Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to remove metada ...

 Tips

If youre anything like me, you probably share plenty of photos, videos and documents, and send lots of voice messages and emails every single day too. But how often do you stop to consider the additional data contained in these files? For each of these files/media contains metadata — which can reveal a lot of   show more ...

interesting details not meant for prying eyes; for example, a photos time and location, a documents editing history, device information, IP address, geolocation, and much more. So, for example, whenever you post an innocent selfie on social media, youre also making public a whole ton of extra information that you might not necessarily want others to see. In this article, we explore the pros and cons of metadata and how to remove it. What is metadata and whats it for? To put it simply, metadata is additional information about a files content. Such data is added to files by applications that create or process them, operating systems, or users themselves. In most cases, metadata is created and updated automatically. For example, for files, this can include the creation date, last modified date, type, owner, and so on. In the case of photos, metadata can include the date and location, exposure settings, camera or smartphone model, and so on, recorded in Exif format. Specifically which data is stored depends on the camera/smartphone model and settings. Some metadata is visible and easy to edit. For example, audio files contain special tags describing the content — author, artist, album, track name, genre, etc. — that can be easily changed in any media player. Other metadata is less evident. Did you know, for example, that from the metadata of an office document you can easily discover who edited it, when, for how long, and using which programs? In some cases, you can even restore the entire edit history from the first keystroke. Of course, metadata wasnt originally designed to be the perfect stalking tool, but simply a useful feature. However, you can end up sharing more than you intended; for example, your employer or client could find out how much time you actually spent working on a document, and the Exif data of a selfie you post online can reveal what smartphone you use and where you were at the time. Metadata can also help catch criminals or uncover fraudulent schemes. For example, in 2019, U.S. law enforcement managed to arrest the fraudster Hicham Kabbaj, whod been sending his former employer invoices for equipment supplies from a shell company called Interactive Systems for four years. Of course, no equipment was actually supplied, but a total of six million dollars was transferred into Interactive Systems accounts. The fraudster was eventually caught out because of simple oversight: four of the 52 invoices were in the MS Word .doc format, and the metadata listed the author as KABBAJ. Besides the police, malicious actors can also use metadata. In 2016, we conducted an experiment to try to determine a persons location from a single photo. For us, this was just a fun exercise, but criminals could have very different motives. Or consider a slightly more complex scenario: your innocent PDF file somehow ends up in the hands of a malicious actor. How it got there doesnt matter — lets say they introduced themselves as your colleague. In this case, the contents of the file may be of no interest to the criminal. Whats important to them, however, is that youve already taken the bait (so the attack can continue) and leaked the PDFs metadata — revealing the software and version you used to create it. With this knowledge, the attacker can send you malware specifically designed to exploit a vulnerability in your particular system. Protecting yourself from this kind of scenario requires a combination of measures: ignoring suspicious messages, removing metadata, and updating your software promptly. How to remove metadata You can remove metadata using built-in tools or third-party programs and services. We recommend the former, as then your metadata wont end up in the hands of third parties this way. Third-party tools act as an extra layer between you and the cleaned file. This layer could potentially retain metadata, which criminals could somehow get hold of. So now lets look at how to remove metadata from photos and videos, and DOC and PDF files using built-in tools. Photos and videos On Windows In File Explorer, right-click on the file, select Properties, and go to the Details tab. At the bottom of the screen, click Remove Properties and Personal Information, and in the window that opens, either keep the default option Create a copy with all possible properties removed, or manually select the properties you want to remove, and click OK. On macOS and iOS. Apple operating systems let you remove or modify the date, time, and geolocation. However, location data is only recorded for photos and videos taken with geolocation services enabled. To remove or modify metadata on a macOS device, open the Photos app, go to the Image menu, select Location, and click Hide Location. Here you can also Revert to Original Location — which raises the question of where this data is actually stored — or Assign Location to one or more photos after you Copy Location from another photo. Additionally, in the Image menu, you can Adjust Date and Time of the capture. On an iPhone or iPad, open the Photos app, select the photo to edit, and tap the (i) info button, or simply swipe up on the photo. Here, you can Adjust the date, time, and location. For location, you can either select No Location or assign any other location to the photo. (This is useful if youre posting photos taken in a studio near your home, while pretending to be in, say, Maldives.) To edit multiple photos at once, select them all, tap the three-dot button (…), then choose Adjust Date & Time or Adjust Location. On Android On Android devices, you can remove or modify location data using the Google Photos app. Select the photo or video, tap the three-dot More icon, select Edit, and tap Remove location. DOC files If youre using Word, go to the File tab and select Info. Then click Check for Issues, followed by Inspect Document and Inspect. Under Document Properties and Personal Information, click Remove All. Windows users can also remove DOC file metadata using File Explorer, just as they would with photos and videos. PDF files If youre using Adobe Acrobat, go to File, then Document properties, and select Description. In the window that opens, you can manually edit the author, subject, keywords, and title of the document. Clicking Additional Metadata opens a window displaying all the documents metadata. You can also remove PDF metadata using File Explorer in the same way as for photos and videos. Security Measures So, whats the main way to protect yourself from malicious actors exploiting your metadata? Two words: exercising caution. In addition, for maximum security, follow these extra precautions: Set your social media profiles to private. This way, attackers wont be able to use the metadata from your old photos and videos. Use a comprehensive security solution. It will act as a safety net — protecting your payment and personal data even if you fall victim to a cybercriminal. Remove metadata regularly. At first, this may seem like a lot of extra work just to send a simple selfie, but over time, removing metadata will become second nature.

image for 3 Use Cases for Thir ...

 Feed

Third-party API security requires a tailored approach for different scenarios. Learn how to adapt your security strategy to outbound data flows, inbound traffic, and SaaS-to-SaaS interconnections.

 Feed

Google has launched a new feature called Identity Check for supported Android devices that locks sensitive settings behind biometric authentication when outside of trusted locations. "When you turn on Identity Check, your device will require explicit biometric authentication to access certain sensitive resources when you're outside of trusted locations," Google said in a post announcing the

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday placed a now-patched security flaw impacting the popular jQuery JavaScript library to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The medium-severity vulnerability is CVE-2020-11023 (CVSS score: 6.1/6.9), a nearly five-year-old cross-site scripting (XSS) bug that could be

 Feed

The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican national, and two of its own citizens for their alleged involvement in the ongoing fraudulent information technology (IT) worker scheme that seeks to generate revenue for the Democratic People's Republic of Korea (DPRK) in violation of international sanctions. The action targets Jin Sung-Il (진성일), Pak

 Feed

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE implementations – Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC,

 Feed

The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly adopting cloud-based Software-as-a-Service (SaaS) applications to facilitate it. SaaS applications like Microsoft 365 and Google Workspace have now become the backbone of business operations, enabling seamless collaboration and productivity. However, this

 Cyber Security News

Source: www.proofpoint.com – Author: Channel partners benefit from an unparalleled agile procurement process to strengthen their business opportunities and close deals faster  SUNNYVALE, Calif., January 23, 2025 – Proofpoint Inc., a leading cybersecurity and compliance company, today announced an expanded   show more ...

go-to-market relationship with Ingram Micro (NYSE: INGM) that will redefine the way partners and resellers scale […] La entrada Proofpoint and Ingram Micro Team to Radically Simplify and Accelerate Sales Cycles for Partners – Source: www.proofpoint.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team With the rapid technological advancement and the world entering the AI era, the cyber threat landscape has significantly evolved in its complexity and sophistication. The frequency of data breaches has surged alarmingly compared to previous years,   show more ...

amplifying already significant concerns. This uptick is fueled by the escalating severity of […] La entrada The Power of Many: Crowdsourcing as A Game-Changer for Modern Cyber Defense – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.cyberdefensemagazine.com – Author: News team In the fast-paced and dynamic world of law enforcement, effective communication is essential for ensuring public safety and successful operations. However, amidst the ever-evolving landscape of technology and threats, maintaining operational security   show more ...

(OPSEC) stands as the cornerstone of police communication strategies. Let’s delve into why operational security is crucial […] La entrada Operational Security: The Backbone of Effective Police Communication – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. Cybersecurity firm ESET uncovers PlushDaemon, a previously unknown APT group targeting South Korea, deploying a SlowStepper backdoor. This article analyses the attack techniques, the capabilities of the SlowStepper malware, and the growing threat posed by this   show more ...

sophisticated APT group.  Cybersecurity firm ESET has identified a new China-aligned Advanced Persistent […] La entrada Chinese PlushDaemon APT Targets S. Korean IPany VPN with Backdoor – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. Abnormal Security uncovers GhostGPT, an uncensored AI chatbot built for cybercrime. Learn how it boosts cybercriminals’ abilities, makes malicious activities easier to execute, and creates serious challenges for cybersecurity experts. Artificial intelligence (AI) has   show more ...

revolutionized countless industries, but its potential for misuse is undeniable. While AI models like ChatGPT have […] La entrada Meet GhostGPT: The Malicious AI Chatbot Fueling Cybercrime and Scams – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.troyhunt.com – Author: Troy Hunt It’s hard to find a good criminal these days. I mean a really trustworthy one you can be confident won’t lead you up the garden path with false promises of data breaches. Like this guy yesterday: For my international friends, JB Hi-Fi is a massive   show more ...

electronics retailer down under […] La entrada You Can’t Trust Hackers, and Other Data Breach Verification Tales – Source: www.troyhunt.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Classroom Management

Source: securityboulevard.com – Author: Alexa Sander Digital tools have transformed how teachers and students engage in classroom activities, creating opportunities to enhance learning, communication, and organization. In this guide, we’ll explore the types of educational technologies available, their   show more ...

benefits for K-12 education, and how school districts can manage their digital classroom environments.  What is a […] La entrada A K-12 Guide to the Digital Classroom – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cryptographic Agility

Source: securityboulevard.com – Author: Jim Curtin In today’s interconnected digital ecosystems, securing Non-Human Identities (NHIs) has become a critical focus. NHIs—representing machines, applications, containers, and microservices—outnumber human identities exponentially and serve as essential   show more ...

components in modern IT infrastructures. However, their growing volume and complexity have created a vast, dynamic attack surface. TrustFour addresses these challenges […] La entrada Understanding the 3-Layers of Non-Human Identity (NHI) Security in TrustFour’s Posture and Attack Surface Management Framework – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: securityboulevard.com – Author: Amy Cohn Why is Secrets Rotation Crucial for Cloud Security? Are you familiar with the concept of secrets rotation? Does it sound like an unfamiliar cybersecurity jargon that goes over your head? Or do you already know and understand its implications but are unsure about   show more ...

its connection with cloud security? Either […] La entrada Safe Secrets Rotation: A Must for Modern Clouds – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: securityboulevard.com – Author: Amy Cohn Are You Confident in Your Cloud-Native Security? Navigating cybersecurity can be like walking through a maze filled with lurking threats. How can you feel confident navigating through this seemingly complex labyrinth? Proper data protection and a strong focus on   show more ...

Non-Human Identitites (NHIs) and Secrets Security management can give you […] La entrada Boosting Confidence in Cloud-Native Security – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Amy Cohn Is Your Organization Paying Enough Attention to Non-Human Identities? Organizations extensively utilize cloud services and automated systems. In doing so, they inevitably fragment their digital presence into countless Non-Human Identities (NHIs). NHIs,   show more ...

essentially machine identities, are created by combining an encrypted password, token, or key—called a “Secret”—and the permissions […] La entrada Unlocking Innovation with Protected Machine Identities – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The FBI has warned that North Korean IT worker schemes are stealing data to extort their victims as part of efforts to generate revenue for the Democratic People’s Republic of Korea (DPRK). The US intelligence agency confirmed it has observed North Korean IT   show more ...

workers engaging in this tactic over recent months. […] La entrada North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: Two recently identified ransomware gangs are using payloads that contain almost identical code, suggesting that the groups’ affiliates are using shared infrastructure. The groups, named HellCat and Morpheus, emerged in mid to late 2024. SentinelOne researchers   show more ...

also identified similarities in the tactics used by the two groups and the Underground Team […] La entrada Ransomware Gangs Linked by Shared Code and Ransom Notes – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: www.infosecurity-magazine.com – Author: Threat actors have been actively exploiting chained vulnerabilities in Ivanti Cloud Service Appliances (CSA), significantly amplifying the impact of their cyber-attacks. The vulnerabilities—CVE-2024-8963, CVE-2024-9379, CVE-2024-8190 and CVE-2024-9380—were   show more ...

leveraged in September 2024 to breach systems, execute remote code (RCE), steal credentials and deploy webshells on victim networks. Exploiting Chained Vulnerabilities According to […] La entrada Chained Vulnerabilities Exploited in Ivanti Cloud Service Appliances – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Bookmakers

Source: www.infosecurity-magazine.com – Author: A growing wave of arbitrage betting fraud, driven by automation and advanced money laundering techniques, has been forcing bookmakers to adopt stricter measures to protect their platforms. This type of fraud exploits pricing inefficiencies across betting markets,   show more ...

allowing fraudsters to guarantee profits regardless of the outcome. Identifying Red Flags in Betting […] La entrada Bookmakers Ramp Up Efforts to Combat Arbitrage Betting Fraud – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 'Cyber

Source: cyble.com – Author: Cyble. CISA’s Vulnrichment enhances CVE data with context, scoring, and analysis, helping security professionals make informed decisions and improve vulnerability management. Overview  The Cybersecurity and Infrastructure Security Agency (CISA) has introduced Vulnrichment, an   show more ...

innovative initiative designed to enhance CVE data by adding crucial context, scoring, and detailed analysis. Launched on May […] La entrada Unlocking Vulnrichment: Enhancing CVE Data for Smarter Vulnerability Management  – Source:cyble.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 'Cyber

Source: cyble.com – Author: Cyble. Threat actors chained together four vulnerabilities in Ivanti Cloud Service Appliances (CSA) in confirmed attacks on multiple organizations in September, according to an advisory released this week by the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA).   show more ...

  The agencies urged users to upgrade to the latest supported version […] La entrada Anatomy of an Exploit Chain: CISA, FBI Detail Ivanti CSA Attacks  – Source:cyble.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.tripwire.com – Author: Graham Cluley The Turkish government is proposing a controversial new cybersecurity law that could make it a criminal act to report on data breaches.  The new legislation proposes penalties for various cybersecurity-related offences. But they key one which has people   show more ...

concerned is this: “Those who carry out activities aimed at targeting […] La entrada Be careful what you say about data leaks in Turkey, new law could mean prison for reporting hacks – Source: www.tripwire.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Artificial Intelligence

Source: www.csoonline.com – Author: Eine aktuelle Studie zeigt: Angesichts der zunehmenden Bedeutung von Cybersicherheit gewinnen CISOs immer mehr Einfluss im Vorstand. Ein gutes Verhältnis zwischen CISO und Vorstand hat viele Vorteile. Golden Dayz – Shutterstock.com In den vergangenen Jahren haben sich   show more ...

CISOs häufig nicht von ihrem Vorstand ernst genommen gefühlt. Inzwischen lässt sich jedoch eine […] La entrada CISOs rücken näher an den Vorstand – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: The bug affectq the management interfaces of SMA1000 Secure Mobile Access appliances, allowing the execution of arbitrary OS commands. A critical bug in SonicWall’s remote access gateway, Secure Mobile Access (SMA1000), is likely being used in zero-day attacks, allowing   show more ...

remote code execution (RCE) by unauthenticated actors. The issue, tracked as CVE-2025-23006, […] La entrada SonicWall’s Secure Mobile Access appliance faces zero-day attacks – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: Die Cyber-Bande Ransomhub erpresst die Grohe AG mit gestohlenen Daten. Die Ransomware-Bande Ransomhub will 100 Gigabyte Daten von der Grohe AG erbeutet haben. CeltStudio – Shutterstock.com Die Grohe AG zählt zu den bekanntesten deutschen Herstellern von Armaturen und   show more ...

Sanitärprodukten. Die berüchtigte Ransomware-Bande Ransomhub listet das Unternehmen nun als Opfer auf ihrer […] La entrada Grohe AG von Ransomware-Attacke betroffen – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 CSOonline

Source: www.csoonline.com – Author: The tactic of luring bad actors into digital traps goes beyond honeypots, requiring robust infrastructure and highly realistic lures to gather intelligence on intruders and identify insider threats. Longtime cybersecurity practitioners might recall the early guidance manuals   show more ...

published by the National Security Agency (NSA) in the 1980s and 1990s known as […] La entrada Tricking the bad guys: realism and robustness are crucial to deception operations – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-01
Aggregator history
Friday, January 24
WED
THU
FRI
SAT
SUN
MON
TUE
JanuaryFebruaryMarch