Mon.Nov 27, 2023

article thumbnail

Secret White House Warrantless Surveillance Program

Schneier on Security

There seems to be no end to warrantless surveillance : According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected of any crime, including victims.

article thumbnail

GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

The Last Watchdog

In cybersecurity, keeping digital threats at bay is a top priority. A new ally in this battle is robotic process automation (RPA.) This technology promises to simplify tasks, boost accuracy and quicken responses. Related: Gen-A’s impact on DevSecOps Robotic process automation is about getting repetitive, rule-based tasks done with the help of software robots , often called “bots.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Drive users angry over losing months of stored data

Bleeping Computer

Google Drive users are reporting that recent files stored in the cloud have suddenly disappeared, with the cloud service reverting to a storage snapshot as it was around April-May 2023. [.

145
145
article thumbnail

Keep Web Traffic Streamlined and Safe With This $29.99 DNS

Tech Republic Security

With AdGuard DNS, you can block ads, customize parental controls and keep tabs on DNS requests coming in or out — all for the lowest price on the web.

DNS 135
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

You Don’t Need to Turn Off Apple’s NameDrop Feature in iOS 17

WIRED Threat Level

Yes, your iPhone automatically turns on NameDrop with the latest software update. But you shouldn’t really be worried about it—regardless of what the police are saying.

Software 136
article thumbnail

Security is an Economically Resilient Market: Strategies for Uncertain Times

Security Boulevard

Even in uncertain economic conditions, the need for safety and security create opportunities for security providers to grow. The post Security is an Economically Resilient Market: Strategies for Uncertain Times appeared first on Security Boulevard.

Marketing 128

More Trending

article thumbnail

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

We Live Security

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

Scams 124
article thumbnail

Meta Sued for Ignoring its Underage Kids Problem (Because Money)

Security Boulevard

Don’t be square: Newly-unsealed COPPA suit says Zuck’s mob knows full well there are loads of users under the age of 13, but did nothing. The post Meta Sued for Ignoring its Underage Kids Problem (Because Money) appeared first on Security Boulevard.

article thumbnail

Microsoft deprecates Defender Application Guard for Office

Bleeping Computer

Microsoft is deprecating Defender Application Guard for Office and the Windows Security Isolation APIs, and it recommends Defender for Endpoint attack surface reduction rules, Protected View, and Windows Defender Application Control as an alternative. [.

121
121
article thumbnail

Section 702 Surveillance Reauthorization May Get Slipped Into ‘Must-Pass’ NDAA

WIRED Threat Level

Congressional leaders are discussing ways to reauthorize Section 702 surveillance, including by attaching it to the National Defense Authorization Act, Capitol Hill sources tell WIRED.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

Security Boulevard

In cybersecurity, keeping digital threats at bay is a top priority. A new ally in this battle is robotic process automation (RPA.) This technology promises to simplify tasks, boost accuracy and quicken responses. Related: Gen-A’s impact on DevSecOps Robotic process … (more…) The post GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity appeared first on Security Boulevard.

article thumbnail

What You Need to Know About Apple’s NameDrop iOS17 Feature

Identity IQ

What You Need to Know About Apple’s NameDrop iOS17 Feature IdentityIQ Apple’s recent iOS17 update introduced NameDrop, enabling users to exchange contact information quickly and easily. While this feature offers unmatched convenience, it also has raised some safety concerns. Here is what you need to know about Apple’s NameDrop iOS17 feature.

Scams 111
article thumbnail

Small Business Cybersecurity Hampered by Fear of Change, Judgement

Security Boulevard

Fear of making mistakes or being judged by colleagues keep SMBs from changing their cybersecurity behaviors, according to a Kaspersky survey. The post Small Business Cybersecurity Hampered by Fear of Change, Judgement appeared first on Security Boulevard.

article thumbnail

How to Protect Your Product Design: IP Law & Security Tools

Digital Guardian

For many companies, patents, trademarks, and designs can be priceless, meaning if jeopardized, they could have far-ranging repercussions for owners. Protecting that IP is critical.

105
105
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Guide to the IIoT Security [Industrial Internet of Things]

Security Boulevard

Often called the ‘industrial internet’ or ‘industry 4.0,’ specialists anticipate that IIoT security will play a significant role in the fourth industrial revolution. In the face of narrowing profit margins, escalating inflation, and fiercer competition than ever before, businesses are embracing digital transformation as a vital strategy to stay competitive in today’s dynamic market.

Internet 110
article thumbnail

General Electric, DARPA Hack Claims Raise National Security Concerns

Dark Reading

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

Hacking 122
article thumbnail

Qualified Trust Seals - How Do They Compare to Other Electronic Seals?

GlobalSign

Let’s compare Qualified Trust Seals to other types of electronic seals and why they are important in the evolving document authentication landscape?

article thumbnail

Rethinking shift left: How a lack of context creates unnecessary friction between AppSec and Developers

Security Boulevard

Shift Left… it’s a term used almost ubiquitously across application security by both security practitioners implementing programs, regardless of scale, as well as just about every vendor selling an application security solution. The idea that it’s faster, cheaper, and often easier to fix a security flaw when the code is being created (as opposed to later in the software development lifecycle (SDLC)) is widely accepted within the AppSec community.

Software 105
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Ukraine says it hacked Russian aviation agency, leaks data

Bleeping Computer

Ukraine's intelligence service, operating under the Defense Ministry, claims they hacked Russia's Federal Air Transport Agency, 'Rosaviatsia,' to expose a purported collapse of Russia's aviation sector. [.

Hacking 104
article thumbnail

Why IT teams should champion AI in the workplace, and deploy secure AI tools safely to their teams

Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at Glide. Thanks to the great team there for their support! AI technology is quickly finding it’s footing in the workplace. IT teams need to lead the charge on AI adoption at their companies to ensure it happens safely, securely, and successfully.

article thumbnail

Healthcare giant Henry Schein hit twice by BlackCat ransomware

Bleeping Computer

American healthcare company Henry Schein has reported a second cyberattack this month by the BlackCat/ALPHV ransomware gang, who also breached their network in October. [.

article thumbnail

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Dark Reading

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Slovenia's largest power provider HSE hit by ransomware attack

Bleeping Computer

Slovenian power company Holding Slovenske Elektrarne (HSE) has suffered a ransomware attack that compromised its systems and encrypted files, yet the company says the incident did not disrupt electric power production. [.

article thumbnail

How better key management can close cloud security gaps troubling US government (Part 1 of 2)

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government (Part 1 of 2) sparsh Tue, 11/28/2023 - 05:20 Bruce Schneier recently blogged : A bunch of networks, including US Government networks , have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key.

article thumbnail

Ardent hospital ERs disrupted in 6 states after ransomware attack

Bleeping Computer

Ardent Health Services, a healthcare provider operating 30 hospitals across five U.S. states, disclosed today that its systems were hit by a ransomware attack on Thursday. [.

article thumbnail

Tracking the Trackers: For Better or Worse

SecureWorld News

Ever since the first GPS (Global Positioning Satellites) systems went live back in the early nineties, privacy experts have warned us about our diminishing rights. And while we have gained both safety and security as a result of this ability to globally track people and things, we seemed to have lost our true sense of privacy. I’ve been inventing devices that track these trackers for decades, mostly in an effort to assist law enforcement from becoming the victims of tracking themselves, and here

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Ransomware attack on indie game maker wiped all player accounts

Bleeping Computer

A ransomware attack on the "Ethyrial: Echoes of Yore" MMORPG last Friday destroyed 17,000 player accounts, deleting their in-game items and progress in the game. [.

article thumbnail

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

The Hacker News

A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys from a vulnerable SSH server by observing when naturally occurring computational faults that occur while the connection is being established. The Secure Shell (SSH) protocol is a method for securely transmitting commands and logging in to a computer over an unsecured network.

95
article thumbnail

Arachnophobic: How Duo Customers Can Respond to CISA’s Report on Scattered Spider

Duo's Security Blog

CISA recently published a report on Scattered Spider , a threat actor that has been increasingly active and impactful over the past year. The report is important reading for any security practitioner because, in addition to being a threat in and of itself, Scattered Spider has been a leading indicator showing how threat actors pivot into new techniques.

article thumbnail

N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection

The Hacker News

The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching" different elements of the two disparate attack chains, leveraging RustBucket droppers to deliver KANDYKORN. The findings come from cybersecurity firm SentinelOne, which also tied a third macOS-specific malware called ObjCShellz to the RustBucket campaign.

Malware 94
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.