Sat.Feb 18, 2023 - Fri.Feb 24, 2023

article thumbnail

Cyberwar Lessons from the War in Ukraine

Schneier on Security

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “ The Cyber Defense Assistance Imperative ­ Lessons from Ukraine.” ” Its conclusion: Cyber defense assistance in Ukraine is working.

article thumbnail

Down the Cloudflare / Stripe / OWASP Rabbit Hole: A Tale of 6 Rabbits Deep ? ? ? ? ? ?

Troy Hunt

Firewall 335
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies , which offers paying customers the ability to route their web traffic anonymously through compromised computers.

Web Fraud 226
article thumbnail

IBM: Most ransomware blocked last year, but cyberattacks are moving faster

Tech Republic Security

A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters. The post IBM: Most ransomware blocked last year, but cyberattacks are moving faster appeared first on TechRepublic.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

This exclusive webinar with William Hord, Senior VP of Risk & Professional Services, will explore the foundational elements you need to start or validate your ERM program. He will also dive into topic definitions, governance structures, and framework components for success.

article thumbnail

Putting Undetectable Backdoors in Machine Learning Models

Schneier on Security

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider.

357
357
article thumbnail

After Corporate Tech Layoffs, Can Governments Benefit?

Lohrman on Security

Almost every day, online media sources proclaim new layoffs for tech workers. So how are federal, state and local governments trying to attract these talented pros now

More Trending

article thumbnail

Report: Stress will drive a quarter of cyber defenders out the door

Tech Republic Security

There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills. The post Report: Stress will drive a quarter of cyber defenders out the door appeared first on TechRepublic.

article thumbnail

The Insecurity of Photo Cropping

Schneier on Security

The Intercept has a long article on the insecurity of photo cropping: One of the hazards lies in the fact that, for some of the programs, downstream crop reversals are possible for viewers or readers of the document, not just the file’s creators or editors.

225
225
article thumbnail

AUTHOR Q&A: China’s spy balloons reflect a cyber warfare strategy America must counter

The Last Watchdog

The attack surface of company networks is as expansive and porous as ever. Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. This is a well-reasoned treatise collaboratively assembled by board members of the Internet Security Alliance ( ISA.) Laid out in two parts, Fixing American Cybersecurity dissects the drivers that got us here and spells out explicitly what’s at stake.

Marketing 144
article thumbnail

How to Create a GDPR Data Protection Policy

Security Boulevard

In this blog, we will discuss what GDPR compliance entails and provide tips on how to create an effective GDPR data protection policy. The post How to Create a GDPR Data Protection Policy appeared first on Scytale.

Risk 145
article thumbnail

The Power of Storytelling in Risk Management

Speaker: Dr. Karen Hardy, CEO and Chief Risk Officer of Strategic Leadership Advisors LLC

Join this exclusive webinar with Dr. Karen Hardy, where she will explore the power of storytelling in risk communication as a core component of a resilient organization's management framework!

article thumbnail

Digital forensics and incident response: The most common DFIR incidents

Tech Republic Security

A new State of Enterprise DFIR survey covers findings related to automation, hiring, data and regulations and more. The post Digital forensics and incident response: The most common DFIR incidents appeared first on TechRepublic. CXO Security cybersecurity digital forensics incident response

article thumbnail

Fines as a Security System

Schneier on Security

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company’s in-app feature that lets you know if any nearby Tiles are following you.

article thumbnail

'New Class of Bugs' in Apple Devices Opens the Door to Complete Takeover

Dark Reading

With the right kind of exploit, there's hardly any function, app, or bit of data an attacker couldn't access on your Mac, iPad, or iPhone

140
140
article thumbnail

Innovation at the Expense of Cybersecurity? No More!

Security Boulevard

Earlier this month, Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security signaled a major shift in the federal government’s approach to cybersecurity risk and responsibility.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

DLL sideloading and CVE attacks show diversity of threat landscape

Tech Republic Security

Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software. The post DLL sideloading and CVE attacks show diversity of threat landscape appeared first on TechRepublic.

Media 158
article thumbnail

Google confirms Russian cyber-attacks on Ukraine

CyberSecurity Insiders

After two days in this month, the war between Ukraine and Russian will enter its second year after completing one full year. And to make things worse, the Putin led nation is also found launching digital attacks simultaneously on the critical infrastructure of Ukraine for the past six months.

article thumbnail

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

Dark Reading

At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain

Software 134
article thumbnail

Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked

Security Boulevard

Sensitive military data found on unprotected Microsoft Azure server. Defense Department email store left insecure for at least 11 days. The post Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked appeared first on Security Boulevard.

Passwords 144
article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

How to expand your search sources

Tech Republic Security

Explore search services beyond Google and Bing for a wider range of results, customization and privacy options. The post How to expand your search sources appeared first on TechRepublic. Security Software bing brave browser duckduckgo Google metager search engine tor

article thumbnail

Governance of Zero Trust in manufacturing

CyberSecurity Insiders

Manufacturers are some of the most ambitious firms on the planet when it comes to harnessing the power of edge technology to modernize their businesses.

article thumbnail

Scammers Mimic ChatGPT to Steal Business Credentials

Dark Reading

Hackers will take anything newsworthy and turn it against you, including the world's most advanced AI-enabled chatbot

130
130
article thumbnail

GoDaddy Hosting Hacked — for FOURTH Time in 4 Years

Security Boulevard

GoDaddy’s web hosting service breached yet again. This time, the perps were redirecting legit websites to malware. The post GoDaddy Hosting Hacked — for FOURTH Time in 4 Years appeared first on Security Boulevard.

Hacking 143
article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

GUEST ESSAY: Too many SMBs continue to pay ransomware crooks — exacerbating the problem

The Last Watchdog

Well-placed malware can cause crippling losses – especially for small and mid-sized businesses. Related: Threat detection for SMBs improves Not only do cyberattacks cost SMBs money, but the damage to a brand’s reputation can also hurt growth and trigger the loss of current customers. One report showed ransomware attacks increased by 80 percent in 2022, with manufacturing being one of the most targeted industries.

Backups 122
article thumbnail

Cyber Attack news trending on Google

CyberSecurity Insiders

First is the news related to China. However, this time it’s different and is interesting. To go on with, all these days we have N number of stories about Chinese hackers infiltrating networks across the world.

article thumbnail

TikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount

Dark Reading

Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security

article thumbnail

Strategic Threat Intelligence: The Definitive Guide

Security Boulevard

Modern technology has created a world where threat actors are continuously adapting new tools and techniques with the main goal of stealing data from companies. In today’s digital age, traditional defensive security measures are no longer effective at protecting business assets appropriately.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

S3 Ep123: Crypto company compromise kerfuffle [Audio + Text]

Naked Security

Latest episode - listen now! Top-notch advice for cybersecurity, both at work and at home. Cryptocurrency Data loss Podcast Privacy 2FA Coinbase crypto cryptocurrency Cybercrime GoDaddy malware Naked Security Podcast Twitter

article thumbnail

Microsoft ChatGPT has the potential to replace white-collar jobs says IBM Chief

CyberSecurity Insiders

IBM Chief felt ChatGPT, an OpenAI developed a platform of Microsoft, has the potential to replace white-collar jobs such as insurance consultants, lawyers, accountants, computer programmers and admin roles.

article thumbnail

Tackling Software Supply Chain Issues With CNAPP

Dark Reading

The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain

Software 118
article thumbnail

Debunking Three Common Threat Modeling Myths

Security Boulevard

The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to an organization’s system, but it also creates a framework for informed decision-making, ensuring the best use of limited resources.

Risk 126
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.