Mon.Jan 08, 2024

article thumbnail

Second Interdisciplinary Workshop on Reimagining Democracy

Schneier on Security

Last month, I convened the Second Interdisciplinary Workshop on Reimagining Democracy ( IWORD 2023 ) at the Harvard Kennedy School Ash Center. As with IWORD 2022 , the goal was to bring together a diverse set of thinkers and practitioners to talk about how democracy might be reimagined for the twenty-first century. My thinking is very broad here. Modern democracy was invented in the mid-eighteenth century, using mid-eighteenth-century technology.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. All four pleaded guilty to conspiracy and racketeering charges. But there is a fascinating and untold backstory behind the two Russian men involved, who co-ran the world’s top spam forum and worked closely with Russia’s most dangerous cybercriminals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Will Copyright Law and Plagiarism Change in the Age of GenAI?

Lohrman on Security

With the modern Internet, it’s easier than ever before to learn from, imitate and even plagiarize other people’s work. So how will new generative AI tools change our media landscape in 2024 and beyond?

Media 201
article thumbnail

Swiss Air Force sensitive files stolen in the hack of Ultra Intelligence & Communications

Security Affairs

Documents belonging to the Swiss Air Force were leaked on the dark web as a result of cyberattack on a US security provider. Documents belonging to the Swiss Air Force were leaked on the dark web after the US security company Ultra Intelligence & Communications suffered a data breach. Ultra Intelligence & Communications provides critical tactical capabilities, including cybersecurity and remote cryptographic management systems for clients including the DoD, FBI, DEA, NATO, AT&T, the

Hacking 144
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

AirTags stalking lawsuit alleges Apple’s negligence in protecting victims

Malwarebytes

Each year, an estimated 13.5 million people in the US are victim to stalking. This is a worrying fact stated in the introduction of a lawsuit against Apple brought by stalking victims who charge that AirTags empowered their abusers. AirTags are marketed as trackers that allow you to easily find lost belongings like keys and luggage. If you lose an object, you can find the AirTag in the Find My app on another Apple device.

article thumbnail

Long-existing Bandook RAT targets Windows machines

Security Affairs

A new variant of the Bandook remote access trojan (RAT) was spotted in attacks aimed at Windows machines. Reseachers from Fortinet observed a new variant of a remote access trojan dubbed Bandook that has been used in phishing attacks against Windows users. Bandook has been active since 2007, it has been continuously developed since then and was employed in several campaigns by different threat actors.

Malware 139

More Trending

article thumbnail

DoJ charged 19 individuals in a transnational cybercrime investigation xDedic Marketplace

Security Affairs

19 individuals worldwide were charged in a transnational cybercrime investigation of the now defunct xDedic marketplace. The U.S. DoJ charged 19 individuals worldwide for their role in the operations of the now-defunct xDedic Marketplace. In January 2019, law enforcement agencies in the US and Europe announced the seizure of the popular xDedic marketplace , an underground market offering for sale access to compromised systems and personally identifiable information.

article thumbnail

Stuxnet: The malware that cost a billion dollars to develop?

Graham Cluley

A report from the Netherlands claims that a Dutch man played a key role in the notorious Stuxnet worm attack against an Iranian nuclear facility, which then accidentally escaped into the wider world.

Malware 128
article thumbnail

SEC Cyber Incident Reporting Rules Pressure IT Security Leaders

Security Boulevard

As the SEC gets tough on businesses' cybersecurity posture, IT security leaders will need to beef up incident response plans. The post SEC Cyber Incident Reporting Rules Pressure IT Security Leaders appeared first on Security Boulevard.

article thumbnail

Listening in at Latimer House. RF emissions and more

Pen Test Partners

Loose lips sink ships, loose tweets sink fleets. Intelligence, espionage, technological advancements and other learnings from our annual company conference at the historic and underappreciated Latimer House. “ Loose lips [might] sink ships ” was a phrase used in UK propaganda posters in WWII. It stressed the need to protect sensitive information and cultivated a culture of silence over military matters.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Linux Kernel Flaw CVE-2024-0193 Opens Root Access

Penetration Testing

A new threat has emerged, casting a shadow over the reliability of the Linux kernel. A recently disclosed security flaw, identified as CVE-2024-0193, poses a significant risk to systems relying on this widely used... The post Linux Kernel Flaw CVE-2024-0193 Opens Root Access appeared first on Penetration Testing.

article thumbnail

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

The Hacker News

Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s equipped to bypass security software and stealthily launch hidden applications.

Media 110
article thumbnail

D3m0n1z3dShell: Advanced Tool for persistence in Linux

Penetration Testing

D3m0n1z3dShell Demonized Shell is an Advanced Tool for persistence in Linux. Demonized Features Auto Generate SSH keypair for all users APT Persistence Crontab Persistence Systemd User level Systemd Root Level Bashrc Persistence Privileged user... The post D3m0n1z3dShell: Advanced Tool for persistence in Linux appeared first on Penetration Testing.

article thumbnail

What Is a Data Governance Policy & How to Write One

Digital Guardian

Having a strong data governance policy can help your organization ensure data accuracy, consistency, and security across your organization but what are the first steps to writing one?

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

VulnRecap 1/8/24 – Ivanti EPM & Attacks on Old Apache Vulnerabilities

eSecurity Planet

The new year brought few new vulnerabilities, and only Ivanti Endpoint Manager (EPM) and Kyber, the quantum resistant encryption algorithm, publicized new vulnerabilities or fixes. Unfortunately, most news derived from the active attacks on multiple older vulnerabilities, which threaten to expose organizations slow to patch. Speed remains critical to security, but more importantly, patching teams need to make progress with patch and vulnerability management.

article thumbnail

Hackers hijack Beirut airport departure and arrival boards

Graham Cluley

On Sunday evening electronic departure boards at Beirut's airport were hijacked by hackers who used them to display anti-Iranian and anti-Hezbollah messages.

107
107
article thumbnail

Securing JavaScript: Best Practices and Common Vulnerabilities

Veracode Security

JavaScript is the most commonly-used programing language, according to the most recent StackOverflow developer survey. While JavaScript offers great flexibility and ease of use, it also introduces security risks that can be exploited by attackers. In this blog, we will explore vulnerabilities in JavaScript, best practices to secure your code, and tools to prevent attacks.

Risk 105
article thumbnail

Post-Quantum-Safe Certificates: Exploring Security in a Post-Quantum World

GlobalSign

In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.

105
105
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

The Hacker News

Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations say their cybersecurity strategy has changed over the past two years.” This stagnation in strategy adaptation can be traced back to several key issues.

Risk 104
article thumbnail

Netgear, Hyundai latest X accounts hacked to push crypto drainers

Bleeping Computer

The official Netgear and Hyundai MEA Twitter/X accounts (together with over 160,000 followers) are the latest hijacked to push scams designed to infect potential victims with cryptocurrency wallet drainer malware. [.

article thumbnail

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

The Hacker News

Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and infrastructure exposed to the internet; this ironically includes security tools, particularly firewalls and VPNs, which give attackers direct network access to execute their attacks.

Firewall 101
article thumbnail

Sexual assault in the metaverse investigated by British police

Graham Cluley

British police say that they are investigating reports that a girl under the age of 16 was sexually assaulted… in an online virtual reality game.

101
101
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Twilio will ditch its Authy desktop 2FA app in August, goes mobile only

Bleeping Computer

The Authy desktop apps for Windows, macOS, and Linux will be discontinued in August 2024, with the company recommending users switch to a mobile version of the two-factor authentication (2FA) app. [.

Mobile 101
article thumbnail

AD-AssessmentKit: comprehensive security audits and network mapping of AD environments

Penetration Testing

AD-AssessmentKit These tools are ideal for network administrators and cybersecurity professionals seeking to assess and enhance the security posture of AD environments and network infrastructures. AD-SecurityAudit.sh It focuses on initial reconnaissance and vulnerability identification... The post AD-AssessmentKit: comprehensive security audits and network mapping of AD environments appeared first on Penetration Testing.

article thumbnail

US mortgage lender loanDepot confirms ransomware attack

Bleeping Computer

​Leading U.S. mortgage lender loanDepot confirmed today that a cyber incident disclosed over the weekend was a ransomware attack that led to data encryption. [.

article thumbnail

Mortgage Firm loanDepot Falls Victim to Cyberattack

SecureWorld News

U.S. mortgage lender loanDepot has fallen victim to a cyberattack, prompting the company to take swift action by temporarily shutting down its IT systems and online payment portals. With approximately 6,000 employees and a loan servicing portfolio exceeding $140 billion, loanDepot is a major nonbank retail mortgage lender in the United States. LoanDepot has confirmed that the cyber incident involved unauthorized third-party access to certain systems, resulting in the encryption of data.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Cyber Alert: FortiGuard Labs Spot Lumma Stealer on YouTube

Penetration Testing

In an era where digital threats lurk behind every click, a new predatory tactic has emerged, blurring the lines between harmless content and cyber threats. FortiGuard Labs recently unveiled a cunning stratagem employed by... The post Cyber Alert: FortiGuard Labs Spot Lumma Stealer on YouTube appeared first on Penetration Testing.

article thumbnail

Capital Health attack claimed by LockBit ransomware, risk of data leak

Bleeping Computer

The Lockbit ransomware operation has claimed responsibility for a November 2023 cyberattack on the Capital Health hospital network and threatens to leak stolen data and negotiation chats by tomorrow. [.

article thumbnail

SentinelOne Unveils: The Hidden Dangers of npm in Business Security

Penetration Testing

In the rapidly evolving digital landscape, software development has become a battleground, with npm (Node Package Manager) sitting at the heart of numerous security challenges. As the default package manager for the JavaScript runtime... The post SentinelOne Unveils: The Hidden Dangers of npm in Business Security appeared first on Penetration Testing.

article thumbnail

E-Commerce Fraud: Navigating the Challenges in Online Retail

SecureBlitz

Want to learn more about e-Commerce fraud? Here, I will talk about navigating the challenges in online retail. In the bustling world of e-commerce, where convenience and accessibility are king, there lurks a shadow that threatens to undermine the integrity of online marketplaces: e-commerce fraud. This form of digital deceit poses a unique set of […] The post E-Commerce Fraud: Navigating the Challenges in Online Retail appeared first on SecureBlitz Cybersecurity.

Retail 88
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.