Category: EN

Whistleblowers: Should CISOs Consider Them a Friend or Foe?

Are whistleblowers traitors to the company, a danger to corporate brand image, and a form of insider threat? Or are they an early warning safety valve that can be used to strengthen cybersecurity and compliance? The post Whistleblowers: Should CISOs…

Citrix Bleed: Mass exploitation in progress (CVE-2023-4966)

CVE-2023-4966, aka “Citrix Bleed”, a critical information disclosure vulnerability affecting Citrix NetScaler ADC/Gateway devices, is being massively exploited by threat actors. According to security researcher Kevin Beaumont’s cybersecurity industry sources, one ransomware group has already distributed a Python script to…

Hacking Scandinavian Alcohol Tax

The islands of Åland are an important tax hack: Although Åland is part of the Republic of Finland, it has its own autonomous parliament. In areas where Åland has its own legislation, the group of islands essentially operates as an…

Surveillance Commissioner Blasts Cops for Data Retention

Fraser Sampson says UK police have three million photos of innocent people This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Surveillance Commissioner Blasts Cops for Data Retention

G7 Nations Agree To Voluntary AI Guidelines

G7 nations set to agree to voluntary guidelines on artificial intelligence (AI) as countries continue to work on regulation This article has been indexed from Silicon UK Read the original article: G7 Nations Agree To Voluntary AI Guidelines

Logging Made Easy: Free log management solution from CISA

CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can be downloaded and self-installed for free. CISA’s version reimagines technology developed by the United Kingdom’s National Cyber Security Centre (NCSC),…

6 Common Phishing Attacks and How to Protect Against Them

Phishing is still as large a concern as ever. “If it ain’t broke, don’t fix it,” seems to hold in this tried-and-true attack method. The Verizon 2023 Data Breach Report states that phishing accounted for 44% of social engineering incidents…

HackerOne Exceeds $300m in Bug Bounty Payments

Thirty hackers have earned over one million dollars each This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: HackerOne Exceeds $300m in Bug Bounty Payments

Silicon In Focus Podcast: The Omnichannel Evolves

How has the concept of omnichannel retail evolved over the past few years, and what are the key drivers of this evolution? And what are the primary benefits businesses can expect to achieve as omnichannel strategies evolve? This article has…

Separation of Privilege (SoP) 101: Definition and Best Practices

Separation of privilege is splitting up tasks and assigning rights to different parts of a system. It means that user privileges are segmented between various users and accounts, but you can also apply it to applications, system sub-components, tasks, and processes.…

Google expands bug bounty program to cover AI-related threats

Google has expanded its bug bounty program, aka Vulnerability Rewards Program (VRP), to cover threats that could arise from Google’s generative AI systems. Google’s AI bug bounty program Following the voluntary commitment to the Biden-⁠Harris Administration to develop responsible AI…

Boeing Investigates LockBit Ransomware Breach Claims

Group alleges it stole large volume of sensitive data This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Boeing Investigates LockBit Ransomware Breach Claims

Raven: Open-source CI/CD Pipeline Vulnerability Scanner Tool

Cycode is excited to introduce Raven, a state-of-the-art security scanner for CI/CD pipelines.  Raven stands for Risk Analysis and Vulnerability Enumeration for CI/CD Pipeline Security, and it is now available as an open-source tool on GitHub.  This innovative solution will…

Getting Smart With Cybersecurity: AI Can Help the Good Guys, Too

With the rapid advancement and adoption of artificial intelligence (AI) in cybersecurity, the benefits of speed and accuracy are becoming clearer every day. This article has been indexed from Dark Reading Read the original article: Getting Smart With Cybersecurity: AI…

Securing Modern Enterprises in a Borderless Landscape

CISOs offer recommendations to help secure identities, data, code, and cloud infrastructure and protect against evolving threats and vulnerabilities. This article has been indexed from Dark Reading Read the original article: Securing Modern Enterprises in a Borderless Landscape

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware…

LockBit Ransomware Group Targets Boeing with Data Threat

LockBit, a notorious ransomware gang, has recently set its sights on the aerospace giant Boeing, initiating a double extortion attack and threatening to unveil stolen data on or after November 2, 2023. In a brazen move, the criminal group has…

Finding the right approach to security awareness

As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential and must be a live, evolving process. In this Help Net…

IoT’s convenience comes with cybersecurity challenges

The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity has also given rise to a host of cybersecurity challenges and…

Communication Fort Knox: Tools to Safeguard Your Business

The use of secure communication tools for businesses is becoming ever more important in a digital world. With a variety of encryption, virtual private networks… The post Communication Fort Knox: Tools to Safeguard Your Business appeared first on Security Zap.…

GameSprite – 6,164,643 breached accounts

In December 2019, the now defunct gaming platform GameSprite suffered a data breach that exposed over 6M unique email addresses. The impacted data also included usernames, IP addresses and salted MD5 password hashes. This article has been indexed from Have…

LockBit alleges it boarded Boeing, stole ‘sensitive data’

ALSO: CISA begs for a consistent budget, Las Vegas school breach; Nigeria arrests six cyber princes, the week’s critical vulnerabilities Security In Brief  Notorious ransomware gang LockBit has reportedly exfiltrated “a tremendous amount of sensitive data from aerospace outfit Boeing.……

Toronto Public Library hit by cyber attack

Library says full restoration of IT services may take se This article has been indexed from IT World Canada Read the original article: Toronto Public Library hit by cyber attack

Netsupport Intrusion Results in Domain Compromise

NetSupport Manager is one of the oldest third-party remote access tools still currently on the market with over 33 years of history. This is the first time we will report … Read More The post Netsupport Intrusion Results in Domain…

Email Security in the Remote Work Era

“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In…

8 Essential Windows Security Tips to Protect Your Computer

Windows operating systems and software are complex pieces of software with millions of lines of code. This means that there are many potential vulnerabilities, or flaws, that can be exploited by attackers. Attackers can use vulnerabilities to gain unauthorized access…

Rising Healthcare Cyberattacks: White House Contemplates Response

  Amidst a continuous stream of cyberattacks targeting the healthcare sector, leading to disruptions in hospitals and patient care, the Biden administration is taking a measured approach in formulating regulations to bolster the industry’s cybersecurity defenses. Andrea Palm, Deputy Secretary…

Shadow AI: The Novel, Unseen Threat to Your Company’s Data

  Earlier this year, ChatGPT emerged as the face of generative AI. ChatGPT was designed to help with almost everything, from creating business plans to breaking down complex topics into simple terms. Since then, businesses of all sizes have been…

Achieving Zero-Standing Privileges with Okta and Apono

Organizations are twice as likely to get breached through compromised credentials than any other threat vector. Compromised credentials are when credentials, such as usernames and passwords, are exposed to unauthorized entities.  When lost, stolen or exposed, compromised credentials can give…

Fend Off the Next Phishing Attack With A “Human Firewall.”

Implement the ‘Mindset – Skillset – Toolset’ triad By Dr. Yvonne Bernard, CTO, Hornetsecurity Spear phishing continues to be the most popular cyberattack, and those companies without proper cybersecurity measures […] The post Fend Off the Next Phishing Attack With…

Quishing Emerges as a Leading Cybersecurity Challenge

  Researchers are predicting that cybercriminals will employ email-based quashing attacks as a means of stealing data from users. Several quishing campaigns are known to have been large, long-running, and dynamic, based on attack cadence and variations within the lures…

MemeChat – 4,348,570 breached accounts

In mid-2022, "the ultimate hub of memes" MemeChat suffered a data breach that exposed 7.4M records. Alleged to be due to a misconfigured Elasticsearch instance, the data contained 4.3M unique email addresses alongside usernames. This article has been indexed from…

iLeakage Attack: Protecting Your Digital Security

The iLeakage exploit is a new issue that security researchers have discovered for Apple users. This clever hack may reveal private data, including passwords and emails, and it targets Macs and iPhones. It’s critical to comprehend how this attack operates…

DEF CON 31 – Policy Panel: International Cyber Policy 101

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

Update now! Apple patches a raft of vulnerabilities

Categories: Exploits and vulnerabilities Categories: News Tags: iLeakage Tags: side-channel Tags: Safari Tags: CVE-2023-40413 Tags: CVE-2023-40416 Tags: CVE-2023-40423 Tags: CVE-2023-42487 Tags: CVE-2023-42841 Tags: CVE-2023-41982 Tags: CVE-2023-41997 Tags: CVE-2023-41988 Tags: CVE-2023-40447 Tags: CVE-2023-42852 Tags: CVE-2023-32434 Tags: CVE-2023-41989 Tags: CVE-2023-38403 Tags: CVE-2023-42856…

Rorschach Ransomware Gang Targets Chilean Telecom Giant GTD

  Chile’s Grupo GTD has issued a warning that a hack has disrupted its Infrastructure as a Service (IaaS) infrastructure. Grupo GTD is a telecommunications firm based in Chile, Spain, Columbia, and Peru which offers services throughout Latin America. The…

Passkeys vs Passwords: The Future of Online Authentication

  In the realm of online security, a shift is underway as passkeys gain traction among tech giants like Apple, Google, Microsoft, and Amazon.  These innovative authentication methods offer a more seamless login experience and bolster cybersecurity against threats like…

AI-Generated Phishing Emails: A Growing Threat

The effectiveness of phishing emails created by artificial intelligence (AI) is quickly catching up to that of emails created by humans, according to disturbing new research. With artificial intelligence advancing so quickly, there is concern that there may be a…

October 2023 Web Server Survey

In the October 2023 survey we received responses from 1,093,294,946 sites across 267,962,271 domains and 12,371,536 web-facing computers. This reflects an increase of 8.3 million sites, 13.2 million domains, and 96,682 web-facing computers. The largest gains this month came from…

This Cryptomining Tool Is Stealing Secrets

Plus: Details emerge of a US government social media-scanning tool that flags “derogatory” speech, and researchers find vulnerabilities in the global mobile communications network. This article has been indexed from Security Latest Read the original article: This Cryptomining Tool Is…

Certain online games use dark designs to collect player data

The privacy policies and practices of online games contain dark design patterns which could be deceptive, misleading, or coercive to users, according to a new study. This article has been indexed from Hacking News — ScienceDaily Read the original article:…

SOC Automation Explained: 7 Real-World Examples

The Security Operations Center (SOC) serves as a hub for an organization’s cybersecurity efforts. It is tasked with the responsibility of defending against unauthorized activities in the digital landscape. A SOC specializes in activities including monitoring, detection, analysis, response, and…

Why Smart SOAR is the Best SOAR for Slack

Effective communication is a critical component in incident response, often making the difference between rapid resolution and prolonged impact. This article explores how the integration between Smart SOAR and Slack provides a focused set of automated tasks to improve communication…

10 Tips for Security Awareness Training That Hits the Target

Try these tricks for devising an education program that gets employees invested — and stays with them after the training is over. This article has been indexed from Dark Reading Read the original article: 10 Tips for Security Awareness Training…

ESET APT Activity Report Q2–Q3 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2–Q3 2023

Apple Private Wi-Fi hasn’t worked for the past three years

Not exactly the MAC daddy Three years after Apple introduced a menu setting called Private Wi-Fi Address, a way to spoof network identifiers called MAC addresses, the privacy protection may finally work as advertised, thanks to a software fix.… This…

Protecting your intellectual property and AI models using Confidential Containers

Protecting intellectual property and proprietary artificial intelligence (AI) models has become increasingly important in today’s business landscape. Unauthorized access can have disastrous consequences with respect to competitiveness, compliance and other vital factors, making it essential to implement leading security measures.…

An integrated incident response solution with Microsoft and PwC

Microsoft Incident Response and PwC have announced a new global alliance to expand their joint Incident Response and Recovery capability. In this partnership, Microsoft IR will begin the initial containment and investigation of a cyber incident, while PwC will work…

Lockbit ransomware gang claims to have stolen data from Boeing

The Lockbit ransomware gang claims to have hacked the aerospace manufacturer and defense contractor Boeing and threatened to leak the stolen data. The Boeing Company, commonly known as Boeing, is one of the world’s largest aerospace manufacturers and defense contractors.…

Safari Side-Channel Attack Enables Browser Theft

The “iLeakage” attack affects all recent iPhone, iPad, and MacBook models, allowing attackers to peruse your Gmail inbox, steal your Instagram password, or scrutinize your YouTube history. This article has been indexed from Dark Reading Read the original article: Safari…

Combating retail theft & fraud

The current $100B problem today for retailers? Theft & fraud, see how Cisco can help. This article has been indexed from Cisco Blogs Read the original article: Combating retail theft & fraud

The Importance of Transparency in Protecting Our Networks and Data

Get an understanding of how greater transparency drives better security and the need to normalize transparency. Learn more.        This article has been indexed from Fortinet Industry Trends Blog Read the original article: The Importance of Transparency in Protecting Our…

The Destruction of Gaza’s Internet Is Complete

As Israel increases its ground operation in Gaza, the last remaining internet and mobile connections have gone dark. This article has been indexed from Security Latest Read the original article: The Destruction of Gaza’s Internet Is Complete

The Top 6 Enterprise VPN Solutions to Use in 2023

Enterprise VPNs are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about six viable choices for businesses. This article has been indexed from Security | TechRepublic Read the original…