Fri.Sep 20, 2024

article thumbnail

Clever Social Engineering Attack Using Captchas

Schneier on Security

This is really interesting. It’s a phishing attack targeting GitHub users, tricking them to solve a fake Captcha that actually runs a script that is copied to the command line. Clever.

article thumbnail

HackerOne: Nearly Half of Security Professionals Believe AI Is Risky

Tech Republic Security

The Hacker-Powered Security Report showed mixed feelings toward AI in the security community, with many seeing leaked training data as a threat.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Could Help Resolve IT/OT Integration Security Challenges

Security Boulevard

Security issues stemming from the integration of information technology (IT) and operational technology (OT), could be addressed through artificial intelligence (AI), although the technology could also be leveraged by malicious actors, according to a Cisco study. The post AI Could Help Resolve IT/OT Integration Security Challenges appeared first on Security Boulevard.

article thumbnail

5 Compelling Reasons Not to Manage Your Own VoIP Server

Tech Republic Security

Learn why managing your own VoIP server could be costly and risky. Explore the challenges of remote work, security, and feature limitations.

Software 121
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Google Expands Chrome Security and Privacy Capabilities

Security Boulevard

Google over the past week has taken numerous steps to better Chrome users, including taking new steps toward reducing the use of passwords for authentication and hardening its post-quantum encryption. The post Google Expands Chrome Security and Privacy Capabilities appeared first on Security Boulevard.

article thumbnail

US DoJ charged two men with stealing and laundering $230 Million worth of cryptocurrency

Security Affairs

The US DoJ arrested two people and charged them with stealing and laundering more than $230 million worth of cryptocurrency. The U.S. DoJ arrested two people, Malone Lam (20) (aka “Greavys,” “Anne Hathaway,” and “$$$”) and Jeandiel Serrano (21) (aka “Box,” “VersaceGod,” and “@SkidStar”) in Miami and charged them with stealing more than $230 million worth of cryptocurrency.

More Trending

article thumbnail

Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials

The Hacker News

Law enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform to unlock stolen or lost mobile phones.

Mobile 102
article thumbnail

More Than Two Million Stolen VPN Passwords Discovered

Security Boulevard

More than 2.1 million stolen VPN passwords have been compromised by malware in the past year, highlighting a growing risk for unauthorized access to secure networks, according to a Specops Software report. The post More Than Two Million Stolen VPN Passwords Discovered appeared first on Security Boulevard.

VPN 100
article thumbnail

Iranian APT UNC1860 Linked to MOIS Facilitates Cyber Intrusions in Middle East

The Hacker News

An Iranian advanced persistent threat (APT) threat actor likely affiliated with the Ministry of Intelligence and Security (MOIS) is now acting as an initial access facilitator that provides remote access to target networks.

98
article thumbnail

The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

Security Affairs

Microsoft warns that financially motivated threat actor Vanilla Tempest is using INC ransomware in attacks aimed at the healthcare sector in the U.S. Microsoft Threat Intelligence team revealed that a financially motivated threat actor, tracked as Vanilla Tempest (formerly DEV-0832 ) is using the INC ransomware for the first time to target the U.S. healthcare sector.

article thumbnail

Human-Centered Cyber Security Training: Driving Real Impact on Security Culture

Speaker: Speakers:

In today's digital age, having an untrained workforce can be a significant risk to your business. Cyber threats are evolving; without proper training, your employees could be the weakest link in your defense. This webinar empowers leaders like you with the tools and strategies needed to transform your employees into a robust frontline defense against cyber attacks.

article thumbnail

Passwordless AND Keyless: The Future of (Privileged) Access Management

The Hacker News

In IT environments, some secrets are managed well and some fly under the radar. Here’s a quick checklist of what kinds of secrets companies typically manage, including one type they should manage: Passwords [x] TLS certificates [x] Accounts [x] SSH keys ??? The secrets listed above are typically secured with privileged access management (PAM) solutions or similar.

article thumbnail

U.S. CISA adds new Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti Cloud Services Appliance Vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Ivanti Cloud Services Appliance a path traversal vulnerability CVE-2024-8190 (CVSS score of 9.4) to its Known Exploited Vulnerabilities (KEV) catalog.

article thumbnail

FTC finds social media and video streaming services engaged in vast surveillance of consumers

Malwarebytes

The US Federal Trade Commission (FTC) released a report that examines the data collection and use practices of major social media and video streaming services, finding that—and this will not come as a surprise to our regular readers—the companies engaged in vast surveillance of consumers in order to monetize their personal information while failing to adequately protect users online, especially children and teens.

article thumbnail

Ukraine bans Telegram for government agencies, military, and critical infrastructure

Security Affairs

Ukraine’s NCCC banned the Telegram app for government agencies, military, and critical infrastructure, due to national security concerns. Ukraine’s National Coordination Centre for Cybersecurity (NCCC) has banned the Telegram messaging app on government agencies, military, and critical infrastructure, due to national security concerns. The ban does not affect Ukrainian citizens.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Customer Story | Lanett City Schools Works Smarter With The Help Of Cloud Monitor

Security Boulevard

Since its inception in 1898, Lanett City Schools has committed itself to providing a supportive, rigorous, and high-quality education to the Chambers County community. Nestled in southeastern Alabama, it’s home to roughly 950 students and 140 staff members — bus drivers and lunchroom workers included. “Our elementary school is our largest campus,” said Whittany Nolen, The post Customer Story | Lanett City Schools Works Smarter With The Help Of Cloud Monitor appeared first on ManagedMethods

article thumbnail

iPhone 16 Pro: Upgrading from iPhone 13 Pro or earlier? Your list of new features is impressive

Zero Day

The average iPhone upgrader has at least a 3 year-old phone. If you're coming from an iPhone 13 Pro or earlier, here's your list of upgrades for 2024.

88
article thumbnail

Cyber threats against critical infrastructure heighten demand for skilled professionals

CompTIA on Cybersecurity

The critical infrastructure that runs our day to day life is prone to cyber attacks now more than ever. Delve into the details and the skills today’s cybersecurity professionals need to know. Explore training solutions that can help prepare you for tomorrow’s threats.

article thumbnail

How API Security Fits into DORA Compliance: Everything You Need to Know

Security Boulevard

Discover how API security is crucial in meeting DORA compliance by securing data transmission, managing third-party risks, enforcing governance. The post How API Security Fits into DORA Compliance: Everything You Need to Know appeared first on Security Boulevard.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Cencora’s $75 Million Ransom: A New High in Cyber Extortion

Penetration Testing

The American pharmaceutical giant Cencora has made the largest known ransom payment in history, shelling out a staggering $75 million in Bitcoin to cybercriminals following a devastating February attack. This... The post Cencora’s $75 Million Ransom: A New High in Cyber Extortion appeared first on Cybersecurity News.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 09/20/24

Security Boulevard

Insight #1: Don't shrug off this internet plague! Cross-site scripting (XSS) is the overlooked vulnerability plaguing the web. As Contrast’s recent attack data show , it's everywhere, yet it’s often dismissed as “'low risk.” The truth? This prevalence makes XSS more of a threat, and it's easily exploited. Fortunately, Application Detection and Response (ADR ) is here to help you stop it!

CISO 67
article thumbnail

5 Linux commands I use to keep my device running smoothly

Zero Day

Knowing what's going on under the hood of your Linux OS is essential for optimizing performance. These commands will give you insight into system resources and processes.

87
article thumbnail

macOS Sequoia Update Disrupts Major Cybersecurity Tools

Penetration Testing

Apple’s latest operating system release, macOS Sequoia, has been causing unexpected headaches for cybersecurity professionals and everyday users alike. The update has disrupted the functionality of several major security tools,... The post macOS Sequoia Update Disrupts Major Cybersecurity Tools appeared first on Cybersecurity News.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Buy a Microsoft Office 2019 license for Windows or Mac for $25

Zero Day

This deal gets you a lifetime license to Microsoft Office 2019 for Windows or Mac and access to Microsoft Word, Excel, PowerPoint, and more for 89% off.

92
article thumbnail

Chicago API Security Summit 2024

Security Boulevard

Thank You Chicago! Earlier this week we had the pleasure of hosting a regional API Security Summit in Chicago (well, actually in Lombard). These summits bring together the local cybersecurity community for half-day of API Security-focused content, including expert speakers and panelists. While this isn’t the first time we’ve organized an event like this, it [.

article thumbnail

Synergizing Cybersecurity: The Benefits of Technology Alliances

Cisco Security

There are many integrations made available by Cisco Security and their tech partners, improving cybersecurity posture and defenses of mutual customers. There are many integrations made available by Cisco Security and their tech partners, improving cybersecurity posture and defenses of mutual customers.

article thumbnail

USENIX NSDI ’24 – Revisiting Congestion Control for Lossless Ethernet

Security Boulevard

Authors/Presenters:Yiran Zhang, Qingkai Meng, Chaolei Hu, Fengyuan Ren Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara ; and via the organizations YouTube channel.

62
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Critical Security Flaws in Camaleon CMS Put Web Servers at Risk – Users Urged to Upgrade Immediately

Penetration Testing

In a significant development for website owners and administrators using Camaleon CMS, a critical security update has been released to address several vulnerabilities, some of which are already being exploited... The post Critical Security Flaws in Camaleon CMS Put Web Servers at Risk – Users Urged to Upgrade Immediately appeared first on Cybersecurity News.

Risk 61
article thumbnail

USENIX NSDI ’24 – Pudica: Toward Near-Zero Queuing Delay in Congestion Control for Cloud Gaming

Security Boulevard

Authors/Presenters:Shibo Wang, Shusen Yang, Xiao Kong, Chenglei Wu, Longwei Jiang, Chenren Xu, Cong Zhao, Xuesong Yang, Jianjun Xiao, Xin Liu, Changxi Zheng, Jing Wang, Honghao Liu Our sincere thanks to USENIX , and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center.

62
article thumbnail

Upgrading to MacOS Sequoia? Here's why you may want to hold off

Zero Day

The new version of Apple's MacOS is breaking the functionality of security products from Microsoft, CrowdStrike, SentinelOne, and other vendors. But that's not all.

71
article thumbnail

Behavioral Baselining and its Critical Role in Cybersecurity

Security Boulevard

Defining “normal” and taking the first step in next-gen threat detection Organizations face an increasing array of threats, from sophisticated malware to insider threats. Behavioral baselining helps companies safeguard sensitive data and maintain robust security postures by clearly defining what “regular” looks like. Let’s dive into what behavioral baselining is, and why it’s critical for.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.