Fri.Oct 18, 2024

article thumbnail

Justice Department Indicts Tech CEO for Falsifying Security Certifications

Schneier on Security

The Wall Street Journal is reporting that the CEO of a still unnamed company has been indicted for creating a fake auditing company to falsify security certifications in order to win government business.

article thumbnail

Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach

Krebs on Security

Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being “ USDoD ,” a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI’s InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a significant portion of the U.S. population.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

Many organizations are looking for trusted advisors , and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. Untrusted Advisor by Dall-E via Copilot This perhaps implies that nobody wants to hire an untrusted advisor. But if you think about it, modern LLM-powered chatbots and other GenAI applications are essentially untrusted advisors (RAG and fine-tuning notwithstanding).

article thumbnail

Top 9 Trends In Cybersecurity Careers for 2025

eSecurity Planet

Technologies that were figments of the imagination a dozen years ago, if they were conceived of at all, quickly become mainstream — think generative artificial intelligence (GenAI) or blockchain. As they do, they create more security vulnerabilities and inherent business, changing the nature of cybersecurity careers. According to research by IBM Corp. and the Ponemon Institute, the average security breach cost reached $4.88 million in 2024 — 10% more than the previous year and the highest averag

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

CISOs Concerned Over Growing Demands of Role

Security Boulevard

There are growing concerns among chief information security officers (CISOs) about the evolving demands of their role, with 84% advocating for a split into separate technical and business-focused positions. The Trellix and Vanson Bourne survey of 5,000 CISOs and IT security leaders found that as cybersecurity threats grow more complex and regulatory frameworks expand, there.

CISO 124
article thumbnail

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

The Hacker News

North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks.

More Trending

article thumbnail

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

The Hacker News

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via brute-force attacks.

article thumbnail

Omni Family Health data breach impacts 468,344 individuals

Security Affairs

Omni Family Health disclosed a data breach affecting nearly 470,000 current and former patients and employees. Omni Family Health is a nonprofit organization that provides healthcare services to communities in California, focusing on underserved populations. They offer a range of services, including primary care, dental care, behavioral health, and preventive services.

article thumbnail

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

The Hacker News

Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver infostealers targeting Windows and macOS systems.

Malware 107
article thumbnail

macOS HM Surf flaw in TCC allows bypass Safari privacy settings

Security Affairs

Microsoft disclosed a flaw in the macOS Apple’s Transparency, Consent, and Control (TCC) framework that could allow it to bypass privacy settings and access user data. Microsoft discovered a vulnerability, tracked as CVE-2024-44133 and code-named ‘HM Surf’, in Apple’s Transparency, Consent, and Control (TCC) framework in macOS.

Adware 104
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.

article thumbnail

Who Can Check Your Credit Report?

Identity IQ

Who Can Check Your Credit Report? IdentityIQ The primary purpose of your credit report is to demonstrate your creditworthiness to lenders and creditors. In other words, your credit report can help companies decide whether to approve or deny your loan and credit card applications. But lenders and credit card companies aren’t the only ones that can pull your credit report.

article thumbnail

Can You Fax a Check? Yes. Follow These Steps to Do it Safely

Tech Republic Security

Discover how to legally, securely, and quickly fax a check whether you're using a traditional fax machine or an online faxing service.

Software 100
article thumbnail

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

The Hacker News

Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your data secure in today’s fast-evolving landscape can feel like an impossible challenge. But there’s a game-changing solution: Data Security Posture Management (DSPM).

90
article thumbnail

The Disinformation Warning Coming From the Edge of Europe

WIRED Threat Level

Moldova is facing a tide of disinformation unprecedented in complexity and aggression, the head of a new center meant to combat it tells WIRED. And platforms like Facebook, TikTok, Telegram and YouTube could do more.

Media 93
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Buy 3 months of Xbox Game Pass Ultimate for 28% off with this deal

Zero Day

Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.

Mobile 98
article thumbnail

Microsoft Reveals Loss of Customer Security Logs for a Month

Heimadal Security

Microsoft is alerting business clients to a flaw that resulted in critical logs being partially lost for nearly a month. This puts at risk businesses who depend on this data to identify unwanted activity. Microsoft is alerting enterprise customers that a flaw resulted in important logs being largely lost for nearly a month, endangering businesses […] The post Microsoft Reveals Loss of Customer Security Logs for a Month appeared first on Heimdal Security Blog.

Risk 88
article thumbnail

What the US Army’s 1959 ‘Soldier of Tomorrow’ Got Right About the Future of Warfare

WIRED Threat Level

Sixty-five years ago, the Army's leaders unveiled its “ultimate weapon” for the age of atomic warfare. Here’s how the service’s vision stands up to today's reality.

91
article thumbnail

Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia

SecureList

Last December, we discovered a new group targeting Russian businesses and government agencies with ransomware. Further investigation into this group’s activity suggests a connection to other groups currently targeting Russia. We have seen overlaps not only in indicators of compromise and tools, but also tactics, techniques, and procedures (TTPs).

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Iran-linked actors target critical infrastructure organizations

Security Affairs

U.S. and allies warn of attacks from Iran-linked actors targeting critical infrastructure through brute-force attacks in a year-long campaign. Intelligence and cybersecurity agencies from the U.S., Australia, and Canada, warn about a year-long campaign carried out by Iran-linked threat actors to break into critical infrastructure organizations via brute force and password spraying attacks.

article thumbnail

AI-Generated Personas: Trust and Deception

Security Boulevard

And the Ethical Dilemma of Using AI to Create Fake Online Personalities In recent years, advancements in artificial intelligence (AI) have given rise to powerful tools like StyleGAN and sophisticated language models such as ChatGPT. These technologies can create hyper-realistic images and conversations, blurring the line between authentic human presence and synthetic creations.

article thumbnail

Best Proxies for Bots: Ethical Usage and Top Providers

SecureBlitz

I will show you the best proxies for bots in this post. In today's digital landscape, bots have become increasingly common for various legitimate purposes, such as web scraping, market research, and automated testing. However, choosing the right proxy service is crucial to ensure smooth and efficient bot operations. This comprehensive guide will explore the […] The post Best Proxies for Bots: Ethical Usage and Top Providers appeared first on SecureBlitz Cybersecurity.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 10/18/24

Security Boulevard

Insight #1: Data breach costs are climbing According to IBM’s latest Cost of a Data Breach report , data breach costs have risen 39.4% over the past decade and are now at almost $5 million per breach. We should make sure our cybersecurity insurance falls in line with these numbers. Insight #2: Ditto for open-source nasties in repos According to a new report , the number of malicious packages uploaded to open-source repositories has increased 150% in the last year.

CISO 78
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Hikvision HikCentral Master Lite and Professional Affected by Multi Vulnerabilities

Penetration Testing

Hikvision, a leading provider of AIoT and video surveillance solutions, has disclosed three vulnerabilities affecting its HikCentral Master Lite and HikCentral Professional software. These flaws could allow attackers to execute... The post Hikvision HikCentral Master Lite and Professional Affected by Multi Vulnerabilities appeared first on Cybersecurity News.

article thumbnail

Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!

Security Boulevard

Chris Clements, VP of Solutions Architecture Because of the frequency of phishing attacks landing in user mailboxes and the severity of the consequences of a user falling for a lure, any improvement at all can make the difference between an organization suffering a breach. Detrimental Best Practices One of my biggest pet peeves is compulsory […] The post Is End-User Cybersecurity Training Useless?

article thumbnail

This 4-in-1 keychain charger is my new essential travel accessory

Zero Day

Rolling Square's InCharge XS charges via USB-C, USB-A, and iPhone Lightning in one versatile cable that's small enough to fit on your keychain.

98
article thumbnail

How to Build Cybersecurity Expertise as a Professional

SecureBlitz

Learn how to build cybersecurity expertise as a professional in this post. The cybersecurity landscape is evolving as digital threats become more sophisticated. Current trends emphasize proactive measures, such as artificial intelligence for threat detection. The rise of remote work has expanded the attack surface, making robust security practices essential.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Cybersecurity’s maturity: CompTIA’s State of Cybersecurity 2025 report

CompTIA on Cybersecurity

What does the maturing of cybersecurity look like in today’s tech landscape? Explore what the CompTIA State of Cybersecurity 2025 report has to say.

article thumbnail

Critical Flaw in Synology Camera Firmware Expose Devices to RCE and DoS Attacks

Penetration Testing

Synology has issued a security advisory, Synology-SA-24:17, warning of critical vulnerabilities in several of its camera firmware products, including Synology Camera BC500, TC500, and CC400W. The vulnerabilities, which could allow... The post Critical Flaw in Synology Camera Firmware Expose Devices to RCE and DoS Attacks appeared first on Cybersecurity News.

article thumbnail

Save $20 on an Apple AirTag 4-Pack with this deal

Zero Day

If you're an iPhone user, you could probably use these trackers to monitor your keys, wallet, luggage, and even your young kids, especially with this $20 discount.

98
article thumbnail

Gatekeeper Bypass: Malicious Apps Could Slip Through macOS Defenses

Penetration Testing

A new report from Unit 42 researchers has uncovered significant weaknesses in macOS’s Gatekeeper security mechanism, which could allow malicious applications to bypass Apple’s verification process and execute harmful code... The post Gatekeeper Bypass: Malicious Apps Could Slip Through macOS Defenses appeared first on Cybersecurity News.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.