Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for This Week on TCE Cyb ...

 Cybersecurity News

The digital world continues to spin at breakneck speed, and this week's TCE Cyberwatch brings you the latest updates on the ever-present dance between innovation and security. We delve into the exciting possibilities of Artificial Intelligence (AI), from its role in boosting corporate profits to its potential for   show more ...

national security advancements. However, the path to progress is rarely smooth. In TCE Cyberwatch, we also explore the persistent threat of cybercrime, with recent data breaches and malicious hacking attempts serving as reminders of our vulnerabilities. Encouragingly, governments around the world are taking a more proactive stance, implementing stricter regulations and pursuing those who exploit weaknesses in our digital infrastructure. As you'll see, this week's TCE Cyberwatch offers a comprehensive look at the current cybersecurity landscape, highlighting both the challenges and the glimmers of hope for a more secure future. TCE Cyberwatch: A Weekly Round-Up Keep reading to ensure your safety and stay up to date with the cyber world. U.S. Charges Four Iranians with Hacking Government Agencies and Defense Contractors Four Iranians in the U.S. were accused of alleged allegiance with hacking operations which attacked entities like the U.S. Treasury and State departments, defence contractors, and two New York-based companies. The Treasury Department of the U.S. believes that all four individuals have ties to IRGC front companies. Hossein Harooni, Reza Kazemifar, Komeil Baradaran Salmani, and Alireza Shafie Nasab can face up to five years in prison for computer fraud conspiracy charges and up to 20 years for each count of wire fraud and conspiracy to commit wire fraud. Speaking on the development, Attorney General Merrick Garland stated,“ Criminal activity originating from Iran poses a grave threat to America’s national security and economic stability… These defendants are alleged to have engaged in a coordinated, multi-year hacking campaign.” Read More Indian Telecom Giant BSNL Suffers Data Breach, Millions Potentially Affected Bharat Sanchar Nigam Limited (BSNL), a major telecommunications provider owned by the Indian government, faced a data breach a while ago which has resurfaced and been claimed by threat actor ‘Perell’. They released a database which allegedly belongs to BSNL and contains more than 2.9 million records. Perell claims that the stolen data includes sensitive information from BSNL, and that although it claimed to be from BSNL in 2024, it actually comes from around 2023. However, it still raises concerns as it is of a large quantity and contains sensitive information. Read More  Cybersecurity Giant Darktrace Acquired by Thoma Bravo for $4.6 Billion Thoma Bravo, a U.S.-based private equity firm, recently acquired the British cybersecurity giant Darktrace for $4.6 billion. This acquisition carries significant implications for both companies and the cybersecurity industry at large. Following the announcement, Darktrace's shares surged by approximately 19%, demonstrating investor confidence in the deal. Shareholders of Darktrace could now receive $7.75 for each share they hold, marking a 44.3% increase compared to recent stock prices. Darktrace, renowned for its AI-based cybersecurity solutions, has experienced a surge in demand for its services. Read More Global Operation Shuts Down LabHost, Arrests 37 An online service called Lab Host, operating in 19 countries, which sells phishing kits to cybercriminals, has recently been shut down. It is alleged that they have made almost a million dollars from this activity and have directly and indirectly attacked thousands of people. Lab Host has been in operation since 2021 and provides tools for hackers to create fake websites that deceive people into revealing sensitive information such as email addresses, passwords, and bank details. Following the shutdown, 37 people were arrested, and London’s police reported that 2,000 users were registered on the site, paying a monthly subscription fee. Lab Host is reported to have obtained 480,000 bank card numbers, 64,000 PIN numbers, and around 1 million passwords. Read More Big Fines for AT&T, Verizon, T-Mobile in Privacy Scandal Major phone carriers AT&T, Sprint, T-Mobile, and Verizon have been fined a total of $200 million for illegal data sharing of customer locations with third parties. T-Mobile, AT&T, and Verizon were fined approximately $80 million, $57 million, and $47 million, respectively. These companies sold customer location data to aggregators, who then resold it to third parties. AT&T had connections with two aggregators, LocationSmart and Zumigo, which were then linked to third-party location-based service providers. According to the FCC, "In total, AT&T sold access to its customers’ location information (directly or indirectly) to 88 third-party entities." Informally, all three phone carriers stated that the program in question ended about five years ago. Read More UK Cracks Down on Weak Passwords: "Admin123" No Longer an Option The UK Government is banning weak passwords such as "admin" or "12345" to bolster cybersecurity. The initiative, named the 'UK Product Security and Telecoms Infrastructure (PSTI) Act 2022', mandates that manufacturers, distributors, and importers of products and services for UK consumers adhere to these new rules. Manufacturers and other vendors face significant fines for non-compliance. They could be fined up to £10 million, four percent of their global turnover, or £20,000 per day for ongoing violations. This move signals the government's commitment to tackling cybersecurity issues. Read More ChatGPT Accused of Privacy Violations and Inaccurate Information ChatGPT has recently faced criticism from a privacy advocacy group, along with the Austrian data protection authority (DSB), for generating inaccurate information that violates European Union privacy regulations. Noyb, the privacy advocacy group, pointed out that ChatGPT's method of guessing instead of providing accurate information poses problems. They also claim that OpenAI, the company behind the AI, refuses to correct inaccurate responses and is reluctant to share information about its data processing practices. Read More  Okta Warns of Surge in Password Reuse Attacks Okta recently issued a warning about a surge in credential stuffing attacks, in which usernames and passwords obtained from previous data breaches and attacks are used to target accounts. According to Okta, they have "observed an increase in the frequency and scale of credential stuffing attacks targeting online services, facilitated by the broad availability of residential proxy services, lists of previously stolen credentials, and scripting tools." This spike in credential stuffing attacks is believed to be linked to brute force attacks, as warned by Cisco a few weeks earlier. Cisco had observed a rise in attacks on VPN services, web application authentication interfaces, and others since around March 18. To address this, Okta recommends blocking requests from suspicious services, ensuring the use of secure passwords, implementing multi-factor authentication (MFA), and remaining vigilant in monitoring any suspicious activity. Read More To Wrap Up This week's TCE Cyberwatch painted a vivid picture of the ever-evolving cybersecurity landscape. While advancements like AI offer exciting possibilities, they necessitate enhanced security measures to mitigate potential risks. The increasing focus on regulations and enforcement by governments worldwide signifies a collective effort to combat cybercrime. Remember, staying informed and practicing safe online habits are crucial in protecting yourself from cyber threats. TCE Cyberwatch remains committed to keeping you informed about the latest cybersecurity developments. By staying vigilant and taking proactive measures, we can navigate the digital age with greater confidence and security. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

image for Massive Data Breach  ...

 Cyber Essentials

A cyberattack targeting a Victorian company has resulted in the exposure of personal data belonging to thousands of victims of family violence and sexual assault, as well as about 60,000 current and former students at Melbourne Polytechnic. Monash Health Data Breach Monash Health, the state's largest health   show more ...

service, confirmed it was caught in the cross-hairs of a data breach, which also affected government entities that were clients of the company ZircoDATA. Monash Health, Victoria's largest health service, found itself entangled in the aftermath of a data breach, which compromised sensitive information collected by family violence and sexual support units between 1970 and 1993. The breach, attributed to an unauthorized third party gaining access to the systems of document-scanning business ZircoDATA, impacted approximately 4000 individuals who had sought support from these vital services. The disclosure of details about the sexual violence and assault support units has been deeply distressing for affected victim-survivors. The breach, which involved personal data collected over decades, has raised concerns about the safety and privacy of those who relied on these support services during times of vulnerability. Amid the fallout from the breach, efforts have been underway to mitigate the risks and support those affected. Monash Health, in collaboration with relevant authorities, has been diligently verifying the identities and addresses of the impacted individuals before initiating contact, ensuring that victims are not inadvertently exposed to further harm. “The majority of these entities are still in the process of working with ZircoDATA to identify impacted data and any victims, and are yet to begin notifying impacted individuals,” newly appointed coordinator Lieutenant-General Michelle McGuinness said in a statement on X. In addition to Monash Health, other government entities that were clients of ZircoDATA have also been affected by the breach but “the impact for most government entities is likely to be minimal,” the National Cyber Security Coordinator said. The breach has prompted federal authorities, including the Australian Federal Police, to launch investigations and coordinate responses to address the scope of the incident and safeguard affected individuals. ZircoDATA Breach Also Impacts Melbourne Polytechnic Meanwhile, Melbourne Polytechnic, a prominent educational institution, announced that enrollment information for 60,000 past and present students, stored by ZircoDATA, had been accessed in the breach. Although the breach primarily involved "low-risk identity attributes," the institution has taken proactive steps to offer affected individuals access to cyber support and identity services. The cybersecurity landscape continues to evolve rapidly, with healthcare emerging as one of the sectors most vulnerable to cyberattacks. A recent report by cybersecurity firm Sophos revealed that healthcare was one of only five sectors to report an increase in cyberattacks over the last year, highlighting the urgent need for heightened vigilance and resilience in safeguarding sensitive data and critical infrastructure. As organizations grapple with the aftermath of data breaches, there is a pressing need to strengthen cybersecurity measures and response protocols to effectively mitigate risks and protect individuals' privacy and security. Collaborative efforts between government agencies, healthcare providers, educational institutions, and cybersecurity experts are essential in addressing the complex challenges posed by cyber threats and ensuring the resilience of our digital infrastructure. In the wake of this cyberattack, authorities have emphasized the importance of transparency, accountability, and support for those affected. By prioritizing the safety and well-being of individuals impacted by data breaches, we can collectively work towards building a more secure and resilient digital ecosystem that safeguards the privacy and security of all stakeholders. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

image for Information security ...

 Business

As usual, for May the 4th (MTFBWY), were publishing a report for Star Wars fans, telling how a long time ago in a galaxy far away the Empire was negligent about information security. This years report subject is the just-concluded third season of the Star Wars: The Bad Batch animated series. As usual, we have to warn   show more ...

that the text below may contain spoilers. Despite seemingly not the most serious format, the plot twists and overall coherence of the narrative in The Bad Batch are much better than in most recent live action series and movies. Ever since in the ninth episode Palpatine Somehow Returned, Lucasfilm creative director Dave Filoni has been trying to justify this return logically, at least to some extent. Therefore, the plot of the new animated series revolves around the Project Necromancer, conducted at the top-secret Tantiss base. And this is just what we need — a secret scientific institution, with unprecedented (for the Galactic Empire) protective systems, which, nevertheless, regularly fail. Measures to protect the secrecy of the Tantiss bases location Doctor Hemlock, leader of the Tantiss base and head of the Project Necromancer, has the full trust of the Emperor and unlimited resources. One of his tasks is to ensure the security and secrecy of the base. And unlike most of the Imperial leaders weve seen before, he approaches his task responsibly. Theres no information about the location of this facility in any imperial database. This, of course, causes certain difficulties with supply-ship flights — Hemlock put safeguards in place to make the coordinates to his base a secret. Any ship heading to Tantiss base must dock with Imperial Station 003 in the orbit of the Coruscant, capital of the Galactic Empire, and undergo a thorough check, which includes an inspection of the entire crew. The access code needed for docking changes once every rotation. Tantisss coordinates are downloaded directly into the ships navigation computer immediately after takeoff and are somehow not stored there. Obviously, they are downloaded from some isolated computer, since this data isnt accessible from the base network. Even accessing the stations manifest, which stores information about ship destinations, requires a separate access card. Science ships that fly to Tantiss use enhanced safety protocols. In particular, theyre equipped with proximity sensors that detect suspicious objects near the ships hull (its totally unclear why this technology isnt used anywhere else in the Empire). In addition, when someone is accessing the flight computer through the connection port for droids, an alarm signal is sent to the pilots console. And this is the first case of at least some cyberprotection of this data port. Why these measures arent enough Unfortunately, all precautions turn out to be completely pointless. The main characters of the series, Clone Force 99, dock with the station using a recently stolen shuttle, with a still valid clearance code in its computer. Their unscheduled arrival of course arouses certain suspicions, but a defector in an officers uniform who joins the clone squad uses social engineering methods to convince base personal that his arrival at the station is legitimate. He advise some suspicious officers to contact their superiors (and no one wants to contact Admiral Tarkin), and dismisses the door guards from their posts by threatening them with some article 15 of Imperial Standing Order 10. Next, Echo, a clone with a bunch of cybernetic enhancements, connects directly to the base computer through the droids port and finds out which ship is heading to the Tantiss base. He gets on board the science vessel through a separate dock for droid loading — for some reason nobody controls it, while the human crew is being thoroughly scanned! On board the shuttle, he connects to a similar droid port and it indeed triggers a signal of unscheduled droid activity in the cargo hold, but Echo simply stuns the trooper sent to investigate, and through his communicator assures that everything is fine: it was a malfunction. And then simply turns off the proximity sensors. How to avoid repeating imperial mistakes: equip all computer systems that have a droid connection port with an alarm system in case of an unauthorized connection — not just those located in the hold of science ships; periodically conduct security awareness trainings for the base crew. In particular, teach them to recognize social engineering methods. Tantiss base defenses Tantiss base also employs several protection technologies unique to the Imperial facilities. For example, the droids working at the station are capable of remotely triggering an alarm. But the main cybersecurity innovation is that access to a number of key scientific systems and zones is possible only after connecting an employees personal datapad through a special cradle. Those datapads are well encrypted; they stop working when taken away from the base, and activation of lockdown mode in the lab makes all datapad cradles inoperable. The outer perimeter of the base is guarded, among other things, with the help of trained local predators (lurca hounds). There are tunnels leading to their stables at the base, but they are protected by force fields, activated on a signal from the supervisor. Moreover, the tunnels have some presence sensors that sound an alarm when unexpected activity is detected. The central laboratory in which the experimental subjects are kept is protected not only by security squads and force fields, but also by a door locked with a special key (only Hemlock himself and the chief scientist of the base have copies of the same key). Regular blood samples are taken from the experimental subjects by medical droids and are sent through technological tunnels (opened also by medical droids). Why these measures arent enough Personal datapads dont have their own authentication system. If an attacker manages to get hold of the device, hell be able not only to open doors and operate elevators, but also gain access to classified information systems (and even drop heavy containers on droids). Yes, datapads are encrypted, but the encryption can be bypassed by connecting one to any Imperial terminal, at any Imperial base. The motion detectors in the lurca tunnels dont activate protection mechanisms automatically. The order is given by an officer, and he may not be fast enough. The technological tunnels for transporting blood samples are large enough for experimental subjects to crawl through. The hatches covering those tunnels can be opened mechanically using stolen medical instruments. They can also be used not only to paralyze a medical droid, but also to reprogram one. Access to some systems doesnt require authentication at all. In particular, the field that restrains a dangerous and practically invulnerable animal (Zillo Beast) is turned off from a nearby control panel by pressing several buttons and pulling one lever. And were talking about an animal capable of destroying the base entirely. Unauthorized connections to droid ports that are scattered throughout the base are once again not controlled in any way. However, theres a system on the shuttle thats capable of monitoring such activity! Moreover, at some point the attackers try to connect to the blood testing station, but are denied access. And this failed attempt to access classified information doesnt cause any alarm. And the final touch: theres no data backup for research materials on which the future of the Empire depends. One grenade exploded in a research laboratory is enough for all the results of Dr. Hemlocks activities to be irretrievably lost. How to avoid making the same mistakes: it makes sense to make backup copies of critical information and store it on media isolated from the network in a separate room; all systems that provide access to classified information or to secret premises must be equipped with a two-factor authentication system; strictly speaking, what this scientific base lacks is something like a SIEM system that can manage security data and events. It can analyze cybersecurity events from various information systems, such as loss of signal from droids, access attempts and so on. It can even automate responses to those alerts – turn on isolation mode, force fields and alarms when necessary. But in general, advancements in defense systems cannot be denied — other Imperial institutions weve seen in the Star Wars universe lack such a level of protection. But, as usual, its hard to call it progress. After all, this is a kind of prequel: the series takes place 18 years before the Battle of Yavin — the Death Star incident occurred much later. So the screenwriters probably would have to explain this in subsequent movies and animated series.

image for Transatlantic Cable  ...

 News

Episode 345 of the Transatlantic Cable podcast kicks off with a story from the U.S, where a Pew survey suggested that most Americans feel that social media platforms have too much political power and influence. From there the team discuss news that ChatGPT can hack software vulnerabilities and the U.K becomes the   show more ...

first country in the world to ban simple passwords such as 123456 or password for smart devices. If you liked what you heard, please consider subscribing. Social media companies have too much political power, 78% of Americans say in Pew survey Could ChatGPT be the next big cybersecurity worry Admin and 12345 banned from being used as passwords in UK crackdown on cyber attacks

 Feed

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the U.K., and the U.S. The Czech Republic's Ministry of Foreign Affairs (MFA), in a statement, said some unnamed

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 North Korean threat actors are exploiting weak email policies to spoof legitimate domains during espionage phishing campaigns, a new US government advisory has warned. The FBI, the US Department of State and the National Security Agency (NSA) said North   show more ...

Korea-linked Kimsuky group is exploiting poorly configured DNS Domain-based Message Authentication, […] La entrada North Korean Hackers Spoofing Journalist Emails to Spy on Policy Experts – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: 1 Indonesia has become a hub for spyware and surveillance tools that threaten citizens’ rights and privacy, Amnesty International has found. Building on existing research into the sale of surveillance technologies to Indonesia, the NGO has conducted a   show more ...

months-long investigation in collaboration with several media outlets in Switzerland, Greece, Israel and […] La entrada Indonesia is a Spyware Haven, Amnesty International Finds – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini LockBit published data stolen from Simone Veil hospital in Cannes LockBit ransomware operators have published sensitive data allegedly stolen from the Simone Veil hospital in Cannes. In April, a cyber attack hit the Hospital Simone Veil in Cannes   show more ...

(CHC-SV), impacting medical procedures and forcing personnel to return to pen and paper. […] La entrada LockBit published data stolen from Simone Veil hospital in Cannes – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 APT

Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked APT28 and crooks are still using the Moobot botnet The Ubiquiti EdgeRouter botnet is still used by Russia-linked group APT28 and cybercriminals organizations. Trend Micro researchers reported that the EdgeRouter botnet, called Moobot, used   show more ...

by the APT28 group is still active and is also used by cyber criminal organizations. […] La entrada Russia-linked APT28 and crooks are still using the Moobot botnet – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Android

Source: securityaffairs.com – Author: Pierluigi Paganini Dirty stream attack poses billions of Android installs at risk Microsoft devised an attack technique, dubbed ‘Dirty Stream,’ impacting widely used Android applications, billions of installations are at risk. Microsoft is warning Android users about a   show more ...

new attack technique, named Dirty Stream, that can allow threat actors to take control […] La entrada Dirty stream attack poses billions of Android installs at risk – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini ZLoader Malware adds Zeus’s anti-analysis feature Zloader continues to evolve, its authors added an anti-analysis feature that was originally present in the Zeus banking trojan. Zloader (aka Terdot, DELoader, or Silent Night) is a modular trojan based   show more ...

on the leaked ZeuS source code. After a hiatus of almost two […] La entrada ZLoader Malware adds Zeus’s anti-analysis feature – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: Stevin By Milica D. Djekic There are a plenty of methods to determine someone’s identity and the most convenient cases are through fingerprint, iris detection, DNA and so on, while some of those indicators have become part of the biometrics IDs which serve in   show more ...

accurately being confident about who someone is, […] La entrada Identity Management Challenges – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cybertalk.org – Author: slandau Gary Landau has been leading IT and information security teams for over 25 years as part of startups as well as large global organizations. He is currently a Field CISO with Unisys Security Services, where he supports companies in many different industries. His mantra   show more ...

is “keep making it better” and […] La entrada Mastering cyber threat prevention and maximizing opportunities – Source: www.cybertalk.org se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido SAN FRANCISCO — On the eve of what promises to be a news-packed RSA Conference 2024, opening here on Monday, Microsoft is putting its money where its mouth is. Related: Shedding light on LLM vulnerabilities More precisely the software titan   show more ...

is putting money within reach of […] La entrada MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’ – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: bacohido At the start, Distributed Denial of Service (DDoS) attacks were often motivated by bragging rights or mischief. Related: The role of ‘dynamic baselining’ DDoS attack methodology and defensive measures have advanced steadily since then. Today, DDoS campaigns   show more ...

are launched by political activists, state-sponsored operatives and even by business rivals. Targets […] La entrada RSAC Fireside Chat: The necessary care and feeding of DDoS detection and protection systems – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: bacohido By Ahmed Abdelhalim Businesses today need protection from increasingly frequent and sophisticated DDoS attacks. Service providers, data center operators, and enterprises delivering critical infrastructure all face risks from attacks. Related: The care and feeding   show more ...

of DDoS defenses But to protect their networks, they’ll need to enable accurate attack detection while […] La entrada GUEST ESSAY: A primer on how, why ‘dynamic baselining’ fosters accurate DDoS protection – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.lastwatchdog.com – Author: cybernewswire Tel Aviv, Israel, May 2, 2024, CyberNewsWire — LayerX, pioneer of the LayerX Browser Security platform, today announced $26 million in Series A funding led by Glilot+, the early-growth fund of Glilot Capital Partners, with participation from Dell   show more ...

Technologies Capital and other investors. Lior Litwak, Managing Partner at Glilot Capital […] La entrada News alert: LayerX Security raises $26M Series A funding for its ‘enterprise browser’ security platform – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Corner

Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Source: Image Source Limited via Alamy Stock Photo Welcome to CISO Corner, Dark Reading’s weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we’ll offer   show more ...

articles gleaned from across our news operation, The Edge, DR Technology, DR Global, […] La entrada CISO Corner: Verizon DBIR Lessons; Workplace Microaggression; Shadow APIs – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI-powered

Source: www.darkreading.com – Author: PRESS RELEASE Dazz, the leader in security remediation, today announced new capabilities in the Dazz Unified Remediation Platform, including automated code-fixes for container vulnerabilities, AI-driven remediation guidance, and new platform connections with   show more ...

industry-leading security tools. These major advancements will enable cybersecurity teams to use AI and automation to prioritize critical issues, […] La entrada Dazz Unveils AI-Powered Automated Remediation for Application Security Posture Management – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: PRESS RELEASE SANTA CLARA, Calif., May 2, 2024 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, announced its latest innovations to future-proof and transform the workforce with the launch of Prisma® SASE 3.0. Prisma SASE 3.0   show more ...

now delivers Zero Trust to secure both managed and unmanaged devices with the industry’s first natively integrated […] La entrada Palo Alto Networks Delivers Comprehensive SASE Capabilities – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Acquire

Source: www.darkreading.com – Author: PRESS RELEASE New York and Tel Aviv, May 2, 2024 – BioCatch (the “Company”), the global leader in digital fraud detection and financial crime prevention powered by behavioral biometric intelligence, today announced that Permira Growth Opportunities II   show more ...

(the “Fund”), a fund advised by global private equity firm Permira, has agreed to acquire a majority position […] La entrada Permira to Acquire Majority Position in BioCatch at $1.3B Valuation – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Image: Midjourney A Mullvad VPN user has discovered that Android devices leak DNS queries when switching VPN servers even though the “Always-on VPN” feature was enabled with the “Block connections without VPN” option.   show more ...

“Always-on VPN” is designed to start the VPN service when the device boots and keep it running while the […] La entrada Android bug can leak DNS traffic with VPN kill switch enabled – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The NSA and FBI warned that the APT43 North Korea-linked hacking group exploits weak email Domain-based Message Authentication Reporting and Conformance (DMARC) policies to mask spearphishing attacks. Together with the U.S. State Department, the two   show more ...

agencies cautioned that the attackers abuse misconfigured DMARC policies to send spoofed emails which […] La entrada NSA warns of North Korean hackers exploiting weak DMARC email policies – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Lawrence Abrams Google has rolled back a recent release of its reCaptcha captcha script after a bug caused the service to no longer work on Firefox for Windows. Yesterday, BleepingComputer received multiple reports that reCaptcha stopped working in the latest version   show more ...

of Mozilla Firefox, with the issues also reported on Twitter and Reddit. BleepingComputer tested […] La entrada Google rolls back reCaptcha update to fix Firefox issues – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Sergiu Gatlan ​NATO and the European Union, with international partners, formally condemned a long-term cyber espionage campaign against European countries conducted by the Russian threat group APT28. Germany said on Friday that the Russian threat group was behind an   show more ...

attack against the Executive Committee of the Social Democratic Party, compromising many […] La entrada NATO and EU condemn Russia’s cyberattacks against Germany, Czechia – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 BLEEPINGCOMPUTER

Source: www.bleepingcomputer.com – Author: Bill Toulas Microsoft announced that Windows users can now log into their Microsoft consumer accounts using a passkey, allowing users to authenticate using password-less methods such as Windows Hello, FIDO2 security keys, biometric data (facial scans or fingerprints),   show more ...

or device PINs. Microsoft “consumer accounts” refer to personal accounts for accessing Microsoft […] La entrada Microsoft rolls out passkey auth for personal Microsoft accounts – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.databreachtoday.com – Author: 1 Next-Generation Technologies & Secure Development , Threat Hunting , Threat Intelligence Why Customers Benefit From Bringing Threat Hunting and Threat Intelligence Together Michael Novinson (MichaelNovinson) • May 3, 2024     Jason Passwaters, CEO, Intel 471   show more ...

(Image: Intel 471) Intel 471 has purchased a threat hunting startup led by a […] La entrada How Intel 471’s Buy of Cyborg Is Reshaping Threat Hunting – Source: www.databreachtoday.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 cloud

Source: www.databreachtoday.com – Author: 1 Cloud Data Security & Resilience , Cloud Security , Cloud-Native Application Protection Platform (CNAPP) Presented by Palo Alto Networks     In-Person Event     Join Palo Alto Networks for an in-person interactive cloud security half-day summit on June 4th,   show more ...

2024, at Tysons Corner, The Archer Hotel. Our experts will […] La entrada Code to Cloud Roadshow – Tysons Corner In-Person Event hosted by Palo Alto Networks – Source: www.databreachtoday.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.databreachtoday.com – Author: 1 The White House released the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence on Oct 20, and since then cybersecurity professionals have been discussing the directives in it, whether it is possible to accomplish them   show more ...

and if so, how to do that. The mission […] La entrada Regulating AI: ‘It’s Going to Be a Madhouse’ – Source: www.databreachtoday.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.databreachtoday.com – Author: 1 While fewer healthcare websites appear to be using online trackers now than a year ago, nearly 1 in 3 firms are still using Meta Pixel and similar technologies despite warnings from regulators and a rise in civil class action litigation alleging privacy violations   show more ...

related to these tools, said Ian Cohen, […] La entrada Web Trackers Persist in Healthcare Despite Privacy Risks – Source: www.databreachtoday.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.databreachtoday.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Social Engineering Mandiant Says APT42 Members Have Been Posing as Journalists to Steal Troves of Data Chris Riotta (@chrisriotta) • May 3, 2024     Iranian hackers posed as journalists   show more ...

from well-known outlets including The Washington Post. (Image: Shutterstock) Members […] La entrada New Report Exposes Iranian Hacking Group’s Media Masquerade – Source: www.databreachtoday.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Dark Reading Staff 1 Min Read Source: Ihor Sveitukha via Alamy Stock Photo The number of ransomware and associated extortion attacks is growing, with reports nearly every day about damage inflicted on organizations. These attacks disrupt business operations and result in   show more ...

significant downtime. In some cases, data is stolen. Educational institutions, […] La entrada Mimic Launches With New Ransomware Defense Platform – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Team Register Dating apps ask people to disclose all kinds of personal information in the hope of them finding love, or at least a hook-up. What many may not know is that the majority of these lonely-hearts corners vacuum up way more user info than they need to, and they   show more ...

also […] La entrada Dating apps kiss’n’tell all sorts of sensitive personal info – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 claims

Source: go.theregister.com – Author: Team Register AI built by Russian infosec firm Kaspersky was used in Russian drones for its war on Ukraine, volunteer intelligence gatherers claim. The OSINT analysts at InformNapalm, which sprung up in the wake of Russia’s 2014 annexation of Crimea, made those   show more ...

allegations after poring over 100 GB of data stolen […] La entrada Kaspersky hits back at claims its AI helped Russia develop military drone systems – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the   show more ...

U.K., and the U.S. The Czech Republic’s Ministry of Foreign […] La entrada Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Arun Dhamija Recently, I wrapped up my first work trip with Balbix—a whirlwind tour of customer roundtables in Singapore, Melbourne and Sydney. We were joined by local EY teams that have been working with us for almost an entire year to explore the topic of Cyber Risk   show more ...

Management in the region. […] La entrada The Real Risk is Not Knowing Your Real Risk: Perspectives from Asia Pacific Tour with EY – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Attack Surface

Source: securityboulevard.com – Author: Nathan Eddy Failure to properly configure authentication led to malicious actors exploiting the database backups of Airsoftc3.com, a popular Airsoft enthusiast community site, according to Cybernews researchers, who discovered the breach in December. The breach exposed   show more ...

sensitive user data, affecting approximately 75,000 individuals within the community involved with Airsoft, a team-based […] La entrada Airsoft Data Breach Exposes Data of 75,000 Players – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Shriram Sharma For security leaders heading to RSAC 2024 in need of a refresher on all things SOAR (Security Automation, Orchestration and Response), D3 Security has you covered. Before you hit the expo floor, check out these must-read resources that will equip you with   show more ...

the insights needed to understand the security […] La entrada Get SOAR Savvy Before RSAC 2024: 5 Reads to Level Up Your SOC – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Alexa Sander We recently hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and Kobe Brummet, Cybersecurity Technician at Hawkins School District in Tennessee, for a live webinar. Michael and Kobe volunteered to share with other K-12 tech pros how   show more ...

important cybersecurity and safety monitoring are for Google Workspace, […] La entrada Cloud Monitor Automation Thwarts Phishing & Malware Emails – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: bacohido By Byron V. Acohido SAN FRANCISCO — On the eve of what promises to be a news-packed RSA Conference 2024, opening here on Monday, Microsoft is putting its money where its mouth is. More precisely the software titan is putting money within reach of its senior   show more ...

executives’ mouths. Screenshot In […] La entrada MY TAKE: Is Satya Nadella’s ‘Secure Future Initiative’ a deja vu of ‘Trustworthy Computing?’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-05
Aggregator history
Saturday, May 04
WED
THU
FRI
SAT
SUN
MON
TUE
MayJuneJuly