Tuesday, April 4, 2023

PCMag Security Watch

"Keep your kids safe online/ChatGPT takes on hackers/How to switch VPNs."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 04 April 2023, 2052 UTC. Content provided by email subscription to "PCMag Security Watch."

Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGsltKcndkDkrkRSwCfPbwWgLjt ("PCMag Security Watch").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

Not displaying correctly? View this newsletter online.
PCMAG
TODAY'S FEATURED STORY
10 Things Every Parent With a Connected Kid Needs to Know

Protecting kids is harder today than it used to be, thanks in large part to technology. We tell you how to prepare children for the dangers they face online.

 
THE LATEST
Tired of Your VPN? Here's How to Switch

Quitting your old VPN and starting up with a new one is simple. We show you how to make the change and give you tips on what to check if your new VPN isn't working.

Million-Dollar Tax Refund From the IRS? Nope, Watch Out For These Tax Scams

With tax season in full swing, cybersecurity companies like Trustwave and Malwarebytes, as well as the IRS, warn the public to watch out for tax-themed phishing messages.

Mullvad VPN, Tor Project Team Up on Privacy-Focused Browser

The Mullvad Browser promises to collect no data from the user while minimizing tracking from websites. But it's best used with a VPN to ensure more complete protection.

As Twitter Pulls Legacy Checkmarks, Hackers Pounce With Phishing Emails

The phishing messages say 'Last call on verified accounts' in the subject line, in an attempt to dupe unsuspecting users with legacy blue checkmarks into revealing account data.

Microsoft Uses ChatGPT Tech to Help Security Industry Fend Off  Hackers

Microsoft Security Copilot promises to help IT security professionals streamline their work, including the ability to reverse-engineer attacks in seconds.

How to Wipe Your Hard Drive

Planning to get rid of your Windows PC? Here's how to make sure all the personal files on your hard drive are erased and unrecoverable, whether you're running Windows 11, 10, 8.1, or 7.

 
OTHER TECH NEWS
Hackers Behind 3CX App Hijacking Targeted Cryptocurrency Companies
What to Do if Your Antivirus Stops Working
Surfshark VPN Can Protect All Your Connections
Feedly Faces Backlash Over Protest-Tracking AI Models
Italy to Block ChatGPT for 'Unlawfully' Collecting Users' Data
Ransomware Is on the Rise: 10 Steps for Defending Your Business
PCMAG PICKS
Let a Password Manager Remember for You
Stop Spyware Dead
We Pick the Best Free Antivirus
Protect Your Business Data With Cloud Backups
Tech Deals

 

CSO UK First Look

"5 strategies to manage cybersecurity risks in mergers and acquisitions."

Views expressed in this cybersecurity, cybercrime, cyber espionage update are those of the reporters and correspondents.  Accessed on 04 April 2023, 1250 UTC.  Content provided by email subscription to "CSO UK First Look."

Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGsltKcTknMHgsbBbjkljbZhgjs ("CSO UK First Look").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

CSO

The week's top cybersecurity news and in-depth coverage

CSO FIRST LOOK

04 APRIL , 2023

5 strategies to manage cybersecurity risks in mergers and acquisitions

Mergers and acquisitions offer benefits to both buyer and those being bought, brining new synergies and energizing both sides while creating a newer, bigger, stronger entity. But a new addition to the corporate family can bring with it a host of cybersecurity risks. Read more ▶

Image: Darktrace/Email upgrade enhances generative AI email attack defense

Darktrace/Email upgrade enhances generative AI email attack defense

Upgraded features designed to tackle novel email attacks and increasingly complex malicious communication powered by generative AI including ChatGPT and other large language models. Read more ▶

North Korean threat actor APT43 pivots back to strategic cyberespionage

The APT43 group is highly adept at using social engineering to target individuals and extract sensitive information. Read more ▶

HM Treasury seeks new head of cybersecurity, sparks criticism over £57k salary

The UK’s HM Treasury is looking to hire an “experienced” head of cybersecurity, but condemnation of the proposed salary suggests role may be hard to fill. Read more ▶

Image: China to probe Micron over cybersecurity, in chip war’s latest battle

China to probe Micron over cybersecurity, in chip war’s latest battle

The Chinese government will investigate US-based Micron as a potential cyberthreat, in the latest move in an ongoing semiconductor trade dispute that is disrupting the chip supply chain. Read more ▶

Israeli cybersecurity firm launches managed services offering for MSPs

Guardz’ new cybersecurity tools are aimed at helping managed service providers streamline cybersecurity offerings for their small and mid-size business clients. Read more ▶

CSO
.
FBTWIn
© 2023 CSO Online
IDG Communications Ltd.
101 Euston Road London
England NW1 2RA

Monday, April 3, 2023

The Hacker News Daily Updates

"Western Digital hit by Network Security Breach."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 03 April 2023, 1350 UTC.  Content provided by email subscription to "The Hacker News Daily Updates."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGsltJScgqJZjpNZVBZbzTNwzDr ("The Hacker News Daily Updates").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).

The Hacker News Daily Updates
Newsletter
cover

THN Webinar: Master the Six Phases of Incident Response

React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Download NowSponsored
LATEST NEWSApr 3, 2023

Western Digital Hit by Network Security Breach - Critical Services Disrupted!

Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access to its systems. The breach is said to have occurred on March 26, 2023, enabling an unnamed third party to gain access to a "number of the company's systems." Following the discovery of the hack, Western Digital said it has initiated incident response efforts and ...

Read More
TwitterFacebookLinkedIn

Italian Watchdog Bans OpenAI's ChatGPT Over Data Protection Concerns

The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a temporary ban of OpenAI's ChatGPT service in the country, citing data protection concerns. To that end, it has ordered the company to stop processing users' data with immediate effect, stating it intends to investigate the company over whether it's unlawfully processing such data ...

Read More
TwitterFacebookLinkedIn

Top 5 Free Endpoint Management Tools

Stay secure and support your work-from-anywhere workplace with no VPN with the best in class free tools trusted by thousands of global enterprises. Patching, remote access and management, software deployment, IT asset inventory – get started now with the top 5 free endpoint management ...

Read More
TwitterFacebookLinkedIn

"It's The Service Accounts, Stupid": Why Do PAM Deployments Take (almost) Forever To Complete

Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative accounts. In theory, the PAM concept makes absolute sense: place admin credentials in a vault, rotate their passwords, and closely monitor their sessions. However, the harsh reality is that the vast majority of PAM projects either become a years-long project, or ...

Read More
TwitterFacebookLinkedIn

Crypto-Stealing OpcJacker Malware Targets Users with Fake VPN Service

A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of 2022 as part of a malvertising campaign. "OpcJacker's main functions include keylogging, taking screenshots, stealing sensitive data from browsers, loading additional modules, and replacing cryptocurrency addresses in the clipboard for hijacking purposes," Trend Micro ...

Read More
TwitterFacebookLinkedIn

Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps

Microsoft has patched a misconfiguration issue impacting the Azure Active Directory (AAD) identity and access management service that exposed several "high-impact" applications to unauthorized access. "One of these apps is a content management system (CMS) that powers Bing.com and allowed us to not only modify search results, but also launch high-impact XSS attacks on Bing users," cloud ...

Read More
TwitterFacebookLinkedIn

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors in hacks targeting unpatched systems. This entails the abuse of CVE-2022-46169 (CVSS score: 9.8) and CVE-2021-35394 (CVSS score: 9.8) to deliver MooBot and ShellBot (aka PerlBot), Fortinet FortiGuard Labs said in a report published this week. CVE-2022-46169 relates to a ...

Read More
TwitterFacebookLinkedIn

Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!

Unknown threat actors are actively exploiting a recently patched security vulnerability in the Elementor Pro website builder plugin for WordPress. The flaw, described as a case of broken access control, impacts versions 3.11.6 and earlier. It was addressed by the plugin maintainers in version 3.11.7 released on March 22. "Improved code security enforcement in WooCommerce components," the ...

Read More
TwitterFacebookLinkedIn
cover

THN Webinar: Master the Six Phases of Incident Response

React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Download NowSponsored

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...