Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Since its November debut on the world stage, the popular AI-powered chatbot, ChatGPT, has continuously attracted cyber criminal attention....
Day: May 3, 2023
Hacktivism and the new age of cyber warfare – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Sergey Shykevich, Threat Intelligence Group Manager, Check Point. Hacktivism has traditionally been associated with loosely managed underground cyber criminal entities....
CISA Advises FCC Covered List For Risk Management – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The US Cybersecurity and Infrastructure Security Agency (CISA) has urged organizations to incorporate the Covered List created by the Federal Communications...
Apple and Google Unveil Industry Specification For Unwanted Tracking – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Google and Apple have announced jointly submitting a proposed industry specification to aid the fight against unwanted tracking via Bluetooth location-tracking...
Earth Longzhi Uses “Stack Rumbling” to Disable Security Software – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cybersecurity researchers at Trend Micro have discovered a new campaign by Earth Longzhi targeting organizations based in Taiwan, Thailand, the Philippines...
Three-Quarters of Firms Predict Breach in Coming Year – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Most global organizations anticipate suffering a data breach or cyber-attack in the next 12 months, despite cyber-risk levels falling overall, according...
Government’s New Fraud Strategy Gets Lukewarm Reception – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The UK government has announced a new fraud strategy which will focus heavily on mitigating the impact of telephone and online...
Dark Web Bust Leads to Arrest of 288 Suspects – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 International police have arrested nearly 300 individuals on suspicion of buying or selling drugs on underground marketplace Monopoly Market. Operation SpecTor...
Authorities dismantled the card-checking platform Try2Check – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Authorities dismantled the Try2Check platform, a Card-Checking platform that generated tens of millions of dollars in revenue. The U.S. DoJ...
Passwordless sign-in with passkeys is now available for Google accounts – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Google announced the introduction of the passwordless secure sign-in with Passkeys for Google Accounts on all platforms. Google is rolling...
Hackers are taking advantage of the interest in generative AI to install Malware – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Threat actors are using the promise of generative AI like ChatGPT to deliver malware, Facebook parent Meta warned. Threat actors...
Researchers found DoS flaws in popular BGP implementation – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Vulnerabilities in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to trigger a DoS condition...
FBI and Ukrainian police seized 9 crypto exchanges used by cybercriminals – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A joint operation conducted by the FBI and Ukrainian police seized 9 crypto exchanges used by cybercriminal groups for money...
Akamai to Extend API Security Reach via Neosec Acquisition – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard Akamai Technologies plans to make it easier to detect application programming interfaces (APIs) using behavioral analytics following its acquisition of...
Kasada Named 2023 Cyber Top Innovations Winner – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kasada Enterprise Security Tech Honors Kasada’s Anti-Bot Platform as One of the Year’s Top Cybersecurity Innovations NEW YORK — May 3, 2023...
USENIX Enigma 2023 – Eric Goldman – ‘How The Internet Improves Humanity’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
3 Ways to Overcome Cybersecurity Staff Shortages in 2023 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Eyal Arazi According to the report, 70% of organizations believe they do not have sufficient cybersecurity staff to be effective. And over...
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #240 – Monetary Motivation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
SolarWinds hack: Did DoJ know 6 months earlier? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Richi Jennings What did the U.S. Justice Department know about the SolarWinds fiasco? How early did it find out? And who did it...
USENIX Enigma 2023 – Moderator: Amira Dhalla, Consumer Reports, Panelists: Yael Grauer, Alex Gaynor, Josh Aas – Fireside Chat: The State of Memory Safety – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Hot Topics Akamai to Extend API Security Reach via Neosec Acquisition Kasada Named 2023 Cyber Top Innovations Winner USENIX Enigma...
Prosecutors Argue for 15 Months in Jail for Uber CISO – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mark Rasch In a sentencing memorandum filed with a San Francisco federal court on April 27, 2023, prosecutors argued that Joe Sullivan—the...
How to Manage Data Security in the Transportation Industry – Source: securityboulevard.com
Source: securityboulevard.com – Author: Cavelo Blog Data Security 4 min read Written by Phil Guerin Published on May 3, 2023 The transportation industry is a critical...
7 Fraud Prevention Rules Using Device Fingerprinting – Source: securityboulevard.com
Source: securityboulevard.com – Author: Johan Brissmyr In a previous article, 9 Device Fingerprinting Solutions for Developers, I outlined a set of open source and commercial solutions...
SECURITY ALERT: Danish Customers Targeted by Active PostNord DK Phishing Campaign – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Vladimir Unterfingher Heimdal® has recently discovered what can very well be the debut of a massive phishing campaign unfolding in the Nordics....
Reinventing Government: An Automation Leadership Guide – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Governance & Risk Management , Government , Identity Governance & Administration Moving from Alerts to Action: An Agency Exclusive SOAR Discussion...
Police Arrest Shuttered Monopoly Market Drug Sellers – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cybercrime , Fraud Management & Cybercrime Nearly 300 Arrests Made in the US and Europe Akshaya Asokan (asokan_akshaya) • May 2,...
Patient in Leaked Photos Drops Pursuit for Ransom Payment – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Fraud Management & Cybercrime , Healthcare , Industry Specific ‘Jane Doe’ Wanted Health System to Pay Ransom to Take Sensitive Photos...
Insider Threat: Organizations Must Focus on Risk – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Events , Governance & Risk Management , Insider Threat Software Engineering Institute’s Randy Trzeciak on Hybrid Workforce, Insider Risk Tom Field...
How to transform cloud security challenges into business opportunities
To secure enterprise assets in the cloud, CISOs must address several challenges previously unseen in traditional IT and on-premises data centers. This whitepaper explores the key...
APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading After months of inactivity, Earth Longzhi — a suspected subgroup of the notorious APT41 — is...