ending as a compromised email account related to the country’s Ministry of Defense was caught sending phishing emails to users of the Delta Situational awareness program.

Malware 112
article thumbnail

What is Kubernetes Governance?

Security Boulevard

Kubernetes governance is the set of policies and procedures organizations adopt to define how Kubernetes is managed and maintained, and it is an essential part of how enterprises become production-ready at scale.

article thumbnail

A new Zerobot variant spreads by exploiting Apache flaws

Security Affairs

Microsoft spotted an upgraded variant of the Zerobot botnet that spreads by exploiting Apache vulnerabilities.

IoT 105
article thumbnail

The security skills shortage is here, here’s how to prepare

Tech Republic Security

Corporate security is near the top of the list of CIO concerns for 2023 — but a security skills shortfall is also a problem. What can companies do to bring up the slack? The post The security skills shortage is here, here’s how to prepare appeared first on TechRepublic.

122
122