Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for 2024 Cybersecurity R ...

 Firewall Daily

Between 2024 and 2031, the global cyber threat intelligence market is poised for growth, with North America and Europe at the forefront. However, Forbes reports alarming cybersecurity stats—560,000 daily malware instances and 1248 weekly cyberattacks per organization. In 2024, ransomware 2.0, info-stealer malware,   show more ...

and cloud malware injection amplify threats. Ransomware on SAAS infrastructure poses challenges in lateral movement for attackers.  While SAAS providers shoulder security responsibility, customers can reduce risks through mitigation strategies like multi-factor authentication. The AI/ML hype of 2023 faces scrutiny in 2024, especially in phishing defense, where traditional methods and threat intelligence management prove crucial. Automation, with AI, shows promise in streamlining tasks like extracting intel from reports using Natural Language Processing (NLP). The Cyber Express unfolds the evolving world of threat intelligence and mitigation strategies in 2024, stressing the need for a global cybersecurity approach.  Mitigation Strategies for 2024: A Paradigm Shift  To fight the ongoing cybercrimes, organizations need to understand and embrace cybersecurity as part of the organization and not as a subsidiary domain. Justin Ong, APAC CISO & CPO at Panasonic Asia Pacific Pte. Ltd, emphasizes the crucial role of threat intelligence in the cybersecurity domain and its significance in developing effective mitigation strategies.  Threat intelligence involves the systematic collection, analysis, and dissemination of information concerning cyber threats and vulnerabilities. It goes beyond a mere compilation of data; it enhances situational awareness, enabling informed decision-making and the development of proactive cybersecurity measures.   “Threat intelligence helps companies understand the tactics, techniques, and procedures (TTPs) employed by threat actors, the vulnerabilities they exploit, and the indicators of compromise (IoCs) associated with their activities. By leveraging threat intelligence, companies can proactively defend against cyber threats, identify potential risks, and respond promptly to security incidents”, says Justin.   A prevailing misconception is the belief that acquiring advanced cybersecurity tools alone is sufficient for robust cybersecurity. While tools are undeniably essential, understanding the world of cybercrime is equally crucial.   This understanding, combined with robust playbooks on how to deal with incidents, forms the backbone of a resilient cybersecurity posture. Moreover, some companies fall into the trap of viewing threat intelligence as a one-time task. In reality, it demands continuous updates and adjustments to remain effective against hackers. Automating threat intelligence feeds into defense systems and adds an extra layer of protection.  Another misconception is the exclusive focus on external threats, neglecting the equally perilous possibility of insider threats. Threat intelligence should encompass both external and internal threats, making employee screening and background checks imperative before the commencement of employment.   Overcoming the fear of sharing threat intelligence due to concerns about revealing vulnerabilities is crucial. Collaborative information sharing strengthens the overall cybersecurity ecosystem, and many Original Equipment Manufacturers (OEMs) are now willing to collaborate for the greater good, ensuring intelligence sharing improves cyber defenses against the myriad adversaries in the digital realm.  Adapting to New and Emerging Threats: Insights from Justin Ong  Looking ahead, Justin Ong anticipates several trends and advancements in threat intelligence, necessitating corresponding adaptations in organizational strategies. The increased use of automation and artificial intelligence in processing and analyzing large volumes of threat data for quicker and more accurate decision-making is on the horizon.   Modern Extended Detection and Response (XDR) and Network Detection and Response (NDR) products are increasingly incorporating AI into their platforms. These systems can autonomously take necessary actions when deviated behavior is detected, representing a significant leap forward in cybersecurity capabilities.  “As the Internet of Things (IoT) and Operational Technology (OT)/ Industrial Control Systems (ICS) environments expand, threat intelligence will need to adapt to address the unique challenges posed by these interconnected systems. Many of the OT vendors have already started partnering with solution providers to onboard and certify their products for use on these sensitive networks”, added Justin.   Despite the rise of automation, the importance of skilled human analysts will remain critical for interpreting nuanced threat intelligence and making strategic decisions. The shortage of skilled cybersecurity professionals remains a critical issue, requiring concerted efforts to bridge the gap.  Strategic Responses and Predictions for 2024  In anticipation of these changes, organizations should focus on enhancing their analytical capabilities, fostering collaboration within the cybersecurity community, and integrating threat intelligence into their overall risk management strategies.   Cybersecurity discussions must take a prominent place in Governance, Risk, and Compliance (GRC) discussions at the board level. Regular training and updating of cybersecurity personnel on emerging threats and technologies are essential to staying ahead of cybercriminals.   Ransomware, identified as an ongoing problem for organizations worldwide, is expected to persist and grow in size and complexity in 2024. Collaborations and partnerships between ransomware families and other threat actors through underground forums will contribute to this growth.   Socially engineered tactics, designed to manipulate and deceive individuals into compromising their devices or personal information, are anticipated to become even more sophisticated and targeted. This increasing sophistication poses challenges for both victims and security tools, making detection and identification more challenging.  The Trellix Advanced Research Center’s 2024 Threat Predictions report highlights the growing complexity of the cyber world. John Fokker, Head of Threat Intelligence at Trellix Advanced Research Center, notes, “Cybercriminals from ransomware families to nation-state actors are getting smarter, quicker, and more coordinated in retooling their tactics to follow new schemes — and we don’t anticipate that changing in 2024.”  Breaking away from escalating attacks requires industries to embrace a cybersecurity strategy that is constantly vigilant, actionably comprehensible, and adaptable to new threats.  Cyble’s Cyber Threat Intelligence: A Holistic Approach  Cyble acknowledges the extensive, intricate, and changing nature of security threats. Complete protection from all potential external threats is unrealistic. Cyble’s Cyber Threat Intelligence offers insight into the activities of potential attackers and Threat Actors, allowing organizations to determine, prioritize, and track threats that pose a risk.  The process involves gathering information from numerous sources, including the Surface, Deep & Dark Web, and covert communication channels. By combining various data sources and adding context, Cyble’s intelligence packages provide a comprehensive view of the dark web world, especially for new and emerging ransomware groups, enabling quick and informed decision-making.   Integration with security tools allows for the querying of Indicators of Compromise (IOCs) to correlate with threat alerts, uncover Personal Identifiable Information (PII) exposures, or gain insight into critical vulnerabilities and exploits.  To Wrap Up  To sum up, the year 2024 will be a pivotal period for threat intelligence and mitigation strategies. In light of the recent escalation involving ransomware, hacktivists, and novice hacker groups, organizations and cybersecurity agencies must prioritize threat intelligence and mitigation Strategies, fostering collaboration, leveraging automation, and mitigating the upcoming threats.   The interplay of technology, human expertise, and strategic foresight will be instrumental in outsmarting and outmaneuvering cybercriminals in the coming year. The integration of threat intelligence into the very fabric of cybersecurity practices is not just a choice; it’s a necessity for the digital guardians of today and tomorrow.  Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

image for The Cat-and-Mouse Ga ...

 Dark Web News

In an unusual turn of events within the waters of the dark web, the Federal Bureau of Investigation (FBI) found itself entangled in a back-and-forth confrontation with the notorious   ALPHV/BlackCat ransomware gang. This unexpected clash marked a rare instance of a government agency engaging with a cybercriminal   show more ...

group, challenging the conventional narrative.  The FBI initiated a decisive move last year, a large scale takedown of the darknet website associated with the infamous ALPHV/BlackCat ransomware gang. The seized website was promptly replaced with a splash page announcing the successful operation, forming part of the FBI’s comprehensive campaign to hault services offerred by the threat actor.   The ALPHV ransomware gang, also recognized as BlackCat, retaliated by regaining control over its dark website on multiple occasions. This triggered an intense back-and-forth struggle on the dark web, pitting the criminal syndicate against the formidable U.S. government agency.    Understanding the Turmoil: FBI’s Infiltration and Seizure  Source: Techcrunch The Department of Justice, in a statement, disclosed details of its “disruption campaign,” revealing that a confidential source played a pivotal role in helping the FBI access more than 900 public/private key pairs controlling ALPHV ‘s darknet infrastructure.   This operation allowed the FBI to monitor the gang’s activities for months, culminating in the successful seizure of its websites in December. The ALPHV /BlackCat ransomware gang has been a prolific threat, earning $300 million in ransom proceeds from over 1,000 victims worldwide, as reported by the FBI.  Source: FBI As part of the intervention, the FBI obtained decryption keys, enabling the release of keys for approximately 500 affected organizations. This move facilitated these organizations in regaining control of their data, preventing an estimated $68 million in ransom demands.   The ALPHV ransomware group, identified as the second most prolific ransomware variant by NCC Group’s leak data statistics, had compromised over 1,000 entities globally, according to the FBI. This number surpassed previous estimates, indicating the extent of the cyber threat posed by the ALPHV gang.  In a conversation with TCE, vulnerability researcher and exploit developer, Alexandre Borges, shared his take on the effectiveness of law enforcement efforts against ransomware groups like LockBit. In his take, Alexandre says, “I really like the FBI approach because they do everything that is possible and expected according to laws. These criminals must be convicted and punished by their acts, and the only possible approach to extend the coverage is through joint task forces with other countries to condemn and restrict the movement of these criminals.”  ALPHV ‘s Counteractions and Rule Changes  In response to the FBI’s actions, the ALPHV /BlackCat ransomware group initiated counteractions, including reclaiming control of its dark website multiple times. Notably, the group altered its rules for ransomware-as-a-service operations, expanding the scope of their attacks to include hospitals and nuclear power plants. This move marked a drastic shift in strategy, raising concerns about the potentially catastrophic consequences of their attacks.  Source: AzAl Security on X The ALPHV ransomware gang also modified its affiliate program by increasing the cut to 90%, possibly as an incentive for affiliates to remain loyal. Interestingly, reports surfaced of the LockBit ransomware attempting to poach developers and affiliates from the ALPHV /BlackCat group, showcasing the competitive landscape within the cybercriminal ecosystem.  The Cybersecurity and Infrastructure Security Agency (CISA) highlighted that, as of September 2023, ALPHV ‘s affiliates had compromised over 1,000 entities, with nearly 75% located in the United States.  The group demanded over $500 million and received almost $300 million in ransom payments. The takedown of ALPHV was part of a broader effort that also targeted other significant cyber threats, including the Kingdom Market and the dismantling of 3,500 online fraudsters.  Dark Web Conversations and Solidarity Among Cybercriminals  In follow-up events, dark web conversations between the ALPHV ransomware group and LockBit revealed an unexpected level of professionalism and solidarity. Threat actors from both groups expressed understanding and support for each other, acknowledging the collective threat posed by law enforcement agencies, particularly the FBI. These conversations shed light on the intricate dynamics within the cybercriminal community and the shared challenges they face.  The takedown of the ALPHV ransomware gang involved a multinational effort, with the FBI collaborating with around a dozen agencies, including the U.S. Department of Justice, the U.S. Secret Service, Europol, and the German Federal Criminal Police Office.   Logos from the national police forces of Australia, Spain, Estonia, Austria’s Directorate of State Security and Intelligence, the United Kingdom’s National Crime Agency, and the Eastern Region Special Operations Unit were featured on the splash page. The U.S. Rewards for Justice Program’s logo, offering rewards for information contributing to national security, was also prominently displayed.  The ALPHV /BlackCat ransomware gang, notorious for its scale and impact, has evolved its techniques to elude defense systems. The FBI and CISA revealed that the group employs advanced social engineering techniques and open-source research to gain initial access to a target’s network. Affiliates pose as company IT or helpdesk staff, using phone calls or SMS messages to obtain credentials. The group utilizes live chat to convey demands and initiate processes for restoring encrypted files.  Decline in Ransom Payments and the Changing Nature of Cybercrime  The decline in ransom payments to cybercriminal organizations like ALPHV is attributed to multiple factors. Organizations are increasingly unwilling to pay criminals residing in certain countries or associated with sanction lists. Additionally, the dishonest and unscrupulous behavior of affiliates has further deterred victims from complying with extortion demands. The landscape of ransomware attacks is shifting, with organizations opting not to pay and restoring systems from backups becoming the norm.   The LockBit ransomware group recently expressed their perspective on the ALPHV situation and acknowledged the threat posed by the FBI. LockBit highlighted the vulnerability of its own dashboard and emphasized the need for enhanced security measures. The administrators affirmed their commitment to continue operations under the LockBit brand, even in the event of a hypothetical FBI hack.  Talking about taking a stand against ransomware groups, Alexandre said, “Ransomware groups, and LockBit in special, explore typical system failures such as employees using weak passwords, absent of MFA, vulnerable and unpatched operating system and programs, excess of privilege for daily applications, non-segmented networks, and misconfigured defense products.”  “The usual recommendation for Windows systems would be adopt measures as VBS and Credential Guard, reduce privileges of applications, use resources like AppLocker, have an efficient logging configuration including auditing and ETW, restrict exposed services on the Internet (RDP and SMB are obvious, but there are other ones), perform continuous scanning on the corporate network to detect possible vulnerabilities and exposed services, have a proven-effective real backup policies implemented and, the most important actions, provide employees with awareness training to prevent them been victimized by phishing attacks”, added Alexandre.  The takedown of the ALPHV /BlackCat ransomware gang by the FBI highlights the challenges faced by law enforcement agencies in combating these notorious hacker groups. As cyber criminals adapt and evolve, law enforcement agencies face the challenge of staying ahead in the cat-and-mouse game. The intricate dynamics among cybercriminal groups, as revealed in dark web conversations, provide insights into the motivations and challenges within the underground ecosystem.  Conclusion  The FBI’s takedown of the ALPHV /BlackCat ransomware gang marks a significant step in the ongoing battle against cybercrime. The collaborative effort involving multiple international agencies highlights the global nature of ransomware groups and the combined cybercrime market. The evolving strategies of ransomware groups and the changing realm of ransom payments emphasize the need for continuous vigilance and adaptive cybersecurity measures to protect organizations and individuals from these malicious threats.   Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

 Malware and Vulnerabilities

The Alpha ransomware operation appears to be linked to the previously inactive NetWalker ransomware, suggesting a potential revival or acquisition of the original payload.

 Cybersecurity News

By Anastasios Arampatzis, Cybersecurity Writer, Bora Design In today’s digital age, APIs have become the backbone of software communication. They are the unsung heroes that enable our apps to interact seamlessly, creating a symphony of data exchange that powers everything from social media platforms to financial   show more ...

services. However, as crucial as they are, APIs also represent a significant security risk. Salt’s State of API Security Report Q1:2023 reveals that APIs have become a prime target for attackers. Within a six-month period, unique attackers have grown by 400%. Despite this alarming statistic, 30% of respondents admitted to having no API security strategy in place. With the rise of cyber threats, understanding and mitigating API security risks is not just an option; it’s a necessity. In this blog, we’ll embark on a journey through the labyrinth of API security. We’ll uncover the top risks that lurk in the shadows and arm you with the knowledge to defend against them. So, let’s dive in and turn these potential pitfalls into stepping stones for building more robust systems. Unearthing the Security Risks The Open Web Application Security Project (OWASP) released its first API Security Top 10 list of vulnerabilities in 2019 to help the API security industry better understand the most common API attacks. An updated list was released in 2023, which includes the ten most significant API vulnerabilities. Among these, the most common vulnerabilities are:  Broken Object Level Authorization (BOLA)  Imagine you have a vault where each customer’s valuables are stored in separate boxes. Now, what if, due to a security flaw, a customer could access not just their box but everyone else’s? This is what happens with Broken Object Level Authorization (BOLA) in the world of APIs. BOLA is the most common and critical security risk, where APIs fail to adequately secure objects when clients request them. This can lead to unauthorized access and data breaches, compromising user data.  Broken User Authentication  User authentication is like the front door to your API’s house. If the lock on this door is weak, attackers can easily break in. Broken User Authentication happens when APIs are not strict enough in verifying the identity of their users. This lax security can lead to unauthorized access to sensitive data and functions, making it a prime target for attackers. Excessive Data Exposure  APIs are designed to share data, but what if they share too much? Excessive data exposure occurs when an API exposes more data than is necessary for its intended function. For example, an API meant to display user profiles in an app might inadvertently reveal sensitive information like addresses or payment details. This oversharing not only violates user privacy but also becomes a goldmine for attackers. Lack of Resource and Rate Limiting  Without proper resource and rate limiting, an API is like an all-you-can-eat buffet. This can lead to system overload, where too many requests deplete the system’s resources. Attackers can exploit this by launching DDoS attacks, rendering the API and, by extension, the application, unusable for legitimate users. Injection Flaws  Injection flaws are like tricking a guard into unlocking a door. They occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data tricks the interpreter into executing unintended commands or accessing unauthorized data. Common injection flaws include SQL, NoSQL, and Command Injection, each capable of inflicting serious damage.  Fortifying Your Defenses  APIs are challenging to protect. Traditional solutions can’t handle the complexities of the API ecosystem. Attackers know this, which is why they focus on APIs. The following best practices can help you improve your API security posture:  Implement Proper Authentication and Authorization  Just like having a reliable security system in your home, implementing robust authentication and authorization is vital. It’s essential to use strong, industry-standard protocols like OAuth 2.0 and OpenID Connect. Implement multi-factor authentication for added security and ensure that tokens and credentials are stored and transmitted securely. Remember, a lock is only as strong as its key management.  Data Encryption and Protection Protecting data is akin to safeguarding the crown jewels. Always encrypt sensitive data, both in transit (using TLS) and at rest. Employ best practices like using strong encryption algorithms and regularly updating your encryption keys. It’s not just about keeping the data safe, but also ensuring that even if someone gets their hands on it, it remains an indecipherable puzzle.  Throttling and Rate Limiting  Imagine a highway with no speed limits or traffic lights — chaos, right? That’s what an API without throttling and rate limiting looks like. Implementing these controls helps prevent abusive patterns or brute force attacks. Set practical limits on how often your API can be called to maintain availability and service integrity.  Input and Output Validation This is about ensuring that what goes in and out of your API is exactly what should. Input validation helps in filtering out harmful data that might lead to injection attacks. Similarly, output validation ensures that your API doesn’t reveal more than it should. Think of it as having a bouncer for data — only letting in and out what’s appropriate. Regular Security Audits and Penetration Testing Staying ahead of potential threats is key. Regularly conducting security audits and penetration testing on your APIs can uncover vulnerabilities before attackers can exploit them. Think of these as routine health check-ups for your API, ensuring it’s in top shape to face any security challenges.  Automate API Security  The best protection for APIs is the use of automated security tools with API security in mind. In the world of API security, automated tools are like having a 24/7 security guard. Tools such as static and dynamic application security testing (SAST/DAST) solutions can automatically detect vulnerabilities in your API code and runtime environment. Implementing these tools helps in maintaining a continuous check on your API’s security posture. However, having extra assistance is always welcomed. Leveraging artificial intelligence for anomaly detection can be a game-changer. AI algorithms can analyze patterns in API traffic and identify anomalies that could indicate a security breach. This is like having a highly intelligent detective constantly looking for clues of any misbehavior in your API traffic. Preparing for the Worst: Incident Response  Even the best defenses may sometimes be breached. This is where a solid incident response plan comes into play. It’s like having a fire escape plan in a building; you hope never to use it, but it’s vital for safety. Your plan should outline clear steps to be taken in the event of a breach, including identifying the breach, containing the damage, eradicating the threat, recovering systems, and notifying affected parties.  As the API security landscape is constantly evolving, continuous monitoring of your ecosystem is crucial for early detection of any suspicious activities. Learning from past incidents, staying updated with the latest security trends, and adapting your defenses accordingly is not just a strategy; it’s necessary in today’s fast-paced digital world. Conclusion  API security is not a one-time fix but a continuous process of improvement and adaptation. By doing so, you not only protect your systems but also build trust with your users – a priceless asset in the digital world.  As we conclude, I invite you to take a moment to reflect on your current API security measures. Are there areas you can improve? Have you overlooked any potential vulnerabilities? Use this blog as a starting point to assess and enhance your API security posture.  Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

 Feed

Google has announced that it's open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types. "Magika outperforms conventional file identification methods providing an overall 30% accuracy boost and up to 95% higher precision on traditionally hard to identify, but potentially problematic content

 Feed

Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses, misunderstandings, delays, and overlaps. Externally, frustration-free customer communication is directly correlated to a positive customer experience and higher satisfaction.  However, business communication channels are also a major target

 Cyber Security News

Source: www.proofpoint.com – Author: 1 The Bumblebee malware loader seemingly vanished from the internet last October, but it’s back and – oddly – relying on a vintage vector to try and gain access. First spotted in 2022 by researchers at Proofpoint – who identified it as an apparent   show more ...

replacement for BazarLoader – Bumblebee was originally […] La entrada Bumblebee malware wakes from hibernation, forgets what year it is, attacks with macros – Source: www.proofpoint.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Campaign

Source: www.proofpoint.com – Author: 1 PSA: CHECK YOUR INSTANCE FOR COMPROMISE — The wide range of employee roles targeted indicates attacker’s multifaceted approach. Dan Goodin – Feb 12, 2024 11:41 pm UTC Getty Images Hundreds of Microsoft Azure accounts, some belonging to senior executives, are   show more ...

being targeted by unknown attackers in an ongoing campaign that’s […] La entrada Ongoing campaign compromises senior execs’ Azure accounts, locks them using MFA – Source: www.proofpoint.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.proofpoint.com – Author: 1 Email providers like Google, Yahoo, and Apple are turning up the dial on email authentication requirements: Bulk email senders will need to adopt the open-source specification known as—deep breath—Domain-based Message Authentication Reporting and Conformance, or DMARC.   show more ...

And plenty of orgs don’t have a DMARC policy in place, which means emails […] La entrada Some DMARC questions answered, as deadlines near – Source: www.proofpoint.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Apple

Source: www.techrepublic.com – Author: Megan Crouse OpenAI released on Feb. 15 an impressive new text-to-video model called Sora that can create photorealistic or cartoony moving images from natural language text prompts. Sora isn’t available to the public yet; instead, OpenAI released Sora to red teamers —   show more ...

security researchers who mimic techniques used by threat actors […] La entrada OpenAI’s Sora Generates Photorealistic Videos – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: www.techrepublic.com – Author: Jonathan Kalibbala A passphrase functions as a password, granting you access to a system or application, but instead of a string of random characters, it’s a combination of words, numbers and symbols. Passphrases are typically longer than passwords and easier to remember   show more ...

since they can be composed of a series of […] La entrada What Is a Passphrase? Examples, Types & Best Practices – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Team Register Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give IT network defenders and others better automated tools. Working out the true contents of a user-submitted file   show more ...

is perhaps harder than it looks. It’s not safe to […] La entrada Google open sources file-identifying Magika AI for malware hunters and others – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Team Register A Ukrainian cybercrime kingpin who ran some of the most pervasive malware operations faces 40 years in prison after spending nearly a decade on the FBI’s Cyber Most Wanted List. Vyacheslav Igorevich Penchukov, 37, pleaded guilty this week in the US to two   show more ...

charges related to his leadership role […] La entrada Zeus, IcedID malware kingpin faces 40 years in slammer – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cutting

Source: go.theregister.com – Author: Team Register The murder of 16-year-old schoolgirl Brianna Ghey has kickstarted a debate around limiting children’s access to the dark web in the UK, with experts highlighting the difficulty in achieving this. Ciaran Martin, the National Cyber Security Centre’s   show more ...

first CEO and current Oxford University professor, weighed into the discussion on […] La entrada Cutting kids off from the dark web – the solution can only ever be social – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.schneier.com – Author: Bruce Schneier HomeBlog Friday Squid Blogging: Vegan Squid-Ink Pasta It uses black beans for color and seaweed for flavor. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.   show more ...

Tags: squid Posted on […] La entrada Friday Squid Blogging: Vegan Squid-Ink Pasta – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 convergence

Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Welcome to CISO Corner, Dark Reading’s weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we’ll offer articles gleaned from across our news operation,   show more ...

The Edge, DR Technology, DR Global, and our Commentary section. We’re committed to bringing […] La entrada CISO Corner: CIO Convergence, 10 Critical Security Metrics, & Ivanti Fallout – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Agam Shah, Contributing Writer Source: Science Photo Library via Alamy Stock Photo Researchers from OpenAI, Cambridge University, Harvard University, and University of Toronto offered “exploratory” ideas on how to regulate AI chips and hardware, and how security   show more ...

policies could prevent the abuse of advanced AI. The recommendations provide ways to measure […] La entrada What Using Security to Regulate AI Chips Could Look Like – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Dark Reading Staff Source: WrightStudio via Adobe Stock In what is being referred to as a “Tech Accord,” major technology companies are showing that they are willing to work together in order to combat artificial intelligence (AI)-generated content that could   show more ...

threaten democratic elections globally this year. The draft of the accord […] La entrada Major Tech Firms Develop ‘Tech Accord’ to Combat AI Deepfakes – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Edge Editors Source: Strategic Security Survey, Dark Reading The sheer volume of data breaches and cyberattacks means these incidents are now more visible than ever. Long gone are those days when affected organizations would wait till late Friday afternoons to disclose   show more ...

incidents in hopes of burying the news. The heightened focus […] La entrada Enterprises Worry End Users Will be the Cause of Next Major Breach – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The ALPHV/Blackcat ransomware gang has claimed responsibility for the recent network breaches of Fortune 500 company Prudential Financial and mortgage lender loanDepot. The two companies were added to ALPHV’s dark web leak site today, with the   show more ...

threat actors still having to publish proof of their claims. ALPHV plans to […] La entrada ALPHV ransomware claims loanDepot, Prudential Financial breaches – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Wyze Labs is investigating a security issue while experiencing a service outage that has been causing connectivity issues since this morning. In an incident report posted at 6:31 AM PT, the company blamed today’s camera and login issues on an AWS   show more ...

connectivity problem. “We are aware of an issue […] La entrada Wyze investigating ‘security issue’ amid ongoing outage – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan SolarWinds has patched five remote code execution (RCE) flaws in its Access Rights Manager (ARM) solution, including three critical severity vulnerabilities that allow unauthenticated exploitation. Access Rights Manager allows companies to manage and   show more ...

audit access rights across their IT infrastructure to minimize insider threat impact and more. CVE-2024-23476 and […] La entrada SolarWinds fixes critical RCE bugs in access rights audit solution – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Access Management

Source: heimdalsecurity.com – Author: Cristian Neagu Since the earliest days of technology, hackers and cybersecurity professionals have been locked in a cat-and-mouse game, each inventing more innovative ways of outsmarting the other. In 2024, that resulted in an increasingly complex landscape of privileged   show more ...

threat vectors for organizations to defend against. This creates a key challenge […] La entrada How to Defend Against the 10 Most Dangerous Privileged Attack Vectors – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-02
Aggregator history
Saturday, February 17
THU
FRI
SAT
SUN
MON
TUE
WED
FebruaryMarchApril