Sat.Feb 12, 2022 - Fri.Feb 18, 2022

article thumbnail

Welcoming the New Zealand Government to Have I Been Pwned

Troy Hunt

Continuing the march forward to provide governments with better access to their departments' data exposed in breaches , I'm very pleased to welcome the 28th national government onto Have I Been Pwned - New Zealand! They'll join the other govs around the world that have complete free access to breach information impacting their gov domains and TLDs.

article thumbnail

Possible Government Surveillance of the Otter.ai Transcription App

Schneier on Security

A reporter interviews a Uyghur human-rights advocate, and uses the Otter.ai transcription app. The next day, I received an odd note from Otter.ai, the automated transcription app that I had used to record the interview. It read: “Hey Phelim, to help us improve your Otter’s experience, what was the purpose of this particular recording with titled ‘Mustafa Aksu’ created at ‘2021-11-08 11:02:41’?”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Planning for a Nation-State Cyber Attack — Are You Ready?

Lohrman on Security

Some global experts are predicting a significant cyber attack against U.S. and UK critical infrastructure if Russia invades Ukraine. Whether it happens or not, is your organization prepared for this scenario?

article thumbnail

Cyberattack threat: Corporate users infected via Microsoft Teams

Tech Republic Security

Corporate users are more aware of phishing attacks in their mailboxes. Yet they are not used to being targeted via other systems like Microsoft Teams. Learn how to protect yourself. The post Cyberattack threat: Corporate users infected via Microsoft Teams appeared first on TechRepublic.

Phishing 217
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Aeris Adds AI Capability to Secure IoT Platforms

Security Boulevard

Aeris today updated a cloud service that leverages machine learning and other forms of artificial intelligence to secure internet of things (IoT) platforms connected via cellular networks. Hari Nair, senior director of product management at Aeris, said the latest edition of the Intelligent IoT Network also adds an Intelligent Security Center to provide visibility and.

IoT 145
article thumbnail

Secret CIA Data Collection Program

Schneier on Security

Two US Senators claim that the CIA has been running an unregulated — and almost certainly illegal — mass surveillance program on Americans. The senator’s statement. Some declassified information from the CIA. No real details yet.

More Trending

article thumbnail

Cyber threat intelligence is a great way for a company to improve its security

Tech Republic Security

Get to know the ins and outs of cyber threat intelligence and how your company's security can be can be strengthened by putting threat intelligence into place. The post Cyber threat intelligence is a great way for a company to improve its security appeared first on TechRepublic.

article thumbnail

Poor Offboarding Leaves Organizations Open to Threats

Security Boulevard

A lot of talk these days centers around companies leaving money on the table by not maximizing cost savings, but more egregious in today’s risk-filled environment is leaving security on the table. That’s just what organizations are doing by not properly offboarding former employees; giving them plenty of opportunities to breach defenses and conduct malicious.

Risk 144
article thumbnail

Vendors are Fixing Security Flaws Faster

Schneier on Security

Google’s Project Zero is reporting that software vendors are patching their code faster. tl;dr. In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago. In addition to the average now being well below the 90-day deadline, we have also seen a dropoff in vendors missing the deadline (or the additional 14-day grace period).

Software 245
article thumbnail

Shift Left API Security Testing: The Manual API Testing Process

CyberSecurity Insiders

By Matt Tesauro, Noname Security. As the number and complexity of APIs continue to grow, companies face increasing challenges when securing their APIs. The dilemmas facing companies I’ve worked at include: Not enough security team members know how to test APIs. APIs are growing faster than the security team can keep up. Existing security tools do not understand APIs or lack adequate coverage.

Risk 143
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Report: Pretty much every type of cyberattack increased in 2021

Tech Republic Security

The only category to decrease was malware attacks, but SonicWall said in its report that even that number was deceptive. . The post Report: Pretty much every type of cyberattack increased in 2021 appeared first on TechRepublic.

Malware 174
article thumbnail

Threat actors leverage Microsoft Teams to spread malware

Security Affairs

Attackers compromise Microsoft Teams accounts to attach malicious executables to chat and spread them to participants in the conversation. While the popularity of Microsoft Teams continues to grow, with roughly 270 million monthly active users , threat actors started using it as an attack vector. Starting in January 2022, security researchers from Avanan observed attackers compromising Microsoft Teams accounts attach malicious executables to chat and infect participants in the conversation.

Malware 142
article thumbnail

When the insider threat is the Commander in Chief

CSO Magazine

When the insider is the President of the United States, the mishandling and removal of information take on a different demeanor given the national security implications. The U.S. media has widely reported how the National Archives and Records Administration bird-dogged the return of missing presidential records, most recently 15 boxes of presidential papers that should have been directed to the National Archives when President Trump’s term ended on January 20, 2021.

Media 137
article thumbnail

Russia withdraws troops from Ukraine only to lodge cyber war

CyberSecurity Insiders

Russia announced on Tuesday that it is going to withdraw troops from the borders of Ukraine hinting that it is planning negotiations, as war can lead to economic and human loss on both sides. However, just within hours of its announcement, the Putin led nation seems to have launched a hybrid war in the form of cyber attacks on Ukraine as most of the websites, including banks and defense ministry, were down because of a sophisticated digital attack.

Banking 140
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to choose the right data privacy software for your business

Tech Republic Security

Data privacy software can help protect your employees, customers and organization by ensuring data is protected and handled appropriately and securely. Learn how to choose the right options. The post How to choose the right data privacy software for your business appeared first on TechRepublic.

article thumbnail

SQL Injection in Today’s Landscape

Veracode Security

What is SQL injection? A SQL injection flaw allows for an attacker to modify or inject SQL syntax into the request to make the application behave in a manner that was not initially intended. In other words, an attacker can change a database query to: Read sensitive data Modify the database Execute other database functions Break authentication Lead to remote code execution Now with almost all web applications having integrations with databases in some way, this flaw has the potential to arise oft

article thumbnail

Will the Cybersecurity Literacy Act Make a Difference?

Security Boulevard

On this episode of The View With Vizard, Mike Vizard talks with CyberGRX CISO Dave Stapleton about the Cybersecurity Literacy Act, its promise and whether or not it will actually make a difference. The video is below followed by a transcript of the conversation. Michael Vizard: Hey, guys. Thanks for the throw. We’re here with. The post Will the Cybersecurity Literacy Act Make a Difference?

article thumbnail

SIM Swapping Attacks on the Rise- Here’s How to Keep Safe

Identity IQ

SIM Swapping Attacks on the Rise- Here’s How to Keep Safe. IdentityIQ. SIM swapping , also called SIM splitting or hijacking, is a technique employed by online fraudsters to gain access to, seize and control a victim’s phone number and SIM information. They gain access to the victim’s identity and information through their phone company and use the information to conduct theft and other fraudulent activities online.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How to add notes to iCloud passwords in macOS 12.3 and iOS 15.4

Tech Republic Security

Learn how to securely store notes along with your account credentials with iCloud Keychain and sync them to all of your Apple devices. The post How to add notes to iCloud passwords in macOS 12.3 and iOS 15.4 appeared first on TechRepublic.

Passwords 159
article thumbnail

U.S. government warns that sensitive data is being stolen from defence contractors

Graham Cluley

The Federal Bureau of Investigation (FBI), Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) have joined forces to publish a joint warning that Russian hackers have targeted defence contractors to steal sensitive data. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Why IT Admins are Joining the Security Team

Security Boulevard

Today’s decentralized, global workplace has broadened IT’s role within the enterprise. The role of the IT admin now includes direct responsibility for bolstering a company’s security posture. IT admins have become a core part of the security organization, with 34% of Fortune 500 companies rolling the IT department into the CISO’s purview in 2021. In startups.

CISO 131
article thumbnail

Journalist won’t be indicted for hacking for viewing a state website’s HTML

Malwarebytes

A journalist incorrectly branded as a “hacker” by the governor of Missouri won’t be prosecuted “for hacking” This was a quick and foreseen win for St. Louis Post-Dispatch reporter Josh Renaud after a prosecutor from Cole County dismissed Missouri Governor Mike Parson’s criminal charges against him for allegedly hacking a government website by viewing its public HTML code— something anyone can do by simply pressing the F12 button.

Hacking 130
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How to protect yourself against website trackers in Firefox

Tech Republic Security

If you'd like a little more privacy when surfing the web, Firefox offers a few different options to defend yourself against trackers. The post How to protect yourself against website trackers in Firefox appeared first on TechRepublic.

Software 153
article thumbnail

Outage Lasting Hours Makes Canada’s Major Banks Go Offline

Heimadal Security

Five major banks from Canada were impacted by an hours-long outage that got them offline. Online and mobile banking together with customer e-transfer services were blocked during this time. Canadian Online Banking Off for Hours Among the impacted Canadian banks were also BMO (Bank of Montreal), Scotiabank, TD Bank Canada, Royal Bank of Canada (RBC), […].

Banking 128
article thumbnail

The New Realities of Ransomware

Security Boulevard

Alan Shimel and Mike Rothman from Securosis and DisruptOps talk Colonial Pipeline, JBS and all things ransomware. The video is below followed by a transcript of the conversation. Alan Shimel: Hey, everyone. Thanks for joining us on another segment for TechStrong TV. My guest in this segment is the one, the only Mike Rothman. I. The post The New Realities of Ransomware appeared first on Security Boulevard.

article thumbnail

Revenue for Cybersecurity firms in UK increased by 14 percent

CyberSecurity Insiders

Cybersecurity firms in UK have witnessed an increase in revenue by 14% says a survey that involved respondents from the tech sector of Britain. And stats are in that the year 2021 witnessed a 14% increase in the annual revenue earned by the security firms operating in and around United Kingdom taking the tally to £10 Billion. The Department for Digital, Culture, Media & Sport (DCMS) report released recently for the cyber security says the year 2018 witnessed revenue generation of £4 billion

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Metaverse companies faced 60% more attacks last year, and 5 other online fraud statistics

Tech Republic Security

It was a banner year for online fraudsters. Almost every industry saw an attack spike, with online fraud jumping 85% year over year in 2021, says Arkose Labs. The post Metaverse companies faced 60% more attacks last year, and 5 other online fraud statistics appeared first on TechRepublic.

151
151
article thumbnail

SquirrelWaffle Is Using Typosquatting in Latest Campaign

Heimadal Security

SquirrelWaffle is a relatively new malware loader that was first discovered back in September 2021. It works by hijacking an email thread in order to maximize the likelihood that a victim would click on malicious links, so they are hiding inside an email response, in a manner similar to how the highly contagious Emotet virus, […]. The post SquirrelWaffle Is Using Typosquatting in Latest Campaign appeared first on Heimdal Security Blog.

Malware 126
article thumbnail

25 years on, Microsoft makes another stab at stopping macro malware

Graham Cluley

Bravo to Microsoft, because it sounds like they’re doing something to improve the security of Office users. Way back in 1995, Microsoft accidentally shipped a virus on CD ROM. At first Microsoft refused to call it a virus, preferring to call it a “Prank macro,” but WM/Concept as it became known was the first widespread … Continue reading "25 years on, Microsoft makes another stab at stopping macro malware".

Malware 125
article thumbnail

How To Rent A Cheap Car In Various Countries

SecureBlitz

In this article, we will tell you how to rent a car for cheap in different places of our world. Save your time and money to have a great rest! How To Rent A Cheap Car In Various Countries When you are going on vacation, and thinking about renting a vehicle there, it’s important to. The post How To Rent A Cheap Car In Various Countries appeared first on SecureBlitz Cybersecurity.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.