Source: www.infosecurity-magazine.com – Author: 1 A popular anonymous file sharing service used by security researchers and threat actors has decided to close down, citing “extreme volumes”...
Day: August 18, 2023
Google Fixes 26 Bugs Amid Fake Update Warning – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Google has released the latest version of its Chrome browser, addressing 26 vulnerabilities including eight critical flaws. Chrome 116 covers updates...
APT29 is targeting Ministries of Foreign Affairs of NATO-aligned countries – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked APT29 used the Zulip Chat App in attacks aimed at ministries of foreign affairs of NATO-aligned countries EclecticIQ researchers...
A massive campaign delivered a proxy server application to 400,000 Windows systems – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers discovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems. AT&T Alien Labs...
Alarming lack of cybersecurity practices on world’s most popular websites – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The world’s most popular websites lack basic cybersecurity hygiene, an investigation by Cybernews shows. Do you happen to love exploring...
Experts devise an exploit for Apple iOS 16 that relies on fake Airplane Mode – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers detailed a new exploit for Apple iOS 16 that can allow attackers to gain access to a device even...
Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cleaning products manufacturer Clorox Company announced that it has taken some systems offline in response to a cyberattack. The Clorox...
MoustachedBouncer: Espionage against foreign diplomats in Belarus – Source:
Source: – Author: 1 Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!...
Time is money, and online game scammers have lots of it – Source:
Source: – Author: 1 Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and...
Check cybersecurity pre-invest – Week in security with Tony Anscombe – Source:
Source: – Author: 1 When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules....
Fingerprints all over: Can browser fingerprinting increase website security? – Source:
Source: – Author: 1 Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?...
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap – Source:
Source: – Author: 1 With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some...
Quantum computing: Will it break crypto security within a few years? – Source:
Source: – Author: 1 Current cryptographic security methods watch out – quantum computing is coming for your lunch. Original Post URL: Category & Tags: – Views:...
Is backdoor access oppressive? – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK? Original...
Gathering dust and data: How robotic vacuums can spy on you – Source:
Source: – Author: 1 Mitigate the risk of data leaks with a careful review of the product and the proper settings. Original Post URL: Category &...
Dear all, What are some common subject lines in phishing emails? – Source:
Source: – Author: 1 Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. Original Post URL: Category & Tags: – Views:...
What happens if AI is wrong? – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for...
8 common work-from-home scams to avoid – Source:
Source: – Author: 1 That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities...
Child identity theft: how do I keep my kids’ personal data safe? – Source:
Source: – Author: 1 Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child...
Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour – Source:
Source: – Author: 1 There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and...
Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Here’s how cybercriminals have adjusted their tactics in response to Microsoft’s stricter security policies, plus other interesting findings from ESET’s new Threat...
The danger within: 5 steps you can take to combat insider threats – Source:
Source: – Author: 1 Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar? Original...
How to combat the emergence of automated and AI-generated fraud – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kathryn Schneider The internet is abuzz with talk of the potential of generative AI and automation. But these advanced tools are also...
A Look Inside the Attacker’s Toolkit: DNS DDoS Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Sharon Shirit DNS is a critical infrastructure for your online services, a DNS DDoS attack risks the availability of your services. Attackers...
Karma Catches Up to Global Phishing Service 16Shop – Source: securityboulevard.com
Source: securityboulevard.com – Author: BrianKrebs You’ve probably never heard of “16Shop,” but there’s a good chance someone using it has tried to phish you. A 16Shop...
New SEC Cybersecurity Rules and What It Means for Board Oversight – Source: securityboulevard.com
Source: securityboulevard.com – Author: Leigh Dow The SEC adopted new rules surrounding cybersecurity risk management, strategy, governance, and incident disclosure. As a CISO, this no doubt...
BSidesTLV 2023 – Elad Ernst – One Device To Rule Them All – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Original Post URL: https://securityboulevard.com/2023/08/bsidestlv-2023-elad-ernst-one-device-to-rule-them-all/ Category & Tags: CISO Suite,Governance, Risk &...
CAPTCHA: A Cost-Proof Solution, Not A Turing Test – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kevin Gosschalk Understanding the Inherent Limitations of CAPTCHAs At its core, a CAPTCHA (Completely Automated Public Turing Test to Tell Computers and...
Randall Munroe’s XKCD ‘Types of Solar Eclipse’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Original Post URL: https://securityboulevard.com/2023/08/randall-munroes-xkcd-types-of-solar-eclipse/ Category & Tags: Humor,Security Bloggers Network,Aerospace Humor,Astronomical...
The Week in Security: Researchers hack ‘unbreakable’ card-shuffling hardware, Discord.io shut after breach – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kate Tenerowicz Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world...