Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Features

by Tim Pappa, a certified former profiler with the FBI’s Behavioral Analysis Unit (BAU), specializing in cyber deception and online influence. Many cyber threat intelligence and policy communities are increasingly concerned with the threat posed by generative artificial intelligence, as GenAI is being   show more ...

operationalized to attempt to influence the attitudes and beliefs of target populations. But we also keep reading about how those documented methods have not influenced audiences or narratives much at all. The Discrepancy in GenAI’s Influence Imagine an athlete who can perform at exceptional levels in running or other displays of strength.  You hear he’s joining a rival cricket team. When you see him play, however, he can’t seem to hit anything.  He doesn’t know how to play.  For all his natural athletic ability, he doesn’t know how to hit or throw the correct way. Yes, he appears fearsome because of his general athletic performance, but he is not an effective player on that team until he learns how to deliver and hit a cricket ball. This is one way to conceptualize how malign influence cyber actors are applying or thinking of applying scalable generative artificial intelligence to attempt to influence target audiences. This includes everyone, including pro-Western cyber actors targeting overseas audiences. Effectiveness of ‘Pro-Western’ Narrative Accounts A summer 2022 report highlighted how ineffective many of these ‘pro-Western’ narrative accounts appeared to be at generating engagement and building influence. While social media platforms have documented how these accounts created artful, foreign-language content and call to action to encourage engagement and social media response, most of these accounts had no more than a handful of likes or retweets on Twitter, and less than a quarter of the accounts had more than a thousand followers. Nearly half of these accounts posing as media organizations included batches of hashtags with their posted content, likely trying to reach broader audiences.  But again, there was limited audience response. In my experience as a certified former profiler with the FBI’s Behavioral Analysis Unit (BAU), broad appeals to broad audiences even in the right language on the right platform do not work. Content including narratives must be crafted specifically for targeted individuals with some understanding of the kind of platforms they use and trust and the kind of relationships they have or how those relationships influence the decisions of that targeted individual or group. There are established theoretical frameworks for understanding generally how people, even outside of these behavioral relational contexts, process and respond to content like this. Communication researchers throughout the past forty years have established relatively similar conditions for cognitive and attitudinal processing of content. These dual processing models or conditions generally find that people spend more or less time thinking about and consuming or sharing content based on how relevant it is to them and how motivated they are to process that content. This is important, especially in this growing environment of “coordinated inauthentic behavior”, where creators may be scaling and applying more generative artificial intelligence content with the same methods for attempting to influence audiences. These models suggest influence attempts may still be unsuccessful regardless of the content of the creator largely depending on unfamiliar audiences and unknown users to respond to content. If any challenges are trying to access that content, people may not even be motivated to process that content or even less motivated to share that content with others.  Audiences may be more likely to scrutinize content if they struggle to process it or understand it. If there are cultural or religious sensitivities to engaging in any kind of content, audiences will likely not encounter that content or may even react aggressively to the content. Audiences may not engage content or follow content creators because of the possible consequences of being associated in some manner with that kind of content or those creators.  These are general considerations, but they are serious considerations. These considerations may explain some of the limited success of the controlled accounts in these recent reports, but these dual processing models of individuals and audiences apply even if there is uniquely generative artificial intelligence content. While much of my experience observing or reviewing other failed attempts to influence broad audiences with scalable programs is anecdotal, the psychological underpinnings of how individuals and groups of individuals as audiences process content or narratives provide an integrated theoretical framework that consistently explains why this is not working. Future Challenges in Malign Influence Cyber Operations The above research literature is the beginning of understanding this framework. The liminal step however in effectively behaviorally operationalizing content or narratives whether that includes the use of GenAI or not is having a defined target with content or narratives crafted for that defined target. Malign influence cyber actors will continue to struggle to behaviorally operationalize scalable GenAI throughout this new year, even as GenAI programs become more dynamic. This will likely result in more of the same kind of reports described above, which highlight the growing use of GenAI programs to materialize malign influence attempts but in which we see a limited measure of how anyone was influenced behaviorally. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

 Firewall Daily

The world of deepfake technology has undergone a remarkable transformation, moving beyond its initial role as a tool for face-swapping in explicit content or enhancing gaming experiences. From influencing political narratives to shaping hyper-realistic simulations, deepfakes have become a powerhouse for content   show more ...

creation. However, amidst the progress, one facet that didn’t go away with time is the dark side of deepfake technology. Technology and cyber risk expert Balaji Kapsikar, boasting 13 years of diverse experience, shared his insights on the evolving nature of deepfake technology and the emerging trends during a conversation with TCE at CyberCon 2023. As the Head of Technology & Cyber Risk at Funding Societies Singapore, Kapsikar shed light on the intricate facets of deepfake technology and its implications for our interconnected society. What is Deepfake and How Accessible is it? Deepfake technology, a fusion of “deep learning” and “fake,” utilizes advanced generative techniques to seamlessly replace one person’s face with another, primarily manipulating facial appearances. This technique, driven by artificial intelligence, has rapidly evolved, raising concerns about its accessibility and potential misuse. In a conversation with TCE, Kapsikar emphasized the increasing accessibility of deepfake tools, driven by the integration of artificial intelligence and machine learning. These tools have become readily available to users, becoming more familiar after the introduction of technologies like ChatGPT. The proliferation of AI-generated tools, including images and deepfake videos, has provided scammers with a powerful arsenal to exploit unsuspecting individuals, leading to concerns about misinformation, identity theft, and privacy breaches. “Of course, it is artificial intelligence and machine learning that are included in the deepfake technology and since we are now already starting a live into the technological era deepfake technology is also now getting easily accessible to any users and it happened recently like after ChatGPT introduction. People are getting more familiar with many AI-generated tools like AI-generated images or AI-generated deepfake videos. Scammers especially are very much using this particular technology to kind of scam your close ones”, said Balaji Kapsikar. The Dark Side of Deepfake Technology Kapsikar pointed out the darker dimensions of deepfake technology, noting its rise as a tool for scams and deceptive practices. Exploiting the capabilities of AI, malicious actors can manipulate images of individuals, altering ages and creating deepfake videos for nefarious purposes. “Deepfake is now getting more popular as a kind of scamming tool as well. This can be easily misused as well and if it is, let’s say, with the AI, even if you have a photograph of the child, you can increase the age by using the AI and after that particular age or the adult age you can kind of create a deep fake video out of that. So, some of these things may happen and especially if it is for teenage girls or something, those deepfake videos can be showcased as a sextortion kind of attack and used as a use against them”, added Kapsikar.  The dark side of deepfake technology extends beyond personal privacy concerns, encompassing the potential for malicious applications and deceptive practices. As accessibility to these tools grows, so does the risk of deepfakes being weaponized to manipulate public opinion, fabricate false narratives, and damage reputations by convincingly altering audio and video content. A growing threat emerges as cybercriminals leverage deepfake technology for fraudulent activities and social engineering. The ethical implications are profound, necessitating the implementation of robust countermeasures to mitigate the harmful consequences and safeguard individuals and society from the malevolent aspects of deepfake advancements. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

 Firewall Daily

“The most wonderful time of the year” is known for its generous sales, holiday cheer, and the notion of miracles around the corner. Unfortunately, it’s also a hot time for phishing scammers, who steal personal data and money, precisely when everyone is having fun and letting their guard down. At this time of   show more ...

year, Kaspersky experts identified cases of phishing built around the Christmas and New Year season of giving: phishing scammers are disguising the theft of personal data and funds as holiday giveaways. Phishing Scammers Targeting Personal Accounts Some phishing sites aim to obtain data by infiltrating users’ personal social media and messenger accounts under various guises. They request information and once it is submitted, it is transmitted directly into the hands of the Phishing scammers. One of these phishing incidents was recently reported in Singapore. Phishing scammers created a sophisticated phishing site targeting individuals with the promise of payments in the new year purportedly from Singapore’s Ministry of Finance. This deceptive site was designed to mimic the ministry’s branding, giving it an air of credibility. To receive the payout, visitors were prompted to enter their Telegram account details. Once the user enters the Telegram account details, fraudsters can then gain full access to the account, potentially leading to digital identity theft, access to private conversations, and the ability to impersonate the victim for further malicious activity. Phishing Sites Mimicking Banks for New Year Giveaways Another phishing technique designed to trap those who believe in miracles is a lottery featuring banks. As New Year’s Eve is a time of lucrative offers and gifts, fraudsters have created phishing sites that invite users to participate in giveaways aimed at obtaining victims’ bank details to steal from them. One instance of the New Year’s scam was specifically targeted at Filipino citizens. In this scheme, individuals were lured to a website where they were enticed to spin a wheel for a chance to win a sum of money. After the spin, users were shown their supposed winnings and asked to select between various banks where the alleged funds could be deposited. After they made the selection, users found themselves on phishing sites designed to mimic legitimate online banking interfaces. This deceptive tactic was the final move in the scam, aiming to swindle the victims by gaining access to their banking credentials and ultimately their funds. Fake New Year’s Crypto Gift-boxes With no Pokémon   The stakes in the cryptocurrency market are very high. Stealing a wallet with even a few tenths of a bitcoin already brings scammers significant profit, so they put a lot of effort into creating believable phishing emails and sites, thus making it harder for the user to notice something wrong. The fraudsters in one such case created a phishing page copying the official offer of Courtyard.io, a website that allows users to convert physical collectibles into tokens. The original Courtyard.io site invited users to register and purchase a New Year’s Eve box containing a Pokémon card. So, phishing scammers created a phishing page with the same offer, however, to receive the surprise box, visitors had to connect a crypto wallet, resulting in the theft of their funds. “Scammers are inventive and cunning. In response, we need to double-check all those special offers that come through from unknown emails. Luckily, we can have a reliable ally here – a comprehensive cybersecurity solution that will protect personal data and money, and prevent malicious actors from stealing our holiday,” comments Olga Svistunova, Senior Web Content analyst at Kaspersky. How to Avoid Scams To avoid scams connected to the season of giving, Kaspersky experts share some simple tips: Verify the source. Before engaging with any special offer, verify the legitimacy of the source. If it’s from a known brand or organization, check their official website or social media channels to confirm the giveaway campaigns. Type the URL into the address bar. Don’t open the link from the email: it could be a phishing link. Whenever there is a need to open a website, it is always better to type its URL into the address bar avoiding any links in email. Look for the red flags in the offer. Be wary of offers that seem too good to be true, like winning a large sum of money or expensive prizes with little to no effort. This is especially tricky when it comes to cryptocurrency transactions: phishing scammers will do their best to make an offer look valid. Do not share personal information. Legitimate giveaways rarely ask for sensitive personal information upfront. Be cautious of any request for details like your bank account numbers, passwords, or Social Security numbers. Conclusion Amidst the festive cheer, it’s crucial to stay vigilant against phishing scams exploiting the holiday season. From deceptive giveaways to fraudulent crypto schemes, these tactics emphasize the need for heightened awareness. Simple practices like verifying sources, avoiding email links, and refraining from sharing sensitive information are essential in safeguarding against evolving cyber threats. A reliable cybersecurity solution serves as a steadfast ally, ensuring a safer digital experience not only during the holidays but throughout the year.

 Features

As the world steps closer to 2024, the cybersecurity industry is poised to witness some transformative changes. The cybersecurity predictions for 2024 suggest that with the increasing numbers of cybercrime syndicates across the globe constantly working to disrupt business operations, organizations need to buckle up   show more ...

and build digital fortresses to protect against otherwise obvious disasters.  A research report indicates that the cybersecurity industry will grow from US$190 billion in 2023 to US$208.8 in 2024, indicating a 10% year-on-year growth. With the increased rates of cybercrime, the need for strong cybersecurity is constantly increasing, giving rise to the demand for trustable cybersecurity solutions.  Experts have predicted a continued rise in the exploitation of zero-day vulnerabilities, ransomware, state-sponsored attacks, as well as a lack of adequately trained cybersecurity resources in 2024.  Cybersecurity Predictions for 2024 The cybersecurity anticipations for 2024 from the industry experts across numerous security teams who work on the frontlines of cyberattacks suggest that the proliferation of AI is going to be a boon for both cybersecurity professionals and cybercrime syndicates. Increased Artificial Intelligence Usage AI is going to be the major factor driving changes in the cybersecurity industry for the upcoming year where a lot of trends are going to redefine the way we have been navigating the cyber universe till now.  A recent report suggests an expanding global AI market in the upcoming two years. It is expected to reach US$190.61 billion by 2025, which is a compound annual growth rate (CAGR) of 36.62%.  Pooja Shimpi, founder and CEO of Sybernow believes that the usage of artificial intelligence will continue to increase in the coming year which might give rise to the already increased number of ransomware attacks. She further explains that the use of AI has increased and will continue to do so in the coming year too along with the associated risks.  The increased use of AI will serve as a supporting factor for individuals on both sides giving rise to a challenging competition between the cybersecurity defenders and the cybercriminal gangs. Increased sophistication of AI tools is expected to enhance the precision of both offense and defense. David Aviv, CTO at Radware said, “An AI arms race will transform both offense and defense in the cyber domain. In just over a year, AI attack tools have advanced from simple amplification to sophisticated open-source code that enables bad actors to customize assaults that exploit vulnerabilities with precision.” 2024 Will be the Cloud Era The data presented by IDC’s Worldwide Semiannual Public Cloud Services Tracker suggests that the revenue generated from cloud services will reach US$663 billion by the end of 2023, an increase of 20% over 2022. A similar increase is expected in 2024. Business Wire quoted IDC stating that the total amount spent globally in 2024 on cloud services, the professional and managed services opportunities that surround them, and the gear and software that support cloud services will exceed US$1.0 trillion.  Experts predict that this trend will also give rise to an increased need for strong zero-trust architecture and cloud security across various sectors as the human threat actors combined with AI might amplify the threats.  Milin Shah, a cybersecurity professional and AVP at SitusAMC stated, “The year 2024 will witness a shift to cloud services. Considering the upcoming changes, I anticipate major cybersecurity developments for the next two years in the field of cloud security”. Growing Frequency of Mobile Cybercrime Google’s Cybersecurity Forecast 2024 also predicts that in 2024, scammers and cybercriminals will still be using social engineering techniques, like spoofing pop-up alerts, phony social media accounts, banks, or government officials, to trick victims into downloading malicious apps to their smartphones.  Experts are anticipating that mobile devices will be a target for cybercriminals in 2024, with an increase in mobile-specific threats. These threats will include mobile malware, banking trojans, and phishing attacks.  Mobile devices have taken an integral place in our lives. and this makes them an attractive target for cyber adversaries. Exposure to mobile phone data can lead to serious threats of identity theft, unauthorized access to sensitive personal data, and financial fraud. State Sponsored Attacks This year has witnessed several states-sponsored cyberattacks on both the citizens of the same country, as well as on the citizens and organizations of enemy nations. Towards the end of 2023, celebrities and politicians of countries got notifications on their mobile phones for possible “state-sponsored hacking” attempts to extract data for government agencies, India too witnessed a similar incident.  Also, government-sponsored hacktivists and attackers have been on the rise in 2023, which is expected to continue in the upcoming year 2023 as the world continues to grapple with multiple fault lines of geopolitical stress like the Russia-Ukraine, and Israel-Palestine.  Milin Shah, while citing the Russia-Ukraine war and the use of state-sponsored attacks, stated that 2024 will witness, a “Rise in State-sponsored cyberattacks, economic and cyber espionage targeting critical infrastructure, rise of a political war due to increased deepfakes and their use for political influence.” Rise in Ransomware Attacks Experts like Pooja Shimpi anticipate that with the continued rise in ransomware attacks, cybercriminal groups might also evolve in their attacking methods and will operate at a larger scale to churn bigger profits. This also will expose organizations to a higher risk if they do not adopt a better cybersecurity strategy. Hackers are also getting very advanced; organizations need to be well-equipped and train their employees to guard against them.  Sabarinathan Sampath, Chief Strategy Officer at Wire 19, said that ransomware attacks are increasing. Organizations must be prepared to guard against them. He believes that employees are the weakest link in the cybersecurity chain and that adequate training helps them understand where the weakness lies, and how to react in such scenarios.   He also highlighted the need for an inter-government collaboration for sharing cybersecurity intel related to ransomware. Sampath believes that governments need to help organizations train to react to such situations and elements.  Rise in AI-Powered Frauds Experts also predict that the world needs to buckle up for AI-powered frauds in 2024. This time, cybercriminals will more cunningly orchestrate deceit with morphed photos, doctored videos, and fake voices. Knowing the trade won’t be enough to peacefully do business, organizations will need to have an understanding of the tricks deployed by cybercriminals too, and keep themselves aware and updated against cybercrime.  Padmakumar Nair, CEO and co-founder of Ennoventure Inc. stated, “As we approach 2024, the escalating threat of counterfeiting necessitates a proactive approach harnessing cutting-edge technology-driven anti-counterfeit solutions.”  Adv Puneet Bhasin, an expert in cyber law and data protection anticipates that there will be increased AI-powered frauds in 2024. Such frauds could happen in multiple ways like fake voices, doctored videos, and morphed photos. AI will assist in making very realistic audio-visual content for malicious actors. She predicts that this will continue to happen in 2024, until and unless people are adequately educated about it and don’t fall prey to vicious threat actors.  She also predicted that the trend of Indian organizations, primarily financial institutions being targeted in cybercrime will also continue. Increased Need for Employee Training Skill crunch in the cybersecurity industry has been a continuous issue since the emergence of the cybersecurity industry. Forbes quoted a report by Enterprise Strategy Group stating that 54% of cybersecurity professionals feel that their firm has been negatively impacted by cybersecurity skills shortage in the past two years.  Vaibhav Patkar, an independent cybersecurity consultant stated, “Skill mismatch is always there. The only way out is constant training. And the way things are evolving, unless and until you upgrade yourself with training. Training should be done according to hierarchy levels and the responsibilities he is having in an organization.”  Cybersecurity stalwarts believe that upskilling employees is going to strengthen businesses against negative instances. A proactive approach to enhancing cybersecurity like vigilant defense against cyberattacks will build a more cyber-secure future.  Padmakumar Nair said, “Upskilling programs emerged as a cornerstone, empowering organizations to transition from a defensive to a proactive cybersecurity stance. Fundamental cybersecurity practices – from robust passwords to vigilant defense against phishing – have laid the foundation for a more secure digital future.”  Experts predict that although several organizations are already implementing incident response training programs, 2024 will witness an increased need for adequate employee training to respond to cybersecurity emergencies that could emerge in the coming year.  Milin Shah states, “Incident response and planning is implemented by almost every MNC’s or Large-scale Startup’s, but how many of them have a real-world simulation exercise to ensure the incident response plan is effective?”  He continued by saying that even though the “Escalation Matrix” or the stepwise guide for complex cybersecurity incidents exists, are severe incidents handled well? He stated, “I would say less than 2 in 10. That is the case with Employee Awareness too. While every company performs Security Awareness training, real-world simulated Phishing excessive with actual pressure is different from responding in well-aware and practice grounds.” Continued Exploitation of Zero-Day Vulnerabilities Since 2012, there has been an overall rise in the exploitation of zero-day vulnerabilities, and 2023 is expected to surpass the previous record set in 2021, according to Google’s Cybersecurity Forecast 2024.   Google anticipates that nation-state attackers and cybercriminal organizations will continue to use zero-day vulnerabilities in 2024. This can be attributed, in part, to the attackers’ desire to have persistent access to the system for as long as possible. By taking advantage of zero-day vulnerabilities, they can do so far longer than they could if they were to send a phishing email and then install malware.  Since security teams and solutions are now much better at spotting malware and phishing emails, attackers will look for additional ways to avoid detection. Threat actors are particularly drawn to edge devices and virtualization software because of their difficulty in monitoring.   Based on previous extortion incidents, cybercriminals are aware that utilizing a zero-day vulnerability would increase the number of victims and the number of enterprises willing to pay exorbitant ransomware or extortion demands. Combined Power of AI and Human Threat Actors In the times where everyone can access AI tools, it has become easier for cybercriminals to create mirages leading to phishing attacks and frauds. Malicious threat actors have added artificial intelligence to their arsenal to outsmart commoners, which is scary on the part of innocent, unsuspecting people.  Vaibhav Patkar, an independent cybersecurity consultant said that spotting phishing sites was easier in the older times as they had common doubt elements like spelling and grammatical errors. But nowadays with the help of AI and ML, these threat actors are improving their tactics, which is frightening for the common man.  He further explained that there are AI-powered tools available for almost everything. Anyone can go and make whatever changes they want to make to someone’s face and exploit it for blackmailing and extortion. But on the other hand, he believes that the same tools can also be used for a good cause. He thinks forums can be created where experts can come together and change the game.   As the world is advancing towards 2024, a new storyline emerges. The battle for survival in the cybersecurity sector will intensify and artificial intelligence will become the major driver of change for most cybersecurity trends in 2024.  Some experts predict that with AI tools being available for anything and everything, there will be an increase in cybercrimes; but at the same time, some of them also believe that the very power behind these crimes which is artificial intelligence, could also change things to the better side next year.  In addition, the combination of human factors and artificial intelligence will bring a new batch of cybersecurity problems and solutions. Ramped-up vigilance throughout the year will be followed by a concerted effort to train employees to guard against hackers.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

 0 - CT - Cybersecurity Architecture - Da

Aim and scopeThis study on “the legal protection of workers’ personal data” aims to develop the knowledge base on thissubject in light of legal and technological developments. The purpose of this working paper is to give an overview of legal standards related to workers’ personal data protection and, from   show more ...

both a global and regional point […] La entrada ILO – Protection of workers personal data se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Architecture - Da

Cyber-enabled fraud (CEF) is a growing transnational organised crime. CEF criminal syndicates are often well structured into distinct sub-groups with specialised areas of criminal expertise, including money laundering. These sub-groups may also be loosely organised and de-centralised across different jurisdictions,   show more ...

which further complicate efforts to investigate CEF activity. CEF syndicates are also found to be […] La entrada Illicit Financial Flows Cyber Enabled Fraud se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Architecture - Cl

Set Your Identity Baseline – Business Objective: “Enable secure cloud access to facilitate innovation” Treat ALL cloud users as Privileged Access● Require multi-factor authentication● Use temporary credentials● Log all access Map your internal identities to the cloud● Centralize Identity and   show more ...

Access management● Set up single sign-on● Apply cloud managed identity policies Recognize all identities● Cloud […] La entrada Identity Maturity in the Cloud – Humans do not have or need access to production cloud accounts se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Architecture - Da

La identidad corporativa permite a las empresas diferenciarse de las demás, y esto, es también cierto en el mundo digital e interconectado actual. En este entorno, cobran especial importancia algunas características de la comunicación, en particular las relativas a: la inmediatez, visibilidad, credibilidad,   show more ...

influencia y permanencia de la información. Por tanto, es cada vez más […] La entrada Identidad Digital Corporativa INCIBE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Architecture - Da

This Cybersecurity and Infrastructure Security Agency (CISA) Mitigation Guide offers recommendations and best practices to combat pervasive cyber threats affecting the Healthcare and Public Health (HPH) Sector. Identified vulnerabilities in organizations across the HPH Sector present opportunities to mitigate risks   show more ...

before intrusions occur. Unmitigated vulnerabilities increase the likelihood of threat actors successfully employing malicious tactics, […] La entrada HPH Sector Mitigation Guide TLP CLEAR 508c se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Architecture - Da

Serverless platforms enable developers to develop and deploy faster, allowing an easy way to move to Cloud-native services without managing infrastructures like container clusters or virtual machines. As businesses work to bring technology value to market faster, serverless platforms are gaining adoption with   show more ...

developers. Like any solution, Serverless brings with it a variety of cyber […] La entrada How to Design a Secure Serverless Architecture se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - SOC - CSIRT Operations - Threat

Terrorism, both foreign and domestic, remains a top threat to the Homeland, but other threats are increasingly crowding the threat space. During the next year, we assess that the threat of violence from individuals radicalized in the United States will remain high, but largely unchanged, marked by lone offenders or   show more ...

small group attacks that occur […] La entrada Homeland Threat Assessment 2024 se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - SOC - CSIRT Operations - Threat

About EnergiCERT EnergiCERT is the critical sectors’ cyber security centre. EnergiCERT is an essential part of the sectors’ defence against cyber threats. We help detect and respond to cyber-attacks on critical infrastructure, and build and share the critical knowledge that can prevent the next attack. Our   show more ...

responsibilities include monitoring the companies in the sectors that […] La entrada Handbook on Threat Assessments se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - SOC - CSIRT Operations - Cyber

Ransomware and other criminally motivated attacks have become a plague on industrial organizations around the world. Our report for H1 2022 includes seven cases of hacktivist attacks and 10 cases of criminal ransomware attacks. In H2 2022, this increased to 40 cases of cybercrime incidents, and one hacktivist attack.   show more ...

Now in the current report, we […] La entrada H1 2023 Brief Overview of Main Incidents in Industrial CS se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Lawrence Abrams Google is downplaying reports of malware abusing an undocumented Google Chrome API to generate new authentication cookies when previously stolen ones have expired. In late November 2023, BleepingComputer reported on two information-stealing malware   show more ...

operations named Lumma and Rhadamanthys, claiming they could restore expired Google authentication cookies stolen in attacks. These cookies […] La entrada Google: Malware abusing API is standard token theft, not an API issue – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Lawrence Abrams Cybercriminals are abusing X advertisements to promote websites that lead to crypto drainers, fake airdrops, and other scams. Like all advertising platforms, X, formerly known as Twitter, claims to show advertisements based on a user’s   show more ...

activity, leading to ads that match users’ interests. While Elon had previously tweeted that YouTube is […] La entrada X users fed up with constant stream of malicious crypto ads – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Marc Handelman Authors/Presenters: Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons“ Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access.   show more ...

Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink […] La entrada USENIX Security ’23 – “If I Could Do This, I Feel Anyone Could” *The Design And Evaluation Of A Secondary Authentication Factor Manager’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: CyB3rBEA$T In the ever-evolving landscape of operating systems, Linux stands out as a robust and versatile solution that has captured the hearts of developers and administrators alike. Born from the vision of Linus Torvald in 1991, Linux has transcended its initial   show more ...

educational purpose to become a cornerstone in the digital realm. […] La entrada Mastering the Linux CLI: Unleashing the Power of Commands – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Blog Posts

Source: securityboulevard.com – Author: Hyperproof Team Incident response is a critical piece of any enterprise cybersecurity strategy and is also a key component to achieving FedRAMP compliance. FedRAMP, the US government-wide program for ensuring the security of cloud applications and services used by   show more ...

government agencies, is made up of a number of security controls based […] La entrada What Is the FedRAMP Incident Response Control Family? – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - CISO Strategics - Risk & Compli

While working with third parties is essential to the success of almost every organization, it introduces numerous new security risks and challenges. In the last year alone, 84% of security professionals experienced at least one significant disruption directlyattributed to a third party. Another 66% incurred financial   show more ...

loss and 59% saw reputational damage from third-party incidents. […] La entrada InfoSec Guide to Third Party Risk Management se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Regulations - ISO

Information security is indispensable. As a component of corporate management, it must be geared to providing optimum support for business objectives. Even or especially in times of so-called “cyber threats” and the emerging challenges of “cyber security” in many places, a wellstructured   show more ...

information security management system (ISMS) in accordance with internationally recognized standards provides the […] La entrada Implementation GuideISO/IEC 27001:2022 se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - Cybersecurity Regulations - ISO

This gap analysis document provides a simple framework for evaluating your quality management system against the requirements of ISO 27001:2022. It is split into two tables: Please complete each table by recording the evidence acquired from one full internal audit against the requirements of ISO 27001:2022. If you   show more ...

are unable to provide evidence of compliance, […] La entrada ISO 27001 – 2022 Client Gap Analysis se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - CISO Strategics - CISO Strategi

ISO 22301:2019 is the latest version of the international standard for Business Continuity Management Systems. This standard provides a best practice framework to support organizations to effectively manage the impact of a disruption to its normal operation. The purpose of the standard is not necessarily to achieve   show more ...

total mitigation of impact from disruption. It is […] La entrada ISO 22301:2019 BUSINESS CONTINUITY STANDARD IMPLEMENTATION GUIDE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0 - CT - CISO Strategics - CISO Strategi

Space is a newly emerging commercial critical infrastructure sector that is no longer the domain of only national government authorities. Space is an inherently risky environment in which to operate, so cybersecurity risks involving commercial space – including those affecting commercial satellite vehicles – need   show more ...

to be understood and managed alongside other types of risks […] La entrada Introduction to Cybersecurity for Commercial Satellite Operations se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Lawrence Abrams U.S. mortgage lender loanDepot has suffered a cyberattack that caused the company to take IT systems offline, preventing online payments against loans. loanDepot is one of the largest nonbank retail mortgage lenders in the USA, employing approximately   show more ...

6,000 people and servicing loans of over $140 billion. Yesterday, customers began […] La entrada Mortgage firm loanDepot cyberattack impacts IT systems, payment portal – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Bill Toulas A campaign delivering the AsyncRAT malware to select targets has been active for at least the past 11 months, using hundreds of unique loader samples and more than 100 domains. AsyncRAT is an open-source remote access tool (RAT) for Windows, publicly   show more ...

available since 2019, with functions for remote command execution, […] La entrada Stealthy AsyncRAT malware attacks targets US infrastructure for 11 months – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Bill Toulas Multiple implementations of the Kyber key encapsulation mechanism for quantum-safe encryption, are vulnerable to a set of flaws collectively referred to as KyberSlash, which could allow the recovery of secret keys. CRYSTALS-Kyber is the official   show more ...

implementation of the Kyber key encapsulation mechanism (KEM) for quantum-safe algorithm (QSA) and part of […] La entrada KyberSlash attacks put quantum encryption projects at risk – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Beirut International Airport

Source: securityaffairs.com – Author: Pierluigi Paganini A cyber attack hit the Beirut International Airport A cyber attack hit the Beirut International Airport, Rafic Hariri (Lebanon), threat actors breached the Flight Information Display System (FIDS). Threat actors hit the Beirut International Airport Rafic   show more ...

Hariri in Lebanon and breached the Flight Information Display System (FIDS). Rafic Hariri […] La entrada A cyber attack hit the Beirut International Airport – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Bit24.cash

Source: securityaffairs.com – Author: Pierluigi Paganini Iranian crypto exchange Bit24.cash leaks user passports and IDs Bit24.cash has inadvertently exposed sensitive data belonging to nearly 230,000 users, as revealed by Cybernews research. Due to its limited access to foreign financial markets, Iran has   show more ...

embraced cryptocurrency significantly. Last year, Iranian crypto exchanges facilitated transactions totaling nearly $3 […] La entrada Iranian crypto exchange Bit24.cash leaks user passports and IDs – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini A cyber attack hit the Beirut International Airport  |  Iranian crypto exchange Bit24.cash leaks user passports and IDs  |  Security Affairs newsletter Round 453 by Pierluigi Paganini – INTERNATIONAL EDITION  |  Turkish Sea Turtle   show more ...

APT targets Dutch IT and Telecom firms  |  Experts spotted a new macOS Backdoor named […] La entrada Security Affairs newsletter Round 453 by Pierluigi Paganini – INTERNATIONAL EDITION – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 APT

Source: securityaffairs.com – Author: Pierluigi Paganini Turkish Sea Turtle APT targets Dutch IT and Telecom firms Sea Turtle cyber espionage group targeted telco, media, ISPs, IT service providers, and Kurdish websites in the Netherlands. Researchers from Dutch security firm Hunt & Hackett observed Sea   show more ...

Turtle cyber espionage group (aka Teal Kurma, Marbled Dust, SILICON and […] La entrada Turkish Sea Turtle APT targets Dutch IT and Telecom firms – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team Digital transformation has urged organizations across various industries to adopt multi-cloud strategies. They need to find the right balance for security and growth. By Michael Rostov, Entrepreneur and Co-Founder at Oasis Defender The adoption of   show more ...

multi-cloud aims to modernize IT infrastructures and carve out a competitive edge. Be it […] La entrada Overcoming Multi-Cloud Security Challenges: The Power of a Unified Configuration of Clouds – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: Nick The cyber world is filled with lots of scary threats and new buzzwords, none of them bigger than AI. As boards, CEOs, and security leadership teams decide where to put their energy and time going forward, I’m going to propose the perhaps controversial   show more ...

recommendation. More important than identifying a strategy […] La entrada Your #1 Security Initiative in 2024 Should be Operational Resilience – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team By Chelsea Hopkins, Social Media Manager, Fasthosts The internet is a fast-changing world of information that allows kids to play, create, browse, and engage with different people from all corners of the globe. Although the access to information,   show more ...

entertainment, and connection it offers is vital to modern life, safeguarding […] La entrada An Age-by-Age Guide to Online Safety for Kids – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-01
Aggregator history
Sunday, January 07
MON
TUE
WED
THU
FRI
SAT
SUN
JanuaryFebruaryMarch