Sat.Mar 25, 2023 - Fri.Mar 31, 2023

article thumbnail

GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

The Last Watchdog

Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the culture building approaches of high-risk industries like construction that devote sustained attention to embedding safety throughout the organization. For most organizations, building a cybersecurity culture is a necessary evil rather than a cherished goal.

article thumbnail

Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare

Dark Reading

Indicators point to Twitter's source code being publicly available for around 3 months, offering a developer security object lesson for businesses.

Security 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biden Administration Announces National Cybersecurity Strategy

Data Matters

On March 1, 2023, the Biden administration announced its long-awaited National Cybersecurity Strategy. The strategy is part of the administration’s efforts to bolster and modernize public and private responses to cybersecurity threats. The post Biden Administration Announces National Cybersecurity Strategy appeared first on Data Matters Privacy Blog.

article thumbnail

Crypto Was Afraid to Show Its Face at SXSW 2023

WIRED Threat Level

Any mention of crypto was deliberately veiled at this year’s festival. And that strategy might catch on.

IT 108
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Tomorrow’s Careers In Artificial Intelligence

Information Governance Perspectives

The following excerpt about Artificial Intelligence is based on the book Tomorrow’s Jobs Today , available at Barnes & Noble , Amazon , and other fine booksellers. Artificial Intelligence, or AI, refers to the use of human intelligence in machines that are programmed to think and act like us humans. It’s often divided into weak and strong categories.

More Trending

article thumbnail

UK Sets Up Fake Booter Sites To Muddy DDoS Market

Krebs on Security

The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake booter sites.

Marketing 294
article thumbnail

Beware the Spirit vs. the Letter of a Policy

Weissman's World

TL;DR It’s bad enough when an information policy doesn’t align with an organization’s objectives. But it’s far worse when it has more to do with protecting a fiefdom than the greater good. Case in point: the New Hampshire Governor’s Office? There’s an interesting dynamic taking place in the New Hampshire governor’s office that to this… Read More » Beware the Spirit vs. the Letter of a Policy The post <strong>Beware the Spirit vs. the Letter of a Policy</strong> appeare

IT 156
article thumbnail

How Good Smile, a Major Toy Company, Kept 4chan Online

WIRED Threat Level

Documents obtained by WIRED confirm that Good Smile, which licenses toy production for Disney, was an investor in the controversial image board.

Privacy 145
article thumbnail

Look Beyond TikTok: Massive Data Collection Is the Real Risk

Data Breach Today

All Social Media Apps Collect Information on a Scale That Facilitates Surveillance There's much national security ado about how much user data gets collected by the Chinese-owned, wildly popular video-sharing app TikTok. But as France's ban of "recreational apps" from government-issued devices highlights, a bigger-picture approach for combating surveillance is required.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

German Police Raid DDoS-Friendly Host ‘FlyHosting’

Krebs on Security

Authorities in Germany this week seized Internet servers that powered FlyHosting , a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure.

IT 287
article thumbnail

Phishing Emails Up a Whopping 569% in 2022

Dark Reading

Credential phishing emails are the clear favorite of threat actors, with a 478% spike last year, new research shows.

Phishing 137
article thumbnail

The Uniquely American Future of US Authoritarianism

WIRED Threat Level

The GOP-fueled far right differs from similar movements around the globe, thanks to the country’s politics, electoral system, and changing demographics.

Security 145
article thumbnail

North Korean Threat Groups Steal Crypto to Pay for Hacking

Data Breach Today

APT43 Launders Crypto Through Mining, Says Mandiant North Korean hackers are stealing cryptocurrency to fund operations under an apparent mandate from Pyongyang to be self-sufficient, threat intel firm Mandiant says. The regime probably expected its hackers to pay their own way before 2020, but the novel coronavirus pandemic exacerbated its demands.

Mining 291
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How to use ChatGPT to summarize a book, article, or research paper

Collaboration 2.0

If you're confronted with a long document or a lot of complicated text, here's how to use ChatGPT to summarize the key points.

Paper 135
article thumbnail

MacStealer malware: A growing threat to macOS users

Jamf

MacStealer has been discovered and linked to a threat actor distributing it in the wild. The malicious code extracts a variety of files, browser cookies, and login information from a victim's system. Also, it collects end-user privacy and sensitive data, like credit card information from popular web browsers. Learn more about this new macOS malware variant and how Jamf Protect safeguards your devices, users and data from this emerging threat.

Privacy 128
article thumbnail

Russian Cyberwarfare Documents Leaked

Schneier on Security

Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company’s work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU;

Military 128
article thumbnail

Essential Steps to Building a Robust API Security Program

Data Breach Today

Gartner's Dionisio Zumerle on API Security Challenges, Risk Assessments and Trends Recent high-profile breaches resulting from API attacks are "just the tip of the iceberg," said Gartner analyst Dionisio Zumerle. "What we have is a new way of exchanging information which is increasingly popular, and almost no organization has the recipe to secure that new way of communicating.

Security 281
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The New Face of Fraud: FTC Sheds Light on AI-Enhanced Family Emergency Scams

KnowBe4

The Federal Trade Commission is alerting consumers about a next-level, more sophisticated family emergency scam that uses AI that imitates the voice of a "family member in distress".

article thumbnail

The value of Micro Focus to OpenText – analysts weigh in

OpenText Information Management

The size and scope of the OpenText acquisition of Micro Focus makes the deal newsworthy, and industry pundits have generally greeted the news with optimism. The strategic value for OpenText spans a range of market opportunities, as evidenced by the recent assessments of three analysts who cover the tech market. This blog takes a closer … The post The value of Micro Focus to OpenText – analysts weigh in appeared first on OpenText Blogs.

Marketing 123
article thumbnail

Microsoft Patches 'Dangerous' RCE Flaw in Azure Cloud Service

Dark Reading

The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform's nodes.

Cloud 120
article thumbnail

Subprime Lender TitleMax Hit With Hacking Incident

Data Breach Today

Personal, and Potentially Financial Data Exposed in 'Contained' Incident The parent company of subprime lender TitleMax says hackers made off the Social Security numbers and financial account information of up to nearly 5 million individuals. The company notified the FBI and "believes the incident has been contained." Hackers stole information over an 11 day period.

Security 275
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Artificial Intelligence Makes Phishing Text More Plausible

KnowBe4

Cybersecurity experts continue to warn that advanced chatbots like ChatGPT are making it easier for cybercriminals to craft phishing emails with pristine spelling and grammar, the Guardian reports.

article thumbnail

What is HR compliance?

OpenText Information Management

What is HR compliance for employee document management? Very broadly, HR compliance refers to the practice of ensuring your HR policies and procedures adhere to all applicable laws, ethics and regulations and updating them as regulations change and your organization grows. It is a critical component of HR’s role, but perhaps one of the most … The post What is HR compliance?

article thumbnail

Patch Now: Cybercriminals Set Sights on Critical IBM File Transfer Bug

Dark Reading

A vulnerability with a 9.8 CVSS rating in IBM's widely deployed Aspera Faspex offering is being actively exploited to compromise enterprises.

113
113
article thumbnail

3-Year JS Injection Campaign Targets 51,000 Websites

Data Breach Today

Campaign Peaked in 2022, Continues to Infect Websites Using Obfuscation Tactics A widespread ongoing malicious JavaScript injection campaign first detected in 2020 has targeted over 51,000 websites, redirecting victims to malicious content like adware and scam pages. Attackers are using several obfuscation tactics to bypass detection.

257
257
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Confessions of a Former 'The Inside Man' Skeptic

KnowBe4

I remember sitting in Stu Sjouwerman ’s office with Perry Carpenter and myself being pitched a drama series about cyber security by Jim Shields (Creative Director - Twist & Shout) and Rob McCollum (Writer/Co-Director - Twist & Shout).

Security 111
article thumbnail

Hacks at Pwn2Own Vancouver 2023

Schneier on Security

An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver: On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day exploits and exploit chains to win $375,000 and a Tesla Model 3. The first to fall was Adobe Reader in the enterprise applications category after Haboob SA’s Abdul Aziz Hariri ( @abdhariri ) used an exploit chain targeting a 6-bug logic chain abusing multiple

article thumbnail

Vulkan Playbook Leak Exposes Russia's Plans for Worldwide Cyberwar

Dark Reading

Russian intelligence services, together with a Moscow-based IT company, are planning worldwide hacking operations that will also enable attacks on critical infrastructure facilities.

IT 113