Saturday, November 4, 2023

The Hacker News Daily Updates.

 "StrippedFly Malware operated unnoticed for 5 years, infecting 1 million devices."

Views expressed in this cybersecurity, cyber crime report are those of the reporters and correspondents.  Accessed on 04 November 2023, 1344 UTC.  Content provided by "The Hacker News Daily Updates."

Source: https://mail.google.com/mail/u/0/#inbox/FMfcgzGwHVQcMDkpTsDDnMvxBLPxtJPC ("The Hacker News Daily Updates").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

The Hacker News Daily Updates
Newsletter
cover

Practical Threat Detection Engineering ($47.99 Value) FREE for a Limited Time

Threat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline

Download NowSponsored
LATEST NEWSNov 4, 2023

StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices

An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no less than one mill... ...

Read More
TwitterFacebookLinkedIn

Okta's Recent Customer Support Data Breach Impacted 134 Customers

Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 1... ...

Read More
TwitterFacebookLinkedIn

New podcast episode: How are companies newly managing third party risks?

Tune in for an enlightening discussion exploring how companies are newly prioritizing third party risk management in a rapidly evolving digital corporate landscape, the impact of regulatory changes, and how the COVID-19 pandemic exposed weaknesses in ...

Read More
TwitterFacebookLinkedIn

Google Play Store Introduces 'Independent Security Review' Badge for Apps

Google is rolling out an "Independent security review" badge in the Play Store's Data safety section for Android apps that have undergone a Mobile A... ...

Read More
TwitterFacebookLinkedIn

Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments

The threat actors linked to Kinsing have been observed attempting to exploit the recently disclosed Linux privilege escalation flaw called Looney Tu... ...

Read More
TwitterFacebookLinkedIn

NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads

Compromised Facebook business accounts are being used to run bogus ads that employ "revealing photos of young women" as lures to trick victims into do... ...

Read More
TwitterFacebookLinkedIn

Predictive AI in Cybersecurity: Outcomes Demonstrate All AI is Not Created Equally

Here is what matters most when it comes to artificial intelligence (AI) in cybersecurity: Outcomes.  As the threat landscape evolves and generative ... ...

Read More
TwitterFacebookLinkedIn

CanesSpy Spyware Discovered in Modified WhatsApp Versions

Cybersecurity researchers have unearthed a number of WhatsApp mods for Android that come fitted with a spyware module dubbed CanesSpy. These modified... ...

Read More
TwitterFacebookLinkedIn
cover

Practical Threat Detection Engineering ($47.99 Value) FREE for a Limited Time

Threat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline

Download NowSponsored

Friday, November 3, 2023

The CyberWire Daily.

 "In the offense-defense see-saw, the defense seems to be winning."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 03 November 2023, 2031 UTC.  Content provided by email subscription to "CyberWire Daily."

Source: https://thecyberwire.com/podcasts/daily-podcast ("CyberWire Daily").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Join Pro Today
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.

RECENT EPISODES

Ep 1941 | 11.3.23

In the offense-defense see-saw, the defense seems to be rising.

An Apache vulnerability is being used to install ransomware. Exploitation of Citrix vulnerability in the wild. AP sustains DDoS attack. HHS reaches settlement in HIPAA data breach incident. More evidence of OSINT's reach. On the Solution Spotlight: Simone Petrella and Rick Howard speak with Ben Rothke about his article and thoughts on "Is there really an information security jobs crisis?" Andrea Little Limbago from Interos joins us to discuss SEC and the disclosure rules. And, Microsoft draws a lesson from Russia's war: cyber defense now has the advantage over cyber offense.

Ep 1940 | 11.2.23

The beginning of an international consensus on AI governance may be emerging from Bletchley Park.

Bletchley Declaration represents a consensus starting point for AI governance. Lazarus Group prospects blockchain engineers with KANDYKORN. Boeing investigates ‘cyber incident’ affecting parts business. NodeStealer’s use in attacks against Facebook accounts. Citrix Bleed vulnerability exploited in the wild. MuddyWater spearphishes Israeli targets in the interest of Hamas. India to investigate alleged attacks on iPhones. Tim Starks from the Washington Post on the SEC’s case against Solar Winds. In today’s Threat Vector segment David Moulton from Unit 42 is joined by Matt Kraning of the Cortex Expanse Team for a look at Attack Surface Management. And Venomous Bear rolls out some new tools.

Ep 1939 | 11.1.23

Hacktivism in two hybrid wars (with an excursus on gastropods).

The Hamas-Israel war continues to be marked by hacktivism. Arid Viper's exploitation of Arabic speaker's Android devices. Iran shows improved cyberespionage capabilities. A URL shortener in the C2C market. Taking down the Mozi botnet. Ransomware in healthcare. Two are Russians arrested on treason charges, accused of hacking for Ukraine. In our sponsored Industry Voices segment, Anna Belak from Sysdig shares a new threat framework for the cloud. Rick Howard previews his new online course on cyber security first principles. And no, Russia hasn’t really replaced its currency with Arctic Ocean gastropods.

TranscriptTranscript
Ep 1938 | 10.31.23

What would it take to get you kids into a nice, late-model malware mealkit?

Malicious packages are found attached to NuGet. Russia will establish its own substitute for VirusTotal. Commodity tools empower low-grade Russian cybercriminals. Malware mealkits, and other notes from the cyber underground. Insights from a Cybersecurity workforce study. Mr Security Answer Person John Pescatore looks at MFA. Drew Rose from Living Security on the very scary human side of cyber attacks. And more details from President Biden’s Executive Order on artificial intelligence.

TranscriptTranscript
Ep 1937 | 10.30.23

Bringing AI up right–realizing its potential without its becoming a threat. (And how deepfakes might be an informational fleet-in-being.)

The Hive ransomware gang may be back, and rebranded. Coinminers exploit AWS IAM credentials. LockBit claims to have obtained sensitive information from Boeing. Ukrainian auxiliaries disrupt Internet service in Russian-occupied territory, while internet and telecoms are down in Gaza. Deepfakes have an effect even when they're not used. Joe Carrigan explains executive impersonations on social media. Our guest is David Brumley, cybersecurity professor at Carnegie Mellon and CEO of software security firm, ForAllSecure, discussing spooky zero days and vulnerabilities. And President Biden releases a US Executive Order on artificial intelligence.

TranscriptTranscript
Load More

Thursday, November 2, 2023

Cyber Hawaii News Update.

Cyber Hawaii News Update:  "Keep your business safe from cyber threats...free webinar. "

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Content provided by "Cyber Hawaii News Update."  Source:  

https://mail.google.com/mail/u/0/#inbox/FMfcgzGwHVNKtcRWgXSHsqKsQGjdbQzj ("Cyber Hawaii News Update:).

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

Keep Your Business Safe from Cyber Threats

Free Webinar...Register Today!

Tuesday, Nov. 14, 2023

Noon to 1 pm


Sponsored by CyberHawaii, the Hawai‘i Defense Alliance (HDA) and the Hawai‘i Department of Business, Economic Development & Tourism (DBEDT)



It seems like every day we read about new cyber threats. No organization is immune. Despite their best efforts, even well-known organizations such as the University of Hawai‘i, Hawai‘i Department of Health and Aloha Nursing Rehab Center have become victims. 


Cyber threats can impact businesses of any size and the threat actors have become extremely sophisticated. It is no longer a question of if you'll be impacted, but when. 


As a small business, you can mount a robust cyber defense to protect your company and the sensitive information of your customers from ransomware and other emerging threats.  

 

In this webinar, you'll learn about:


  • Who regulates cyber security
  • Why it's important to comply 
  • How to manage risk by prioritizing your investment in security controls
  • Why it's critical to involve human resources in cybersecurity
  • When cyber insurance may be appropriate
  • What your next steps should be

Our speakers are both with ES&A, a Honolulu law corporation:

Sam SneedDirector and Attorney, advises clients on confidentiality, privacy and cybersecurity. She provides practical, comprehensive guidance grounded in the perspectives of technologists, businesspeople, and those they serve. By advising clients on how to protect, use, share, and commercialize information and technology, Sam helps for-profit, non-profit and government organizations to align their human and technological resources.

Greg Lau, Attorney of Counsel, draws upon his background in computer science, business and law to advise clients on cybersecurity, privacy regulations and cybersecurity incident response planning. He takes a multifaceted approach to client service, providing legal counsel as well as advocacy with federal regulatory agencies, and advice on applying new and emerging technologies to develop business opportunities and strategies.

Click here to register for this free webinar!

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram
CyberHawaii | 2800 Woodlawn Drive, Suite 101GHonolulu, HI 96822
Unsubscribe kh6jrm@gmail.com
Update Profile | Constant Contact Data Notice
Sent by cyberhi@cyberhawaii.org powered by
Trusted Email from Constant Contact - Try it FREE today.

Cyber War News Today.

"From trade wars to cyber wars in modern era." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are ...