Credit-reporting giant disagrees with FTC, will hand over the pocket change to make Feds go away Experian has agreed to cough up $650,000 after being accused of spamming people with no opt-out button.… This article has been indexed from The…
IT Security News Daily Summary 2023-08-22
Adobe Patches Critical Deserialization Vulnerability, but Exploits Persist Absolute Dental Services Notifies Patients of Data Security Incident Forescout Joins MISA and Announces Integration With Microsoft Sentinel Proposed UN Cybercrime Treaty Threatens to be an Expansive Global Surveillance Pact Ivanti issues…
Adobe Patches Critical Deserialization Vulnerability, but Exploits Persist
The vulnerability was being exploited in the wild, targeting two versions of Adobe ColdFusion. This article has been indexed from Dark Reading Read the original article: Adobe Patches Critical Deserialization Vulnerability, but Exploits Persist
Absolute Dental Services Notifies Patients of Data Security Incident
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Absolute Dental Services Notifies Patients of Data Security Incident
Forescout Joins MISA and Announces Integration With Microsoft Sentinel
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Forescout Joins MISA and Announces Integration With Microsoft Sentinel
Proposed UN Cybercrime Treaty Threatens to be an Expansive Global Surveillance Pact
This is Part V in EFF’s ongoing series about the proposed UN Cybercrime Convention. Read Part I for a quick snapshot of the ins and outs of the zero draft; Part II for a deep dive on Chapter IV dealing…
Ivanti issues fix for third zero-day flaw exploited in the wild
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: Ivanti issues fix for third zero-day flaw…
Controversial Cybercrime Law Passes in Jordan
The increase in cyberattacks against the Middle East in the last few years has pressured Jordan and other nations to better secure their infrastructures. This article has been indexed from Dark Reading Read the original article: Controversial Cybercrime Law Passes…
Fleeceware drains money from account slowly over time – here’s how to spot it
If you’re anything like me, every few days you look at your credit card or bank transactions on your mobile and scroll through just to see if anything unusual jumps out at you. And more often than not, there’s nothing…
Lawmakers Blast Facebook For Still Allowing Sale Of Deadly Recalled Product
The post Lawmakers Blast Facebook For Still Allowing Sale Of Deadly Recalled Product appeared first on Facecrooks. Since last year, the Consumer Product Safety Commission (CPSC) has sent Facebook thousands of requests to remove Marketplace listings for a recalled product…
EFF Benefit Poker Tournament at DEF CON 31
August marked the return of DEF CON, the world’s largest computer hacking conference. That means it was also the return of the EFF Benefit Poker Tournament, an official DC31 Contest hosted by security expert and EFF advisory board member Tarah…
Luna Grabber Malware Hits Roblox Devs Through npm Packages
By Habiba Rashid The campaign, which began at the start of August 2023, revolves around malicious packages impersonating the legitimate noblox.js,… This is a post from HackRead.com Read the original post: Luna Grabber Malware Hits Roblox Devs Through npm Packages…
Newer, Better XLoader Signals a Dangerous Shift in macOS Malware
Malware aimed at macOS is no longer just a knockoff of a Windows bug, as a new infostealer proliferating on Mac laptops demonstrates. This article has been indexed from Dark Reading Read the original article: Newer, Better XLoader Signals a…
Proton debuts VPN for Business, enabling IT departments to control access to content and apps
A more standardized, yet flexible, product category for other companies looking to safeguard access to their data. This article has been indexed from Security News | VentureBeat Read the original article: Proton debuts VPN for Business, enabling IT departments to…
Smart light bulbs could give away your password secrets
Cryptography isn’t just about secrecy. You need to take care of authenticity (no imposters!) and integrity (no tampering!) as well. This article has been indexed from Naked Security – Sophos Read the original article: Smart light bulbs could give away…
Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas
Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event […] The post Publisher’s Spotlight: Black Hat USA 2023 Closes…
How to Prevent Data Breaches: Data Breach Prevention Tips
Data breach prevention can make or break your security efforts. Learn how to stop data breaches before they happen. The post How to Prevent Data Breaches: Data Breach Prevention Tips appeared first on eSecurityPlanet. This article has been indexed from…
Defense contractor Belcan leaks admin password with a list of flaws
US Government and defense contractor Belcan left its super admin credentials open to the public, Cybernews research team reveals. Belcan is a government, defense, and aerospace contractor offering global design, software, manufacturing, supply chain, information technology, and digital engineering solutions.…
Tourists Give Themselves Away by Looking Up. So Do Most Network Intruders.
In large metropolitan areas, tourists are often easy to spot because they’re far more inclined than locals to gaze upward at the surrounding skyscrapers. Security experts say this same tourist dynamic is a dead giveaway in virtually all computer intrusions…
Software Makers May Face Greater Liability in Wake of MOVEit Lawsuit
Makers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees. This article has been indexed from Dark Reading Read the original article: Software Makers May Face…
Bracing for the AI-Driven Cybersecurity Landscape of Tomorrow
Maria Markstedter, founder of Azeria Labs and security researcher specialized in mobile and IoT security, was the opening keynote at BlackHat 2023 — Guardians of the AI Era: Navigating the Cybersecurity Landscape of Tomorrow. Markstedter provided an enlightening look at…
Akira ransomware gang spotted targeting Cisco VPN products to hack organizations
The Akira ransomware gang targets Cisco VPN products to gain initial access to corporate networks and steal their data. The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple…
SEC fines fintech crypto fund that promised 2,700% returns
Titan Global Capital Management to pay $1m to those it advised without admitting fault A New York fintech biz is set to pay $1 million in fines under a US Securities and Exchange Commission order that claims it advertised “annualized”…
When Leadership Style Is a Security Risk
Risk-aware leaders can be a cybersecurity advantage. Their flexible leadership style and emphasis on security first help set the tone and demonstrate a commitment to avoiding risk. This article has been indexed from Dark Reading Read the original article: When…
What is post-quantum cryptography and why is it important?
Whether you work in the tech field or not, it’s likely that you’ve increasingly heard of quantum computing. As with any emerging technology, along with all the possibilities there are also potential risks. We’ll be unpacking these latest developments, what…
Leveraging AT&T Cybersecurity Consulting for a robust Zero Trust Center of Excellence
As cybersecurity becomes increasingly complex, having a centralized team of experts driving continuous innovation and improvement in their Zero Trust journey is invaluable. A Zero Trust Center of Excellence (CoE) can serve as the hub of expertise, driving the organization’s…
Why is API security the next big thing in Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. APIs, formally known as application programming interfaces, occupy…