Category: Uncategorized

  • Popular background check services suffer data breach – Do this – Komando

    Have you ever done a background check on yourself or someone else? It’s a good way for employers to determine if a potential worker is trustworthy. Some people even do background checks on potential dates in online dating. Tap or click here to learn how to do a free background check.
    But your data might be in jeopardy if you’ve used a popular background check service. A data breach exposed information from over 20 million users of a couple of the most popular services.
    Keep reading for details on the breach and ways to protect your data.
    TruthFinder and Instant Checkmate are websites that offer background check services to their subscribers. They gather information from various publicly accessible sources, including court records, criminal records, social media and others to provide detailed background reports on individuals.
    The two companies merged with PeopleConnect Holdings in 2020. Recently, a hacking collective claimed to have stolen a TruthFinder and Instant Checkmate user database and shared it for free on criminal forums.
    Learn the tech tips and tricks only the pros know.
    The database contains the details of over 20 million users who used the services from 2011 to 2019. Leaked data includes names, email addresses, phone numbers and hashed passwords.
    Soon after the hacker shared the details, parent company PeopleConnect acknowledged the breach. “We have confirmed that the list was created several years ago and appears to include all customer accounts created between 2011 and 2019. The published list originated inside our company,” the company explains.
    Users of the background check services during the dates in question should be careful about any emails that might seem suspicious. The company stresses that TruthFinder and Instant Checkmate will never ask for your password, Social Security number or payment information over email or phone. If that happens, it is probably a scammer.
    When there is a massive data breach like this, there are safety precautions you should take.
    Steps to take following a data breach.
    To see if your details are part of a data breach, Have I Been Pwned is an excellent resource. Enter your email address, and the website lets you know how many and which breaches your email address was in. Tap or click here for more details on how the site works.
    Genealogy site data breach: See if your info was leaked
    Twitter data breach: Personal details of 5.4M users leaked
    More:
    Don’t want to lose your dough to crypto? Check out my new eBook, “Cryptocurrency 101.” I walk you through buying, selling, mining and more!


    source
  • Meta Fined For 2021 Data Breach As Millions Of Twitter Users’ Data Also Leaked – Forbes

    A massive data breach may have affected some 5.4 million Twitter user accounts containing non-public … [+] information in Europe and the United States.
    A massive data breach may have affected some 5.4 million Twitter user accounts containing non-public information in Europe and the United States. The data was reportedly stolen using an API vulnerability and shared for free on a hacker forum. Though the vulnerability has reportedly been fixed, another massive, even potentially more significant data dump of millions of Twitter records has also been disclosed by security researchers.
    According to a report from Bleeping Computer, the data consists of scraped public information as well as private phone numbers and email addresses that are not meant to be public. Multiple threat actors had been utilizing a bug to steal private information.
    That bug was discovered by HackerOne during a bug bounty earlier this year, and apparently addressed, but it remains unclear if that disclosure had also been leaked.
    “This breach showcases how quickly criminals move whenever there is a vulnerability, particularly in a large social media site,” explained Javvad Malik, security awareness advocate at KnowBe4, via an email. “With so much information disclosed, criminals could quite easily use it to launch convincing social engineering attacks against users. This could be not only to target their Twitter accounts, but also via impersonating other services such as online shopping sites, banks, or even tax offices.”
    Security researcher Avishai Avivi, CISO at SafeBreach, warned that API attacks are going to become more prominent in the near future and plague the companies relying on APIs for years to come. This is because APIs are meant to be used by systems to communicate with each other and exchange massive amounts of data – and as a result, these interfaces represent an alluring target for malicious actors to abuse.
    “While API weaknesses may be more challenging to discover, once an adversary gains access to an improperly designed API, they essentially have direct access to the organization’s databases,” said Avivi. “This is also why when a breach occurs through an API, we will see millions of records being impacted.”
    Moreover, API vulnerabilities also do not need human interaction – such as clicking on a malicious link, or falling for a phishing email).
    “The positive side of API vulnerabilities is that they are typically unique to the organization using it. Unlike traditional software vulnerabilities, the malicious actor cannot use the same vulnerability to attack a different organization,” added Avivi.
    That is likely of little comfort for the millions of Twitter users whose data may now be offered for free on the dark web.
    Meta Handed Quarter Billion Dollar Fine
    The news of the Twitter breach is noteworthy as Ireland’s Data Protection Commission (DPC) also handed down a $265 million fine to Facebook parent Meta for a data breach that impacted millions of users of the social network in 2021. The information from “scraped data” had apparently included phone numbers, Facebook IDs, names, locations, DOBs, and email addresses.
    “Every single one of the 533 million Facebooks users whose information was published on hacking forums faced potential follow-up phishing scams exploiting their exposed PII (Personal Identifiable Information) in the pursuit of more valuable credentials,” said John Stevenson, product director at cybersecurity firm Cyren, via an email.
    “So, whilst the initial data leak was back in 2021, it’s nonetheless encouraging to see fines being issued retrospectively,” Stevenson added. “Hopefully, the consequences here will encourage other enterprises to comply with cyber regulations and follow best practices to avoid a mercenary penalty in the future, particularly given cyber insurers increasingly setting a higher bar for due diligence to avoid extortionate payouts like this one.”
    It is too early to know if Twitter will be facing a similar fine for its recent data breach.

    source

  • This 9-Course Bundle Can Take Your Cybersecurity Skills to the Next Level – The Hacker News

    If you regularly read The Hacker News, there’s a fair chance that you know something about cybersecurity. It’s possible to turn that interest into a six-figure career. But to make the leap, you need to pick up some key skills and professional certifications.
    Featuring nine in-depth courses, The 2022 Masters in Cyber Security Certification Bundle helps you get ready for the next step. And in a special reader offer, you can get lifetime access for only $39.99.
    Special Offer — This bundle contains nine courses with a total value of $1,800. But for a limited time, you can get lifetime on-demand access for only $39.99. That is a massive 97% off MSRP!
    From penetration testing to threat analysis, there are thousands of vacant roles in the cybersecurity industry right now. What’s more, this trend is set to continue, with experts predicting a 12% growth within the industry in the remainder of this decade.
    The really exciting part is that anyone can land a highly paid job within this niche — you just need to prove your knowledge with professional certifications. The 2022 Masters in Cyber Security Certification Bundle helps you do just that, with 681 individual video lessons that help you prepare for key exams and pick up real-world knowledge.
    Along the way, you learn about the most common vulnerabilities that are utilized by black hat hackers today. You also discover ethical hacking and penetration testing techniques, together with risk management and disaster recovery protocols.
    Just as importantly, the training provides full prep for CISSP, CISM, CISA, and other important exams. Plus, you even get an entire course dedicated to IT interviews — really helpful when it comes to securing your first job.
    All the included content comes from highly-rated instructors, such as Mohamed Atef. He is a senior penetration tester, and a certified IT instructor with more than 20 years of experience. In that time, he earned a rating of 4.6 out of 5 stars from students.
    Order today for only $39.99 to get lifetime on-demand access to all nine courses, normally worth $1,800 in total!
    Prices subject to change
    Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips.

    source

  • Cybersecurity Trends & Statistics For 2023: More Treachery And Risk Ahead As Attack Surface And Hacker … – Forbes

    Vector of Moving Forward
    Every year I peruse emerging statistics and trends in cybersecurity and provide some perspective and analysis on the potential implications for industry and government from the data. While cybersecurity capabilities and awareness seem to be improving, unfortunately the threat and sophistication of cyber-attacks are matching that progress.
    The 2023 Digital Ecosystem
    Blue glowing futuristic technology, computer generated abstract background, 3D render
    The emerging digital ecosystem is treacherous. In our current digital environment, every company is now a reachable target, and every company, large or small, has operations, brand, reputation, and revenue pipelines that are potentially at risk from a breach.
    For 2023 and beyond the focus needs to be on the cyber-attack surface and vectors to determine what can be done to mitigate threats and enhance resiliency and recovery. As the interest greatly expands in users, so do the threats, As the Metaverse comes more online it will serve as a new vector for exploitation. Artificial intelligence and machine learning, while great for research & analytics (i.e. ChatGPT). However, AI tools can also be used by hackers for advanced attacks. Deep fakes are already being deployed and bots are continuing to run rampant. and the geopolitics of the Russian invasion of Ukraine has highlighted the vulnerabilities of critical infrastructure (CISA Shields Up) by nation-state threats, including more DDSs attacks on websites and infrastructure. Most ominous was the hacking of a Ukrainian satellite.
    Here are some initial digital ecosystem statistics to consider: According to a Deloitte Center for Controllership poll. “During the past 12 months, 34.5% of polled executives report that their organizations’ accounting and financial data were targeted by cyber adversaries. Within that group, 22% experienced at least one such cyber event and 12.5% experienced more than one.” And “nearly half (48.8%) of C-suite and other executives expect the number and size of cyber events targeting their organizations’ accounting and financial data to increase in the year ahead. And yet just 20.3% of those polled say their organizations’ accounting and finance teams work closely and consistently with their peers in cybersecurity.” Nearly half of executives expect cyber-attacks targeting accounting, other systems Nearly half of executives expect cyber attacks targeting accounting, other systems (northbaybusinessjournal.com)
    Cyber-Trends:
    AI, Artificial Intelligence concept,3d rendering,conceptual image.
    AI and ML Making Impacting the Cyber-Ecosystem in a big Way in 2023 and Beyond
    International Data Corporation (IDC) says AI in the cybersecurity market is growing at a CAGR of 23.6% and will reach a market value of $46.3 billion in 2027 Please see: Experts predict how AI will energize cybersecurity in 2023 and beyond | VentureBeat
    My Take: AI and ML can be valuable tools to help us navigate the cybersecurity landscape. Specifically it can (and is being) used to help protect against increasingly sophisticated and malicious malware, ransomware, and social engineering attacks. AI’s capabilities in contextual reasoning can be used for synthesizing data and predicting threats.
    They enable predictive analytics to draw statistical inferences to mitigate threats with less resources. In a cybersecurity context, AI and ML can provide a faster means to identify new attacks, draw statistical inferences and push that information to endpoint security platforms.
    While AI and ML can be important tools for cyber-defense, they can also be a two edged sword. While it can be used to rapidly identify threat anomalies and enhance cyber defense capabilities, it can also be used by threat actors. Adversarial Nations and criminal hackers are already using AI and MI as tools to find and exploit vulnerabilities in threat detection models.
    Cyber criminals are already using AI and machine learning tools to attack and explore victims’ networks. Small business, organizations, and especially healthcare institutions who cannot afford significant investments in defensive emerging cybersecurity tech such as AI are the most vulnerable. Extortion by hackers using ransomware and demanding payment by cryptocurrencies may become and more persistent and evolving threat. The growth of the Internet of Things will create many new targets for the bad guys to exploit. There is an urgency for both industry and government to understand the implications of the emerging morphing cyber threat tools that include AI and ML and fortify against attacks.
    Please also see the recent FORBES article discussing three key applications of artificial intelligence for cybersecurity including, Network Vulnerability Surveillance and Threat Detection, Incident Diagnosis and Response, and applications for Cyber Threat Intelligence Reports: Three Key Artificial Intelligence Applications For Cybersecurity by Chuck Brooks and Dr. Frederic Lemieux Three Key Artificial Intelligence Applications For Cybersecurity by Chuck Brooks and Dr. Frederic Lemieux (forbes.com)
    Cyber-Crime and the Cyber Statistics to Explore so Far in 2023
    A close-up on an abstract design of a display, which is warning about a cyber attack. Multiple rows … [+] of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, etc…
    Cyber-crime is growing exponentially. According to Cybersecurity Ventures, the cost of cybercrime is predicted to hit $8 trillion in 2023 and will grow to $10.5 trillion by 2025. Please see: eSentire | 2022 Official Cybercrime Report There are many factors for such growth and some of them will be explored in more detail below.
    Programming code abstract technology background of software developer and Computer script
    Open Source Vulnerabilities Found in 84% of Code Bases
    It starts with open source code. Unfortunately, according to Synopsys researchers, at least one open source vulnerability was found in 84% of code bases. The vulnerability data was included in Synopsys’ 2023 Open Source Security and Risk Analysis (OSSRA) report on 2022 data. Since most software applications rely on open source code, this is still a significant cybersecurity issue to address.
    The report noted: “open source was in nearly everything we examined this year; it made up the majority of the code bases across industries,” the report said, adding that the code bases contained troublingly high numbers of known vulnerabilities that organizations had failed to patch, leaving them vulnerable to exploits. All code bases examined from companies in the aerospace, aviation, automotive, transportation, and logistics sectors contained some open source code, with open source code making up 73% of total code. “
    As significant as the risks from the open source code are, they can be detected by penetration testing and especially by patching. The report found that patches clearly are not being appplied. It cited that “of the 1,481 code bases examined by the researchers that included risk assessments, 91% contained outdated versions of open-source components, which means an update or patch was available but had not been applied.”
    Please see: At least one open source vulnerability found in 84% of code bases: Report At least one open source vulnerability found in 84% of code bases: Report | CSO Online
    On way that hackers take advantage of code vulnerabilities and open source flaws is via zero-day exploits. Recently a ransomware gang used a new zero-day flaw to steal data on 1 million hospital patients. “Community Health Systems (CHS), one of the largest healthcare providers in the United States with close to 80 hospitals in 16 states, confirmed this week that criminal hackers accessed the personal and protected health information of up to 1 million patients. The Tennessee-based healthcare giant said in a filing with government regulators that the data breach stems from its use of a popular file-transfer software called GoAnywhere MFT.” Clop claims it mass-hacked 130 organizations, including a US hospital network
    My Take: as a remedy to avoid vulnerability exploits and keep open source code updated, the report suggested that organizations should use a Software Bill of Materials (SBOMS) . I agree, in addition to Pen testing, SBOMS are an important way to map systems and organize to be more cyber secure. An SBOM is basically a list of ingredients that make up software components and serves as a formal record containing the details and supply chain relationships of various components used in building the software. I wrote about this extensively in a previous FORBES article.
    In the article, Dmitry Raidman. CTO, of a company called Cybeats offered insights into l specific use cases for SBOMS. They include transparency into software provenance and pedigrees, continuous security risk assessment, access control and sharing with customer who can access and what data can be seen, threat intelligence data correlation, software composition license analysis and policy enforcement, software component end of life monitoring, SCRM – Supply Chain Risk Management and supply chain screening, SBOM documents repository and orchestration, efficiency in data query and retrieval.
    Clearly, SBOMS are a good path forward in discovering and correcting open source vulnerabilities in code. Please see: Bolstering Cybersecurity Risk Management With SBOMS Bolstering Cybersecurity Risk Management With SBOMS (forbes.com)
    PHISHING Button on Computer Keyboard
    Phishing Continues to be a preferred Method of Hackers in 2023
    Phishing is still the tool of choice for many hackers. Phishing is commonly defined as a technique of hackers to exfiltrate your valuable data, or to spread malware. Anyone can be fooled by a targeted phish, especially when it appears to be coming as a personal email from someone higher up the work chain, or from a bank, organization, or a website you may frequent.
    Advances in technology have made it easier for hackers to phish. They can use readily available digital graphics, apply social engineering data, and a vast array of phishing tools, including some automated by machine learning. Phishing is often accompanied by ransomware and a tactic for hackers is to target leadership at companies or organizations (spear-phishing) because they usually have better access to valuable data and make ready targets because of lack of training.
    According to the firm Lookout, the highest rate of mobile phishing in history was observed in 2022, with half of the mobile phone owners worldwide exposed to a phishing attack every quarter. The Lookout report was based on Lookout’s data analytics from over 210 million devices, 175 million apps, and four million URLs daily. The report noted that “non-email-based phishing attacks are also proliferating, with vishing (voice phishing), smishing (SMS phishing), and quishing (QR code phishing) increasing sevenfold in the second quarter of 2022. And that “the damage can be colossal for businesses that fall victim to mobile phishing attacks: Lookout calculated that the potential annual financial impact of mobile phishing to an organization of 5000 employees is nearly $4m.
    The report also noted that “Cybercriminals mostly abused Microsoft’s brand name in phishing attacks, with more than 30 million messages using its branding or mentioning products like Office or OneDrive. However, other companies were also frequently impersonated by cybercriminals, including Amazon (mentioned in 6.5 million attacks); DocuSign (3.5 million); Google (2.6 million); DHL (2 million); and Adobe (1.5 million).”
    Please see: Record Number of Mobile Phishing Attacks in 2022 Record Number of Mobile Phishing Attacks in 2022 – Infosecurity Magazine (infosecurity-magazine.com)
    3D rendering Glowing text Ransomware attack on Computer Chipset. spyware, malware, virus Trojan, … [+] hacker attack Concept
    Ransomware and Phishing: the current state of cyber-affairs is an especially alarming one because ransomware attacks are growing not only in numbers, but also in the financial and reputational costs to businesses and organizations.
    Currently, ransomware, mostly via phishing activities, is the top threat to both the public and
    private sectors. Ransomware allows hackers to hold computers and even entire networks hostage for electronic cash payments. In the recent case of Colonial Pipeline, a ransomware attack disrupted energy supplies across the east coast of the United States.
    “In 2022, 76% of organizations were targeted by a ransomware attack, out of which 64% were actually infected. Only 50% of these organizations managed to retrieve their data after paying the ransom. Additionally, a little over 66% of respondents reported to have had multiple, isolated infections.” Please see: New cyberattack tactics rise up as ransomware payouts increase New cyberattack tactics rise up as ransomware payouts increase | CSO Online
    My Take: Since most of us are now doing our work and personal errands on smartphones, this is alarming data. But there are remedies. Training employees to identify potential phishing emails is the first step in prevention, but many of the obvious clues, such as misspelled words and poor grammar, are no longer present. Fraudsters have grown more sophisticated, and employees need to keep up with the new paradigm.
    Human errors are inevitable, however, and some employees will make mistakes and accidentally fall victim to phishing. The backup system at that point should include automated systems that can silo employee access and reduce damage if a worker’s account is compromised. The best way is to establish and monitor administrative privileges for your company. You can limit employee access or require two [authentication] steps before they go there. A lot of companies will also outlaw certain sites that workers can’t go visit, so it makes it more difficult to get phished.
    My additional advice to protect against phishing and ransomware, is to make sure you backup your valuable data (consider encrypting it too), preferably on another device segmented from the targeted PC or phone. If you are a small business or an individual, it is not a bad idea to invest in anti-phishing software. It adds another barrier. I also recommend monitoring your social accounts and credit accounts to see if there are any anomalies on a regular basis.
    Creative abstract postal envelopes sketch on modern laptop background, e-mail and marketing concept. … [+] Double exposure
    Business E-mail Compromise
    Often done in coordination with phishing, business email compromise is still a serious cybersecurity issue. A research company Trellix determined 78% of business email compromise (BEC) involved fake CEO emails using common CEO phrases, resulting in a 64% increase from Q3 to Q4 2022. Tactics included asking employees to confirm their direct phone number to execute a voice-phishing – or vishing – scheme. 82% were sent using free email services, meaning threat actors need no special infrastructure to execute their campaigns. Please see: Malicious actors push the limits of attack vectors Malicious actors push the limits of attack vectors – Help Net Security
    “Seventy-five percent of organizations worldwide reported an attempted business email compromise (BEC) attack last year. While English remained the most common language employed, companies in a few non-English nations witnessed a higher volume of attacks in their own languages, including organizations in the Netherlands and Sweden, which reported a 92% jump in such attacks; in Spain, with a 92% jump; Germany, with an 86% increase; and France, with an 80% increase.” Please see: New cyberattack tactics rise up as ransomware payouts increase New cyberattack tactics rise up as ransomware payouts increase | CSO Online
    “Business Email Compromise (BEC) attacks are no longer limited to traditional email accounts. Attackers are finding new ways to conduct their schemes — and organizations need to be prepared to defend themselves. Attackers are leveraging a new scheme called Business Communication Compromise to take advantage of large global corporations, government agencies and individuals. They are leveraging collaboration tools beyond email that include chat and mobile messaging — including popular cloud-based applications such as Slack, WhatsApp, LinkedIn, Facebook, Twitter and many more — to carry out attacks.” Please see: The evolution of business email compromise to business communication compromise The evolution of business email compromise to business communication compromise (betanews.com)
    My Take: business emails have been a top target of hackers. Accordingly, organizations need to create a corporate risk management strategy and vulnerability framework that identifies digital assets and data to be protected, including sensitive emails. Such as risk management strategy should be holistic and include people, processes, and technologies. This includes protecting and backing up email data, and the business enterprise systems such as financial systems, email exchange servers, HR, and procurement systems with new security tools (encryption, threat intel and detection, Identity Access Management, firewalls, etc.) and policies. That risk management approach must also include knowing your inventory and gaps, integrating cybersecurity hygiene practices, procuring, and orchestrating an appropriate cyber-tool stack.
    Fraud Alert in red keys on high-tech computer keyboard background with security engraved lock on … [+] fake credit cards. Concept of Internet security, data privacy, cybercrime prevention for online shopping transaction payments.
    Fraud is Trending Digital, Especially Identity Theft
    Fraud has always been a societal problem, but it is being compounded by the expansion of criminals in the digital realm. The cost is going higher as more people do their banking and buying online.
    Federal Trade Commission (FTC) data shows that consumers reported losing nearly $8.8 billion to fraud in 2022, an increase of more than 30 percent over the previous year. Much of this fraud came from fake investing scams and imposter scams. Perhaps most alarming in this report was that there were over 1.1 million reports of identity theft received through the FTC’s IdentityTheft.gov website. FTC reveals alarming increase in scam activity, costing consumers billions – Help Net Security
    My take: the reason for the increased rate of identity fraud is clear. As we become more and more connected, the more visible and vulnerable we become to those who want to hack our accounts and steal our identities. The surface threat landscape has expanded exponentially with smartphones, wearables, and the Internet of Things. Moreover, those mobile devices, social media applications, laptops & notebooks are not easy to secure.
    There are no complete remedies to identity theft but there are actions that can enable people and companies to help deter the threats. Below is a quick list of what you can to help protect your accounts, privacy, and reputation:
    1) Use strong passwords. Hackers are quite adept at guessing passwords especially when they have insights into where you lived in the past (street names), birthdays and favorite phrases. Changing your password regularly can also complicate their tasks.
    2) Maintain a separate computer to do your financial transactions and use it for nothing else.
    3) Consider using encryption software for valuable data that needs to be secured. Also set up Virtual Private Networks for an added layer of security when using mobile smartphones.
    4) Very important; monitor your credit scores, your bank statements, and your social accounts on a regular basis. Life Lock and other reputable monitoring organizations provide account alerts that are very helpful in that awareness quest. The quicker you detect fraud the easier it is to handle the issues associated with identity theft.
    5) If you get breached, if it is especially serious, do contact enforcement authorities as it might be part of a larger criminal enterprise that they should know about. In any severe breach circumstance consider looking for legal assistance on liability issues with creditors. Also consider hiring outside reputation management if necessary.
    Business and technology concept. Internet of Things(IoT). Information Communication Network(ICT). … [+] Artificial Intelligence(AI).
    Some Additional Resources and Compilation of Cybersecurity Trends for 2023:
    There is a very good report done by the Bipartisan Policy Research Center on the top eight macro risks to watch out for in 2023. The are stated below from the article and I agree with them all.

    Please see: Cyber arms race, economic headwinds among top macro cybersecurity risks for 2023 Cyber arms race, economic headwinds among top macro cybersecurity risks for 2023 | CSO Online
    And for a deeper dive on cyber stats please see: 34 cybersecurity statistics to lose sleep over in 2023 34 cybersecurity statistics to lose sleep over in 2023 (techtarget.com) The article notes upfront that that we need understand the data and its immense volume used for cyber-attacks. “By 2025, humanity’s collective data will reach 175 zettabytes — the number 175 followed by 21 zeros. This data includes everything from streaming videos and dating apps to healthcare databases. Securing all this data is vital.”
    Please also see Dan Lohrman’s annual analysis on cybersecurity trends: “After a year full of data breaches, ransomware attacks and real-world cyber impacts stemming from Russia’s invasion of Ukraine, what’s next? Here’s part 1 of your annual roundup of security industry forecasts for 2023 and beyond.” The Top 23 Security Predictions for 2023 (Part 1) The Top 23 Security Predictions for 2023 (Part 1) (govtech.com) and The Top 23 Security Predictions for 2023 (Part 2) The Top 23 Security Predictions for 2023 (Part 2) (govtech.com)
    My Take: Of course, there are many other trends and statistics to explore as the year unfolds. It is certainly a treacherous cyber ecosystem, and it is expanding with risk and threats. Being cyber-aware is part of the process of risk management and security and hopefully looking at the cyber-threat landscape will implore both industry and government to prioritize cybersecurity from the top down and bottom up!
    About The Author
    Chuck Brooks
    Chuck Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also an Adjunct Faculty at Georgetown University’s Graduate Cybersecurity Risk Management Program where he teaches courses on risk management, homeland security technologies, and cybersecurity. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn.” He was named “Cybersecurity Person of the Year for 2022” by The Cyber Express, and as one of the world’s “10 Best Cyber Security and Technology Experts” by Best Rated, as a “Top 50 Global Influencer in Risk, Compliance,” by Thompson Reuters, “Best of The Word in Security” by CISO Platform, and by IFSEC, and Thinkers 360 as the “#2 Global Cybersecurity Influencer.” He was featured in the 2020, 2021, and 2022 Onalytica “Who’s Who in Cybersecurity” He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic, He is also a Cybersecurity Expert for “The Network” at the Washington Post, Visiting Editor at Homeland Security Today, Expert for Executive Mosaic/GovCon, and a Contributor to Skytop Media, and to FORBES. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
    Chuck Brooks – Cybersecurity Person of The Year

    source

  • Sydney Man Sentenced for Blackmailing Optus Customers After … – The Hacker News

    A Sydney man has been sentenced to an 18-month Community Correction Order (CCO) and 100 hours of community service for attempting to take advantage of the Optus data breach last year to blackmail its customers.
    The unnamed individual, 19 when arrested in October 2022 and now 20, used the leaked records stolen from the security lapse to orchestrate an SMS-based extortion scheme.
    The suspect contacted dozens of victims to threaten that their personal information would be sold to other hackers and “used for fraudulent activity” unless an AU$ 2,000 payment is made to a bank account under their control.
    The scammer is said to have sent the SMS messages to 92 individuals whose information was part of a larger cache of 10,200 records that was briefly published in a criminal forum in September 2022,
    The Australian Federal Police (AFP), which launched Operation Guardian following the breach, said there is no evidence that any of the affected customers transferred the demanded amount.
    Following his arrest, the offender pleaded guilty in November 2022 to two counts of using a telecommunications network with intent to commit a serious offense.
    “The criminal use of stolen data is a serious offense and has the potential to cause significant harm to the community,” AFP Commander Chris Goldsmid said.
    The Australian telecom service provider suffered a massive hack last year, with passport information and Medicare numbers pertaining to nearly 2.1 million of its current and former customers exposed.
    Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips.

    source

  • 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder – SecurityWeek

    Hi, what are you looking for?
    Instant Checkmate and TruthFinder have disclosed data breaches affecting a total of more than 20 million users.
    By
    Flipboard
    Reddit
    Pinterest
    Whatsapp
    Whatsapp
    Email
    PeopleConnect-owned background check services Instant Checkmate and TruthFinder have disclosed data breaches affecting a total of more than 20 million users.
    In individual data breach notices published on February 3, the organizations informed users that the incident was discovered after cybercriminals started sharing databases stolen from the two companies on underground forums.
    The databases – or ‘lists’, as the two companies call them – contain names, email addresses, phone numbers, encrypted passwords, and password reset tokens that are either expired or inactive.
    “We have confirmed that the list was created several years ago and appears to include all customer accounts created between 2011 and 2019. The published list originated inside our company,” the announcements read.
    The two organizations note that the leaked information does not include details on user activity or payment data.
    While Instant Checkmate and TruthFinder also note that no “readable or usable passwords or other means to compromise user accounts” leaked either, it is not uncommon for cybercriminals to try to crack stolen encrypted passwords.
    “As a best practice we would recommend that you not respond to suspicious communications. We will never ask you for your password, social security number or payment information via email or telephone,” the companies say.
    Investigations were launched into both incidents, but no evidence of malicious activity has been found as of now on their networks. According to the two announcements, the data breach was the result of the “inadvertent leak or theft” of the impacted database.
    While neither Instant Checkmate nor TruthFinder shared information on the number of affected individuals, the data has already been added to Troy Hunt’s breach notification service Have I been pwned.
    The leaked databases include the information of more than 11.9 million Instant Checkmate accounts, and the details of over 8.1 million TruthFinder accounts.
    Related: 820k Impacted by Data Breach at Zacks Investment Research
    Related: 18k Nissan Customers Affected by Data Breach at Third-Party Software Developer
    Related: 251k Impacted by Data Breach at Insurance Firm Bay Bridge Administrators

    Ionut Arghire is an international correspondent for SecurityWeek.
    Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
    Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.
    Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.
    Anna Tutt, CMO of Oort, shares her experiences and perspectives on how we can accelerate growth of women in cybersecurity.
    History has shown that when it comes to ransomware, organizations cannot let their guards down.
    The conventional tools we rely on to defend corporate networks are creating gaps in network visibility and in our capabilities to secure them.
    While there are many routes to application security, bundles that allow security teams to quickly and easily secure applications and affect security posture in a self-service manner are becoming increasingly popular.
    Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.
    Flipboard
    Reddit
    Pinterest
    Whatsapp
    Whatsapp
    Email
    Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.
    The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.
    No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.
    The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.
    GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.
    The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.
    PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.
    A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the…
    Got a confidential news tip? We want to hear from you.
    Reach a large audience of enterprise cybersecurity professionals
    Subscribe to the SecurityWeek Daily Briefing and get the latest content delivered to your inbox.
    Copyright © 2023 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

    source

  • Birmingham medical practice informs patients of security breach – WBRC

    BIRMINGHAM, Ala. (WBRC) – A Birmingham-based medical practice is informing patients of a data breach that could have compromised personal information.
    Cardiovascular Associates (CVA), a physician practice with multiple locations in and around Birmingham, discovered on December 5 that systems within CVA’s network may have been subject to unauthorized activity.
    After an investigation, it was determined that a third party had gained access to personal information and removed a copy of some data between November 28 and December 5.
    CVA said that some of the personal information involved may include one or more of the following:
    CVA said that for a limited number of people, the information may have also included username and password information. The practice did note that “not all data elements were involved for all individuals.”
    CVA takes the security of personal information seriously. As soon as the incident was discovered, a forensic investigation was launched, and steps were taken to mitigate and remediate the incident and to help prevent further unauthorized activity. In response to this incident, security and monitoring capabilities are being enhanced and systems are being hardened as appropriate to minimize the risk of any similar incident in the future.
    CVA said they are offering complimentary credit monitoring and identity restoration services to those whose sensitive information may have been involved. They advise for patients to carefully review credit reports and statements from healthcare providers and financial institutions to ensure valid account activity.
    CVA has set up a dedicated assistance line for anyone seeking more information about the incident. Anyone with questions over the next 90 days can call 1 (833) 753-3802 between 8 a.m. and 8 p.m., Monday through Friday. More information is available at https://response.idx.us/cvainformation/.
    Get news alerts in the Apple App Store and Google Play Store or subscribe to our email newsletter here.
    Copyright 2023 WBRC. All rights reserved.

    source

  • Top Cyber Security Companies in Delhi – Security Boulevard

    The Home of the Security Bloggers Network
    Home » Security Bloggers Network » Top Cyber Security Companies in Delhi
    Strong cyber security measures are now essential given the speed at which businesses are going digital and the rise in cyber threats. Businesses need the help of cyber security firms to protect themselves from attacks and prevent the compromise of important data. Security has become a top priority for both individuals and businesses as a result of the rapid advancement of technology and the addition of new devices to the online world every day.
    If a network or equipment is not properly safeguarded from hackers, it might be damaged and breached. According to projections, the cost of cybercrime is expected to rise to $10.5 trillion by 2025. Due to their extensive data collection and storage, businesses are particularly susceptible to cybercrime.
    As the nation’s capital and a major commercial center, Delhi is home to a large number of cybersecurity firms. But, not all cyber security companies are the same, so it’s important to pick the one that best suits your needs.
    We’ll talk about the leading cyber security companies in Delhi, their offerings, and their distinctive qualities in this blog. In this blog, we’ll look at a few of Delhi’s best cyber security firms, their specialties, and how they’re assisting businesses in keeping their data secure in the current digital environment. So let’s investigate the finest cyber security companies in Delhi.


    Cybersecurity is the process of defending computer systems, networks, programs, and data against theft, damage, or unwanted access. In order to stop, recognize, and address attacks and threats against digital systems, a variety of strategies and procedures are used.
    Due to the increase in frequency and sophistication of cyberattacks, which can take the shape of viruses, malware, phishing schemes, ransomware, and other forms of malicious software, cybersecurity is becoming an increasingly essential topic. These assaults can potentially compromise private information, result in monetary losses, interfere with commercial operations, and harm one’s reputation.
    Organizations and individuals must put in place a number of security measures to maintain cybersecurity, including employing strong passwords, encrypting sensitive data, upgrading software and systems frequently, utilizing firewalls and antivirus software, and offering staff cybersecurity training.
    Due to the sophistication and frequency of cyber threats, cybersecurity has emerged as one of the top concerns for both enterprises and individuals. Cyber threats are becoming more sophisticated and complex as technology develops. It should come as no surprise that businesses all around the world are investing in cyber security to safeguard themselves against potential assaults. Some businesses that focus on offering cyber security services are located in Delhi, the capital of India. The solutions provided by these businesses include threat detection and response, vulnerability analysis, penetration testing, and security consultancy.


    Below is the list of the Top Cyber security companies in Delhi
    Numerous businesses offer various cyber security services, but it’s still unclear which is the best. One of the leading cyber security providers, Kratikal can meet all of your organizational needs.
    Kratikal, one of the leading cybersecurity companies, is well known for its innovative security solutions. In addition to security auditing for PCI DSS, HIPAA, GDPR, and ISO 27001, it offers a comprehensive range of penetration testing and vulnerability assessment services.
    Through security testing, Kratikal, a CERT-In Empanelled security solutions provider, offers the services required to guarantee the protection of an organization’s IT assets as well as the safety of its employees. The aim of the entire VAPT service portfolio, which includes Network Penetration Testing, Application Penetration Testing, Cloud Penetration Testing, and many others, is to locate the weaknesses in various devices and their networks so that they can be fixed in advance.
    In order to help you choose a top cyber security testing company in Delhi, we set out to enlighten you about them in this blog. Post your comments in the space provided below.
    The post Top Cyber Security Companies in Delhi appeared first on Kratikal Blogs.
    *** This is a Security Bloggers Network syndicated blog from Kratikal Blogs authored by Deepti Sachdeva. Read the original post at: https://kratikal.com/blog/top-cyber-security-companies-in-delhi/
    More Webinars
    Security Boulevard Logo White
    DMCA

    source

  • Cybersecurity Threats in Europe: What You Need to Know and What … – tripwire.com

    As governments and organizations standardize and harmonize their responses to better mitigate the increasing number of cyber-attacks, so do cybercriminals. In Europe, security decision-makers and businesses face similar attack techniques as their global counterparts. While the methodologies employed are identical because they all rely on the same digital technologies exploiting similar vulnerabilities, the motivations vary.
    The threat actors can be distinguished into two major groups according to their motivation:
    Both groups follow well-known pathways to initial compromise, such as exploiting unpatched vulnerabilities, credential theft, social engineering and phishing attacks, and deploying malware with a preference for ransomware attacks.
    A Forrester report found that throughout 2022, CISOs in European organizations faced four threats that differed from the global trends.
    State-sponsored attacks are a valid concern for European businesses, but organized crime is booming.
    While Europe is not the key target of state-sponsored activities, security leaders must be aware of this problem. Africa, the Middle East and Turkey are most targeted by politically motivated actors, followed by Northern Europe. In Europe, organizations are predominantly plagued by financially driven threat actors located in Russia, Iran, and North Korea.
    Organized cybercriminals have skilled up as cybercrime goes mainstream. With the cybercrime economy growing and becoming the third-largest global economy, criminal gangs are forming collectives to exchange knowledge and trade. Organized Crime as a Service is booming, taking several forms:
    Overall, we witness an increased collaboration between cybercriminal gangs, more like Crime as a Business. Cybercriminals have specializations, like any business and teams, and work together to achieve objectives ranging from petty scams to espionage.
    Forrester’s data highlights that 16% of European security decision-makers treat securing OT environments as a top tactical priority. At the same time, IBM reports a 2,204% increase in reconnaissance against OT systems.
    State-sponsored affiliated actors, including Electrum, Magnallium, and Xenotime, increasingly target manufacturing organizations. These actors gain initial access using credential theft, exploiting cloud vulnerabilities and malware. However, the positive sign is that security decision-makers at organizations that had experienced disruption or data ransom were more likely to prioritize ICS or OT security.
    Businesses need help to integrate threat intelligence into their security programs. However, threat intelligence feeds listing initial compromise indicators must be more comprehensive. European organizations must evaluate their threat intelligence program through three lenses: tactical, operational, and strategic. This is essential because, besides recognizing the attackers’ tactics, geography and politics are vital factors to consider when building cyber threat intelligence.
    Therefore, businesses should base their threat intel program on four critical considerations:
    Focusing on the OT domain, security begins with knowing your environment. Therefore, the first step is to identify all your intellectual property and where it resides and consider how you can protect it with consistent data security policies.
    Once you have achieved the desired level of visibility, the next step is to encrypt your critical data and implement a data loss prevention (DLP) strategy. Leveraging specialized DLP software offers multiple benefits for organizations. Finally, you should use data classification capabilities and centralized policy management to simplify detection and policy enforcement.
    However, cybersecurity is not only about processes. It is also about the people and technology in your organization. European organizations should prepare their people for the possibility of a successful attack. There are several steps you can take in this direction:
    Fortra has long been known for helping organizations become more secure and autonomous. To increase security maturity and decrease operational burden, we must address technology-based and people-based vulnerabilities together. That means securing infrastructure and data, consistently improving people’s awareness of security risks, and supplementing their teams with additional security operations resources.
    By doing this successfully, we will significantly increase an organization’s security maturity in the areas that account for 75% of all attacks with just one cybersecurity partner while decreasing their operational burden. Fortra offers a wide range of cybersecurity solutions to help European organizations effectively protect against the evolving threat landscape.
    To dig more into the topic, understand in greater detail the Forrester survey findings and learn how Fortra can help you, you may watch the on demand webinar, “Cybersecurity Threats In Europe: What You Need to Know and What to Do About Them.

    source