Mon.Nov 20, 2023

article thumbnail

Using Generative AI for Surveillance

Schneier on Security

Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My guess is that it isn’t very good yet, but that it will get better.

article thumbnail

Kaspersky’s Advanced Persistent Threats Predictions for 2024

Tech Republic Security

New botnets, more AI in spearphishing and increases in hack-for-hire business are some of Kaspersky's security predictions. Get extensive APT mitigation tips, too.

Hacking 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records

WIRED Threat Level

A WIRED analysis of leaked police documents verifies that a secretive government program is allowing federal, state, and local law enforcement to access phone records of Americans who are not suspected of a crime.

article thumbnail

DarkCasino joins the list of APT groups exploiting WinRAR zero-day

Security Affairs

The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831. Researchers at cybersecurity firm NSFOCUS analyzed DarkCasino attack pattern exploiting the WinRAR zero-day vulnerability tracked as CVE-2023-38831. The economically motivated APT group used specially crafted archives in phishing attacks against forum users through online trading forum posts. “DarkCasino is an APT threat actor with strong technical and learning ability, who is g

Phishing 145
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Amid Military Buildup, China Deploys Mustang Panda in the Philippines

Dark Reading

China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.

144
144
article thumbnail

Rhysida ransomware gang is auctioning data stolen from the British Library

Security Affairs

The Rhysida ransomware group claimed responsibility for the recent cyberattack on the British Library that has caused a major IT outage. The Rhysida ransomware gang added the British Library to the list of victims on its Tor leak site. The British Library is a research library in London that is the national library of the United Kingdom. It is one of the largest libraries in the world.

More Trending

article thumbnail

US teenager pleads guilty to his role in credential stuffing attack on a betting site

Security Affairs

US teenager Joseph Garrison pleads guilty to carrying out a credential stuffing attack on a betting website. US teenager Joseph Garrison (19) has pleaded guilty to his involvement in a credential stuffing campaign that targeted user accounts at a fantasy sports and betting website.3 On or about November 18, 2022, the man launched a credential stuffing attack on the Betting Website and gained access to approximately 60,000 accounts.

article thumbnail

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

IT Security Guru

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to safeguarding our personal information, the battle against cybercrime is ongoing. In today’s digital era, cybercriminals are becoming more sophisticated and professional in their methods. Hybrid work models and broadly adopted cloud technology create highly dispersed environments that assist bad actors in remaining covered in the shadow

Scams 138
article thumbnail

The Top 5 Reasons to Use an API Management Platform

Security Affairs

Organizations need to govern and control the API ecosystem, this governance is the role of API management. Uber uses APIs (Application Programming Interfaces) to connect with third-party services such as Google Maps and Twilio , which helps to improve the user experience; Salesforce provides APIs that allow developers to build custom applications on top of their platform, which has helped to drive innovation and collaboration; and Stripe provides APIs that enable businesses to accept payments on

article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined! Unsurprisingly, identity continues to be the 'new perimeter' and stolen credentials remain one of the most common attack vectors today.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Understanding the UK government’s new cybersecurity regime, GovAssure

IT Security Guru

With the ever-growing threat of cyberattacks on the UK government and Critical National Infrastructure cyber safety matters more than ever. With the rising tide of ever-resent threat in mind, GovAssure was launched by the UK government in April 2023. It’s a cyber security programme that aims to ensure government IT systems are fully protected from cyberattacks.

article thumbnail

Cybersecurity firm executive pleads guilty to hacking hospitals

Bleeping Computer

The former chief operating officer of a cybersecurity company has pleaded guilty to hacking two hospitals, part of the Gwinnett Medical Center (GMC), in June 2021 to boost his company's business. [.

Hacking 132
article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

It’s that time of year when I begin to look back and reflect. Then, predict and plan. It’s the way I like to do things. I beleive like Winston Churchill did that the farther backward you look, the farther forward you are likely to see. It’s why I developed the IN Focus journal and planner, which you can buy via Amazon, and works on your life as a whole, not purely you career.

article thumbnail

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

The Hacker News

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts.

Malware 129
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Tor Project removes relays because of for-profit, risky activity

Bleeping Computer

The Tor Project has explained its recent decision to remove multiple network relays that represented a threat to the safety and security of all Tor network users. [.

article thumbnail

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

The Hacker News

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms.

Hacking 128
article thumbnail

Quick Glossary: Encryption

Tech Republic Security

The overall success of a business is often dependent on its ability to effectively share, transfer and process vast amounts of data. Much of this shared data is sensitive and must be protected wherever it travels on and outside the enterprise network. The best way to accomplish the important task of securing business data is.

article thumbnail

Kinsing malware exploits Apache ActiveMQ RCE to plant rootkits

Bleeping Computer

The Kinsing malware operator is actively exploiting the CVE-2023-46604 critical vulnerability in the Apache ActiveMQ open-source message broker to compromise Linux systems. [.

Malware 124
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Persistence – Scheduled Task Tampering

Penetration Testing Lab

Windows Task Scheduler enables windows users and administrators to perform automated tasks at specific time intervals.

123
123
article thumbnail

CISA to Provide Cybersecurity Services to Critical Infrastructure Entities

Security Boulevard

The federal government’s top cybersecurity agency wants to become the managed services provider for commercial critical infrastructure entities, which have become an increasing target of cybercriminals. The Cybersecurity and Infrastructure Security Agency (CISA) is piloting a program that will enable such organizations to voluntarily tap into the shared services, support, and security expertise that federal.

article thumbnail

Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions

The Hacker News

The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea. Palo Alto Networks Unit 42 attributed the adversarial collective to three campaigns in August 2023, primarily singling out organizations in the South Pacific.

article thumbnail

Cybersecurity, Legal, and Financial Experts Share Their Reactions to the SEC’s Latest Cyber Disclosure Regulations | Kovrr Blog

Security Boulevard

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Cybersecurity, Legal, and Financial Experts Share Their Reactions to the SEC’s Latest Cyber Disclosure Regulations | Kovrr Blog appeared first on Security Boulevard.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Malware Uses Trigonometry to Track Mouse Strokes

Dark Reading

The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.

Malware 116
article thumbnail

NetSupport RAT Infections on the Rise - Targeting Government and Business Sectors

The Hacker News

Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT.

article thumbnail

Canadian government discloses data breach after contractor hacks

Bleeping Computer

The Canadian government says two of its contractors have been hacked, exposing sensitive information belonging to an undisclosed number of government employees. [.

article thumbnail

CISA Launches Pilot Program to Address Critical Infrastructure Threats

Dark Reading

CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.

115
115
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

What is Endpoint Encryption: Unveiling A Data Security Strategy

Security Boulevard

Understanding Endpoint Encryption: The First Line of Data Defense Today, safeguarding sensitive information has become paramount for businesses of all sizes. At the forefront of this protective shield is endpoint encryption, a critical component in a robust security strategy. But what exactly is endpoint encryption, and how does it function as a cornerstone in safeguarding … What is Endpoint Encryption: Unveiling A Data Security Strategy Read More » The post What is Endpoint Encryption: Unveilin

article thumbnail

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks

The Hacker News

Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan.

Phishing 111
article thumbnail

CyberTalk Series: MSP and MSSP Cybersecurity Compliance Challenges in 2023 and Goals for 2024 with Kimberly Simon

Security Boulevard

Our industry is way more complex than meets the eye. MSPs and MSSPs are not just managing their clients' cybersecurity programs, The post CyberTalk Series: MSP and MSSP Cybersecurity Compliance Challenges in 2023 and Goals for 2024 with Kimberly Simon appeared first on Seceon. The post CyberTalk Series: MSP and MSSP Cybersecurity Compliance Challenges in 2023 and Goals for 2024 with Kimberly Simon appeared first on Security Boulevard.

article thumbnail

Microsoft fixes ‘Something Went Wrong’ Office sign-in errors

Bleeping Computer

Microsoft is rolling out fixes for known Microsoft 365 issues causing 'Something Went Wrong [1001]' sign-in errors and rendering desktop applications unusable for many customers. [.

111
111
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.