Here is a rundown of the most interesting news, articles, interviews and videos from last week.
Deception Techniques and Infringement Prediction Strategies
In this Help Net Security interview, Lupovis CEO Xavier Bellekens discusses how the implementation of Deception-as-a-Service provides an additional layer of defense that both CISOs and their teams can use to prevent potential breaches. It explains how early warning indicators help.
Balancing communications security, law enforcement and customer trust
In this Help Net Security interview, BlackDice Cyber CTO Mark O’Neill discusses collaboration, transparent policies, and a security-first mindset. With the advent of 5G and IoT, powerful countermeasures and AI will overcome challenges and shape the future of the telecom industry.
How CISOs Solve Complex Security Challenges
In this Help Net Security interview, Uptycs CISO Kevin Paige explains how he navigates a complex cybersecurity environment while balancing technical expertise, effective communication, risk management, and adaptive leadership. provide insight into how
The Road Forward Toward Ecommerce Fraud Prevention
In this Help Net Security interview, ClearSale CEO Eduardo Mônaco discusses the complexities of e-commerce fraud, the evolution of fraudster techniques, the effectiveness of social footprint analysis in identity verification, and balancing fraud prevention and customer experience. , and techniques to prevent fraud. Addresses more advanced fraud types.
Reinventing OT security for dynamic landscapes
A new interview with asvin CTO Rohit Bohara delves into the OT security landscape, from understanding the challenges of disparate OT protocols and increasing convergence with IT, to tackling the critical role of human error .
Critical vulnerabilities found in data center solutions
Researchers have discovered critical security vulnerabilities in two widely used data center solutions: CyberPower’s PowerPanel enterprise data center infrastructure management (DCIM) platform and Dataprobe’s iBoot power distribution unit (PDU). did.
Macs have been compromised to act as proxy exit nodes
AdLoad, a well-known malware that has been targeting systems running macOS for over five years, has been able to deliver new payloads that allow systems to join residential proxy botnets without the knowledge of their owners. Observed.
According to threat intelligence researchers at AT&T Alien Labs, after analyzing over 150 real-world malware samples, many devices are infected.
Almost All VPNs Are Vulnerable to Traffic Leaking TunnelCrack Attacks
Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices. Researchers have discovered something.
Ivanti Avalanche is vulnerable to attacks by unauthenticated remote attackers (CVE-2023-32560)
Two stack-based buffer overflow bugs (collectively referred to as CVE-2023-32560) have been discovered in Ivanti Avalanche, an enterprise mobility management solution.
(Re)check patched NetScaler ADC and gateway appliances for signs of compromise
Citrix NetScaler ADC and gateway appliance administrators, even if they quickly implemented the fix for CVE-2023-3519, should verify evidence of installed web shells. A recent internet scan by Fox-IT researchers revealed over 1,800 backdoored NetScaler devices, 69% of which were patched for the flaw.
LinkedIn users targeted in account takeover campaign
LinkedIn users have been targeted in an ongoing account takeover campaign and have been locked out of their accounts. Hacked accounts are held for ransom purposes.
Phishers use QR codes to target companies in various industries
A phishing campaign was detected using QR codes targeting various industries to obtain Microsoft credentials.
The attack began with victims receiving a phishing email containing a PDF PNG attachment, asking them to update their Microsoft account security settings or scan a QR code to add two-factor authentication to their accounts. Masu.
Citrix ShareFile Vulnerability Actively Exploited (CVE-2023-24489)
CVE-2023-24489, a critical vulnerability in Citrix ShareFile, was patched by the company in June 2023 and is being exploited by attackers.
GreyNoise warned Tuesday of a sudden spike in IP addresses undergoing exploitation attempts, and the Cybersecurity and Infrastructure Agency (CISA) added the vulnerability to its catalog of known exploited vulnerabilities.
Zimbra Users in Europe and Latin America Face Phishing Threats
ESET researchers have uncovered a large-scale phishing campaign aimed at harvesting Zimbra account user credentials.
This campaign has been running since at least April 2023 and is still ongoing. It targets a wide range of small businesses and government agencies.
Build a secure future without traditional passwords
In this Help Net Security roundup, we present some of our previously recorded videos where security experts in the field share their perspectives on the future of passwordless authentication.
How Manufacturers Can Address Cybersecurity Regulations in NIST 2.0
In this Help Net Security video, Ahmik Hindman, Senior Network & Security Solutions Consultant at Rockwell Automation, discusses the evolving cybersecurity landscape and what the new cybersecurity framework means for manufacturers.
Threats to Midsize Businesses Affect Us All
In this Help Net Security video, Paul Cragg, CTO of NormCyber, explains how organizations deal with many cyberthreats. For a small in-house IT team, distinguishing between minor events and true threats becomes a very difficult task, as even one incident overlooked can have serious consequences. .
SEC Cybersecurity Rules Shaping the Future of Incident Management
In this Help Net Security video, Schellman President and National Managing Principal Doug Barbin shares his perspective on what this means for the company’s future development.
Kubernetes Clusters Face Widespread Attacks Across Numerous Organizations
In this Help Net Security video, Assaf Morag, Chief Threat Intelligence Analyst at Aqua Security, describes the research that uncovered openly accessible and unprotected Kubernetes clusters belonging to over 350 organizations, open source projects and individuals. To do.
Explore the new TSA oil and gas pipeline regulations
In this Help Net Security video, GuidePoint Security’s OT Senior Security Consultant, Chris Warner, explains how these newly introduced provisions will help pipeline owners and operators proactively harden their systems and keep oil out of the water. and how we mandate protection against potential cybersecurity threats in the natural gas sector.
Ransomware: To Pay or Not To Pay
A comprehensive security plan and program should focus on defense, but how will your organization respond to ransomware attacks? When will the option of paying the ransom be considered? The focus should also be on answering the important question:
Why the “voluntary AI efforts” extracted by the White House are not enough
Representatives of Amazon, Anthropic, Google, Inflection, Meta, Microsoft and OpenAI recently came to the White House to meet President Biden with a mission to “ensure the responsible development and distribution of artificial intelligence (AI) technology.” was invited to
4 Ways Simulation Training Can Reduce Team Burnout
Burnout is prevalent in the cybersecurity industry, compromising the mental and physical health of cyber professionals and causing security leaders and team members to leave in search of more promising career opportunities elsewhere or leave the industry entirely. or withdraw, leaving organizations underskilled, understaffed, and disproportionately exposed to cyber risk.
Product Showcase: Free Email Security Test with ImmuniWeb Community Edition
To help businesses and organizations quickly assess their exposure to email-related security, privacy and compliance risks, ImmuniWeb recently enhanced its Community Edition with the addition of a free email security test available online. Did.
Cybertech Africa 2023 will be the first gathering for innovation and networking in the region
Over 100 speakers, dozens of companies, organizations, startups, innovation, technology, cyber ecosystems, top speakers, prestigious universities, government officials, and thousands of attendees (executives, decision makers) , students) – Gathered for two days at Cybertech Africa 2023 to explore and share innovative solutions to the cyber challenges facing the African continent.
Navigating the risks and regulatory challenges of generative AI
According to Gartner, the mass availability of generative AI, such as OpenAI’s ChatGPT and Google Bard, became a top concern for enterprise risk managers in the second quarter of 2023.
Excessive workload leading to retirement of IT professionals
According to Ivanti, a quarter of IT professionals are seriously considering leaving their current job within the next six months, potentially costing US businesses more than $145 billion.
Federal Agencies Gear Up for Zero Trust Executive Order Deadline
Swimlane said federal agencies are ready to meet the requirements of the Biden administration’s Zero Trust Executive Order with just over a year to go before the deadline.
30% of phishing threats involve newly registered domains
According to Cloudflare, phishing remains the most dominant and fastest growing internet crime, largely due to the prevalence of email and the constant problem of human error preyed upon by today’s threat actors. It depends on the subject.
New Information Security Products of the Week: August 18, 2023
Here are the most interesting products from last week, featuring releases from Action1, MongoDB, Bitdefender, SentinelOne and Netskope.