Sat.Jul 15, 2023 - Fri.Jul 21, 2023

article thumbnail

What’s in the New National Cybersecurity Strategy Implementation Plan

Lohrman on Security

The White House just released the new National Cybersecurity Strategy Implementation Plan. Here are the details, selected media coverage and what you need to know moving forward.

article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

Deepening interoperability of AI-infused systems – in our buildings, transportation grids, communications systems and medical equipment — portend amazing breakthroughs for humankind. Related: The coming of optical infrastructure But first businesses must come to grips with the quickening convergence of their internal and external computing resources.

CISO 244
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kevin Mitnick Died

Schneier on Security

Obituary.

Hacking 242
article thumbnail

Oops! Simple Typo Causes Over 100,000 Sensitive US Military Emails To Be Delivered To Pro-Russia Government Of Mali

Joseph Steinberg

A simple, single-letter typo has caused perhaps as many as several million email messages sent by members of the US Military to be inappropriately delivered to the African country of Mali, an ally of Russia in which contractors from the infamous Russian military contractor, Wagner Group, have been assisting Mali’s armed forces. It appears that for as long as a decade, various users of military email systems sent messages to emails addresses using the top-level domain “.ML,” the domain for

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

Many things have changed since 2018, such as the names of the companies in the Fortune 100 list. But one aspect of that vaunted list that hasn’t shifted much since is that very few of these companies list any security professionals within their top executive ranks. The next time you receive a breach notification letter that invariably says a company you trusted places a top priority on customer security and privacy, consider this: Only four of the Fortune 100 companies currently list a sec

CSO 217
article thumbnail

Weekly Update 357

Troy Hunt

Sad news to wake up to today. Kevin was a friend and as I say in this week's video, probably the most well-known identity in infosec ever, and for good reason. He made a difference, and I have fun memories with him 😊 Felt really sad waking up and seeing “RIP Kevin” in my timeline. I doubt there is a more well known name in our industry but if he’s unfamiliar to you (or you haven’t read this book), go and grab “Ghost in the Wires” which is an

InfoSec 165

More Trending

article thumbnail

Get a Lifetime of Powerful VPN Protection for Your Business Data for Just $70

Tech Republic Security

Make all of your computers and devices safer regardless of operating system with this VPN Unlimited: Lifetime Subscription for just $69.99.

VPN 146
article thumbnail

Future Proofing Tech Investments in Turbulent Times: Real Stories

Jane Frankland

The tech sector is always dynamic, always changing. But now it’s transforming faster and more unpredictably than ever. Given a whole range of PESTLE factors, IT decision makers (ITDMs) from small businesses to enterprises with managed IT environments are under increasing pressure to make smarter investments with their budgets. This includes everything from productivity and cybersecurity to superior computing experiences for employees, who are increasingly collaborating remotely, multitasking, an

article thumbnail

??The Great Google Experiment: Googlers Trapped in an Internet-Free Wonderland

Javvad Malik

The Internet is a treacherous playground, and wouldn’t you know it, Google, the wise old seer of the digital realm, is suggesting that its employees disconnect from the very beast they helped create. Yes, you heard that right, my friends. CNBC’s Jennifer Elias lays it bare for us: Google is embarking on a pilot program where certain employees will find themselves trapped within the confines of internet-free desktop PCs.

Internet 100
article thumbnail

Tracking Down a Suspect through Cell Phone Records

Schneier on Security

Interesting forensics in connection with a serial killer arrest: Investigators went through phone records collected from both midtown Manhattan and the Massapequa Park area of Long Island—two areas connected to a “burner phone” they had tied to the killings. (In court, prosecutors later said the burner phone was identified via an email account used to “solicit and arrange for sexual activity.” The victims had all been Craigslist escorts, according to officials.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Using Snapshots to Improve Data Security

Tech Republic Security

Snapshots are an effective way to improve the security of your data. Learn about different ways to use them to enhance your data security.

144
144
article thumbnail

News Alert: HostingAdvice poll finds one in three Americans hacked upon visiting sketchy websites

The Last Watchdog

Gainesville, Fla., July 18, 2022 – Around 30,000 websites get hacked every day , with the majority of those cyberattacks due to human error. This has projected costs associated with cybercrimes to hit the tens of trillions by 2025, highlighting the vital need for web hosts to implement staunch security. A new study by HostingAdvice, the premier authority on web hosting, found that 32% of Americans say they’ve gotten hacked from visiting a sketchy website and of those, 53% got a computer virus

Hacking 100
article thumbnail

CISA: You've got two weeks to patch Citrix NetScaler vulnerability CVE-2023-3519

Malwarebytes

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical unauthenticated remote code execution (RCE) vulnerability in Citrix NetScaler ADC and Citrix NetScaler Gateway to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate this vulnerability by August 9, 2023 to protect their networks against active threats.

article thumbnail

Disabling Self-Driving Cars with a Traffic Cone

Schneier on Security

You can disable a self-driving car by putting a traffic cone on its hood: The group got the idea for the conings by chance. The person claims a few of them walking together one night saw a cone on the hood of an AV, which appeared disabled. They weren’t sure at the time which came first; perhaps someone had placed the cone on the AV’s hood to signify it was disabled rather than the other way around.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

8 Best Enterprise Password Managers for 2023

Tech Republic Security

This is a comprehensive list of the top enterprise password managers. Use this guide to compare and choose which one is best for your business.

article thumbnail

Azure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports

The Hacker News

The recent attack against Microsoft's email infrastructure by a Chinese nation-state actor referred to as Storm-0558 is said to have a broader scope than previously thought.

article thumbnail

R.I.P. Kevin Mitnick, 1963–2023

Security Boulevard

Kevin is Free: Hackers’ hacker dies, aged 59. The post R.I.P. Kevin Mitnick, 1963–2023 appeared first on Security Boulevard.

article thumbnail

Practice Your Security Prompting Skills

Schneier on Security

Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly restrictive instructions as to how it will answer. It’s a great teaching tool. I am stuck on Level 7. Feel free to give hints and discuss strategy in the comments below. I probably won’t look at them until I’ve cracked the last level.

Passwords 212
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How HealthEdge Deals with Security and Data Privacy in the Face of Rapid Expansion

Tech Republic Security

HealthEdge, a healthcare digital payer platform, shares strategies for combating cyber threats threatening the healthcare industry.

article thumbnail

Experts believe North Korea behind JumpCloud supply chain attack

Security Affairs

SentinelOne researchers attribute the recent supply chain attacks on JumpCloud to North Korea-linked threat actors. JumpCloud is a cloud-based directory service platform designed to manage user identities, devices, and applications in a seamless and secure manner. It allows IT administrators to centralize and simplify their identity and access management tasks across various systems and applications.

article thumbnail

Tame Identity Sprawl: Strategies and solutions

Security Boulevard

How to Tame Identity Sprawl: Strategies and solutions for managing digital identitiesIf your employees use different usernames and passwords for their computers, applications, other systems and accounts, your organization is experiencing identity sprawl. Identity sprawl is a problem that has increased significantly with the rise of identity-related attacks.

article thumbnail

Commentary on the Implementation Plan for the 2023 US National Cybersecurity Strategy

Schneier on Security

The Atlantic Council released a detailed commentary on the White House’s new “Implementation Plan for the 2023 US National Cybersecurity Strategy.” Lots of interesting bits. So far, at least three trends emerge: First, the plan contains a (somewhat) more concrete list of actions than its parent strategy, with useful delineation of lead and supporting agencies, as well as timelines aplenty.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to Protect and Secure Your Data in 10 Ways

Tech Republic Security

Use this comprehensive list of strategies to help you safeguard your company's data from threats and data breaches.

article thumbnail

Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities

The Hacker News

A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage of .NET single-file deployment techniques, enabling threat actors to capture sensitive information from compromised hosts.

Malware 98
article thumbnail

Software Supply Chain Attackers Targeting Banks, Checkmarx Says

Security Boulevard

Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry. The post Software Supply Chain Attackers Targeting Banks, Checkmarx Says appeared first on Security Boulevard.

Banking 98
article thumbnail

CISA warns of attacks against Citrix NetScaler ADC and Gateway Devices

Security Affairs

The US CISA warns of cyber attacks targeting Citrix NetScaler Application Delivery Controller (ADC) and Gateway devices. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warning of cyber attacks against Citrix NetScaler Application Delivery Controller (ADC) and Gateway devices exploiting recently discovered zero-day CVE-2023-3519. The Agency states that threat actors targeted a NetScaler ADC appliance deployed in the network of a critical infrastructure organization.

VPN 98
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

How to Access Your iPhone if You Forget Your Passcode

Tech Republic Security

Learn how to regain control of your device and how to access your iPhone if you forgot the passcode using this comprehensive guide.

Mobile 144
article thumbnail

Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands

The Hacker News

Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies.

article thumbnail

Startups’ Guide to Security Questionnaires

Security Boulevard

For startups looking to win business and build trust with potential clients, a robust security program and effective response to security questionnaires are essential. Whether you’re new to security questionnaires or just need a refresher, we have you covered. With that, let’s get started. What are security questionnaires? Security questionnaires are sets of standardized questions […] The post Startups’ Guide to Security Questionnaires first appeared on TrustCloud.

article thumbnail

Nice Suzuki, sport: shame dealer left your data up for grabs

Security Affairs

Cybernews research team discovered that two Suzuki-authorized dealer websites were leaking customers’ sensitive information. Suzuki or otherwise, buying a new vehicle is an intense experience with complicated credit, insurance, documentation, and contracts. Think of all the data that you leave in a dealership, including the fact that you now own a brand-new car – which itself may be a potential target for criminals.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!