Sat.Oct 08, 2022 - Fri.Oct 14, 2022

Best Practices for Hospitals To Manage Risks To CyberSecurity Created By Medical Technology And Information Systems: A Webinar With The CIA’s Former CyberSecurity Director And The Top CyberSecurity Columnist

Joseph Steinberg

What can hospitals learn from an ex-CIA cybersecurity director and a cybersecurity-expert columnist read by millions of people?

Inserting a Backdoor into a Machine-Learning System

Schneier on Security

Interesting research: “ ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks , by Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, and Robert Mullins: Abstract : Early backdoor attacks against machine learning set off an arms race in attack and defence development.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Microsoft Patch Tuesday, October 2022 Edition

Krebs on Security

Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited.

DNS 224

GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them

The Last Watchdog

As digital technologies become more immersive and tightly integrated with our daily lives, so too do the corresponding intrusive attacks on user privacy. Related: The case for regulating facial recognition. Virtual reality (VR) is well positioned to become a natural continuation of this trend.

Risk 152

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

Care and Feeding of the SOC's Most Powerful Tool: Your Brain

Dark Reading

Once overloaded, our brains can't process information effectively, performance decreases, and even the simplest of tasks seem foreign

113
113

Recovering Passwords by Measuring Residual Heat

Schneier on Security

Researchers have used thermal cameras and ML guessing techniques to recover passwords from measuring the residual heat left by fingers on keyboards.

More Trending

To 'See Yourself in Cyber,' Ask: What’s Your Cyber Story?

Lohrman on Security

Cybersecurity professionals can learn from teachers, writers, actors and others who have learned how to tell stories in impactful ways. It's a good lesson to keep in mind for Cybersecurity Awareness Month

Concerns Over Fortinet Flaw Mount; PoC Released, Exploit Activity Grows

Dark Reading

The authentication bypass flaw in FortiOS, FortiProxy and FortiSwitchManager is easy to find and exploit, security experts say

Regulating DAOs

Schneier on Security

In August, the US Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the cryptocurrency platform Tornado Cash, a virtual currency “mixer” designed to make it harder to trace cryptocurrency transactions—and a worldwide favorite money-laundering platform.

New Alchimist attack framework hits Windows, Linux and Mac

Tech Republic Security

The attack framework of probable Chinese origin used by cybercriminals has been discovered. The post New Alchimist attack framework hits Windows, Linux and Mac appeared first on TechRepublic. Apple Microsoft Open source Security linux malware windows

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

New Chinese Malware Attack Framework Targets Windows, macOS, and Linux Systems

The Hacker News

A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild to target Windows, macOS, and Linux systems.

WhatsApp Users Beware: Dangerous Mobile Trojan Being Distributed via Malicious Mod

Dark Reading

Among other things, users who download the app could end up having their WhatsApp account details stolen

Complex Impersonation Story

Schneier on Security

This is a story of one piece of what is probably a complex employment scam.

LEAKED: Intel’s BIOS Source Code — All 6GB of It

Security Boulevard

Source code for the Intel Alder Lake processor EUFI BIOS has gone walkies. 4chan is said to be involved. The post LEAKED: Intel’s BIOS Source Code — All 6GB of It appeared first on Security Boulevard.

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

Indian Energy Company Tata Power's IT Infrastructure Hit By Cyber Attack

The Hacker News

Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a cyberattack. The intrusion on IT infrastructure impacted "some of its IT systems," the company said in a filing with the National Stock Exchange (NSE) of India.

KnowBe4 to Be Acquired for $4.6B by Private Equity Firm Vista

Dark Reading

Vista Equity Partners plans take the publicly traded security-awareness training vendor private

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the World Ethical Data Forum , online, October 26-28, 2022. I’m speaking at the 24th International Information Security Conference in Madrid, Spain, on November 17, 2022. The list is maintained on this page.

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

Hawaii Office of Homeland Security has issued a public statement that it is busy investigating a Ddos attack on its airport websites that disrupted the digital portals for quite a few hours.

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association

In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance

Serious Security: Microsoft Office 365 attacked over feeble encryption

Naked Security

How 2022 is your encryption? Cryptography Microsoft ECB Office Windows

Feature-Rich 'Alchimist' Cyberattack Framework Targets Windows, Mac, Linux Environments

Dark Reading

The comprehensive, multiplatform framework comes loaded with weapons, and it is likely another effort by a China-based threat group to develop an alternative to Cobalt Strike and Sliver

109
109

Cybersecurity News Round-Up: Week of October 10, 2022

Security Boulevard

Australian police secret agents exposed in Colombian data leak, White House to roll out Energy Star-like ratings for IoT, a new data breach at Toyota. The post Cybersecurity News Round-Up: Week of October 10, 2022 appeared first on Security Boulevard. Security Bloggers Network

IoT 98

SingTel confirms another data breach after Optus Cyber Attack

CyberSecurity Insiders

Just within 3 weeks of confirmation, Singapore Telecommunication LTD aka SingTel has confirmed another data breach after Optus Cyber Attack. It has issued a press update saying its Australian company Dialog Pty faced a digital attack last week leaking details of only 20 clients.

Back to the Office: Privacy and Security Solutions to Compliance Issues for 2021 and Beyond

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.

DJI drone tracking data exposed in the US

Security Affairs

Over 80,000 drone IDs were exposed in the leak of a database containing information from airspace monitoring devices manufactured by DJI. Original post at CyberNews: [link].

Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild

Dark Reading

Drone-based cyberattacks to spy on corporate targets are no longer hypothetical, one incident from this summer shows

110
110

Modified WhatsApp App Caught Infecting Android Devices with Malware

The Hacker News

An unofficial version of the popular WhatsApp messaging app called YoWhatsApp has been observed deploying an Android trojan known as Triada. The goal of the malware is to steal the keys that "allow the use of a WhatsApp account without the app," Kaspersky said in a new report. "If

Cisco released Duo Mobile for added Security

CyberSecurity Insiders

To all those searching for 2FA apps, here’s a new product from the stable of Cisco Systems. The networking giant has released an authentication app that works on both Google and iOS platforms and informs its users whenever somebody logs into their account by using their username and password.

Mobile 100

WIP19, a new Chinese APT targets IT Service Providers and Telcos

Security Affairs

Chinese-speaking threat actor, tracked as WIP19, is targeting telecommunications and IT service providers in the Middle East and Asia.

Apple's Constant Battles Against Zero-Day Exploits

Dark Reading

Such exploits sell for up to $10 million, making them the single most valuable commodity in the cybercrime underworld

API Security Primer and Best Practices for 2023

Security Boulevard

An API enables disparate software programs to communicate by allowing external clients to request services from an application. Modern web applications use APIs to share functionality and exchange data. However, by allowing this communication with external components, APIs introduce risks.

WhatsApp Mods are caught distributing malware

CyberSecurity Insiders

Modified versions of WhatsApp are illegal and those still using them should quickly make a note of the following alert.

Experts released PoC exploit code for critical bug CVE-2022-40684 in Fortinet products

Security Affairs

Experts released the PoC exploit code for the authentication bypass flaw CVE-2022-40684 in FortiGate firewalls and FortiProxy web proxies. A proof-of-concept (PoC) exploit code for the authentication bypass vulnerability CVE-2022-40684 (CVSS score: 9.6)

Microsoft 365 Message Encryption Can Leak Sensitive Info

Dark Reading

The default email encryption used in Microsoft Office's cloud version is leaky, which the company acknowledged but said it wouldn't fix