Information security

[ follow ]
#cybersecurity

TSA head who oversaw pipeline cyber rules pushed out by Trump

David Pekoske has been asked to resign as TSA chief, ending his tenure ahead of schedule as Donald Trump takes office.

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

Stolen credentials are the leading attack vector in 2023/24, constituting 80% of web app breaches.

President Biden's new executive order aims to bolster national security

Biden's executive order aims to enhance cybersecurity and impose sanctions on foreign hacking groups targeting U.S. systems.

Biden strengthens US cyber defenses against Russia and China threats

The Biden administration issues a sweeping executive order to strengthen U.S. cybersecurity against threats from nations and cyber criminals.

Security's Top 5 - 2024 Year in Review

The security industry is facing a range of challenges, including staffing shortages and unique vulnerabilities for small businesses.

The FCC's Jessica Rosenworcel Isn't Leaving Without a Fight

Strong oversight of telecommunications is essential to prevent further cybersecurity threats from foreign adversaries like China.

TSA head who oversaw pipeline cyber rules pushed out by Trump

David Pekoske has been asked to resign as TSA chief, ending his tenure ahead of schedule as Donald Trump takes office.

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

Stolen credentials are the leading attack vector in 2023/24, constituting 80% of web app breaches.

President Biden's new executive order aims to bolster national security

Biden's executive order aims to enhance cybersecurity and impose sanctions on foreign hacking groups targeting U.S. systems.

Biden strengthens US cyber defenses against Russia and China threats

The Biden administration issues a sweeping executive order to strengthen U.S. cybersecurity against threats from nations and cyber criminals.

Security's Top 5 - 2024 Year in Review

The security industry is facing a range of challenges, including staffing shortages and unique vulnerabilities for small businesses.

The FCC's Jessica Rosenworcel Isn't Leaving Without a Fight

Strong oversight of telecommunications is essential to prevent further cybersecurity threats from foreign adversaries like China.
morecybersecurity

The Absolute Minimum Every Python Web Application Developer Must Know About Security

Never store passwords in plain text; use salted hashes and delegate password management for security.

AI-generated code risks: What CISOs need to know

The rise of AI-generated code raises significant security concerns among leaders regarding code integrity and potential vulnerabilities.

FCC orders telcos to sharpen up security after Salt Typhoon chaos

The FCC is enhancing network security regulations for telecom carriers in response to the Salt Typhoon cyber threat. Action is needed to protect communication systems.

Top challenge for 57% of end users is outdated physical security or IT

Collaboration between physical security and IT is prevalent, but outdated infrastructure remains a significant challenge.
Supply chain issues and economic uncertainties are the leading causes for project delays in the industry.
Access control and video surveillance are essential priorities for end users in 2025.

The U.K. is considering prohibiting ransom payments. It's a difficult issue.

The article discusses ongoing efforts to reduce ransomware payments and explore the implications of banning such payments for cybersecurity.

How gen AI is making real estate cybercrime easier than ever

Generative AI significantly enhances the capabilities of cybercriminals, making sophisticated financial crimes easier to execute.

Product Walkthrough: How Satori Secures Sensitive Data From Production to AI

Securing sensitive data is increasingly difficult due to rapid data growth, changing user roles, and stricter compliance requirements.

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

Malicious npm and PyPI packages are designed to steal and delete sensitive data, primarily targeting cryptocurrency wallets.

Zero Day Initiative - Looking at the Attack Surfaces of the Pioneer DMH-WT7600NEX IVI

Researchers are targeting the Pioneer DMH-WT7600NEX in the Pwn2Own Automotive contest, focusing on its software extraction vulnerabilities.

Take a security team from data-wrangling to data analysis

Data analysts spend 80% of their time on data cleaning rather than actual analysis, undermining organizational security efforts.

Microsoft fixes problems with crashing Office 365 apps on Windows Server systems

Microsoft has fixed a crash issue with Microsoft 365 apps and Classic Outlook on Windows Server 2016/2019 systems caused by a recent update.

'Reliable security without monthly fees' why I chose a security camera that doesn't require a subscription

Home security systems without subscription fees provide cost-effective solutions while offering comparable performance to cloud-dependent models.

2025's first Patch Tuesday: 159 patches, including several zero-day fixes

Microsoft starts 2025 with substantial updates, addressing security vulnerabilities and enhancing update procedures for Windows and Office.

More AI, More Problems for Software Developers in 2025

Are organizations ready to address the toil, vulnerabilities and developer burnout that AI-generated code can introduce?
#social-security

If You're Rich, You May Not Get Social Security

The Social Security Administration may run out of funds by 2033, requiring congressional action to prevent reduced benefit payouts.

Trump Wants to Eliminate Taxes on Social Security Benefits -- but Will That Cause Even More Problems?

Social Security benefits are taxable at the federal and state levels, impacting low-income seniors.
Tax thresholds for Social Security are unreasonably low, affecting many retirees.
Eliminating taxes could relieve seniors now but harm Social Security's future.

3 Social Security Moves for 2025 That Could Raise Your Future Benefits

Taking proactive steps can enhance your future Social Security benefits significantly, including checking earnings records and pursuing salary increases.

If You're Rich, You May Not Get Social Security

The Social Security Administration may run out of funds by 2033, requiring congressional action to prevent reduced benefit payouts.

Trump Wants to Eliminate Taxes on Social Security Benefits -- but Will That Cause Even More Problems?

Social Security benefits are taxable at the federal and state levels, impacting low-income seniors.
Tax thresholds for Social Security are unreasonably low, affecting many retirees.
Eliminating taxes could relieve seniors now but harm Social Security's future.

3 Social Security Moves for 2025 That Could Raise Your Future Benefits

Taking proactive steps can enhance your future Social Security benefits significantly, including checking earnings records and pursuing salary increases.
moresocial-security

US Names One of the Hackers Allegedly Behind Massive Salt Typhoon Breaches

The Biden administration's new executive order focuses on enhancing federal cybersecurity and regulating AI usage.

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

The Treasury imposed sanctions on a Chinese firm due to cyber threats linked to the Salt Typhoon group.

How victims of PowerSchool's data breach helped each other investigate 'massive' hack | TechCrunch

PowerSchool suffered a significant data breach affecting numerous schools, potentially compromising sensitive student and teacher information.

Secure AI? Dream on, says AI red team

Microsoft's AI Red Team emphasizes that the development of safe AI systems is an ongoing, incomplete process, requiring constant evaluation and adaptation.

Windows Insiders can now turn on Administrator Protection

Microsoft is enhancing user security in Windows 11 by simplifying access to Administrator Protection.

Exclusive: Malware stole internal PowerSchool passwords from engineer's hacked computer

A cyberattack on PowerSchool endangers the private data of millions of students and teachers due to compromised security protocols.

Biden signs 11th-hour cybersecurity executive order

Biden's final cybersecurity order attempts comprehensive reforms in response to escalating cyber threats, but its timing raises concerns about its effectiveness.

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

AT&T experienced a significant data breach affecting communication logs of over 100 million customers, including FBI agents' records.

FCC says US telcos by law must secure networks from spies

FCC mandates telecoms to secure systems against foreign snooping under CALEA, targeting vulnerabilities exploited by Chinese agents.

FBI warns agents of call log thefts by hackers who breached AT&T - prompts urgent push to protect confidential informants' identities: report

FBI agents' call and text logs were likely stolen in an AT&T data breach, necessitating immediate protective measures for informants' identities.

Microsoft files suit against threat actors abusing AI services

Microsoft has filed a lawsuit against foreign threat actors for stealing Azure OpenAI API keys to facilitate hacking operations.

Microsoft AI Red Team says security work will never be done

AI security is a continuous challenge as generative models amplify existing risks.
Understanding the specific capabilities and applications of AI systems is critical for effective security.

Cyber innovation to address rising regulatory, threat burden | Computer Weekly

The evolving digital landscape demands proactive security strategies and compliance amidst increasing threats and regulatory changes.

3 ways AI will transform security in 2025

AI evolution has transformed from simple pattern recognition to complex variable outputs, enhancing user interaction but also introducing significant security challenges.

Five Trends That Will Drive Software Development in 2025 - DevOps.com

The rise of AI in software development is significant, with strong future growth anticipated in efficiency and application modernization.

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

Organizations must secure guest Wi-Fi infrastructure to protect sensitive data while accommodating visitors, contractors, and employees.
Zero-trust architecture combined with cloud-based solutions enhances guest Wi-Fi security.

Will 2025 Be The Turning Point For Passwords: What's Next For The Passwordless Future? | HackerNoon

Passwords are increasingly viewed as insufficient for digital security due to rising cybersecurity threats and complexities.

A guide to DORA compliance | Computer Weekly

DORA aims to enhance operational resilience in financial organizations against digital disruptions, with full compliance required by January 2025.

Optimizing Your eLearning Platform With A Web Hosting Control Panel: Best Practices

eLearning platforms need to prioritize performance, security, and scalability for a superior user experience.
#security

NFL, feds tighten Super Bowl security after attack

Super Bowl LIX security heightened after New Year's Day attack in New Orleans, ensuring robust law enforcement presence for attendees.

Six vulnerabilities in rsync announced and fixed in a day

Several CVEs were found in rsync, but a fixed version was released quickly, addressing the critical vulnerabilities noted.

NFL, feds tighten Super Bowl security after attack

Super Bowl LIX security heightened after New Year's Day attack in New Orleans, ensuring robust law enforcement presence for attendees.

Six vulnerabilities in rsync announced and fixed in a day

Several CVEs were found in rsync, but a fixed version was released quickly, addressing the critical vulnerabilities noted.
moresecurity

Report Surfaces DevSecOps Progress Despite Decline in Developer Training - DevOps.com

Increased SCA adoption contrasts a decline in security training for development teams, representing a concerning trend in software security practices.
AI reliance calls for evolving security practices to accommodate growing amounts of code needing scrutiny.

Biden signs executive order inspired by lessons from recent cyberattacks

Biden's cybersecurity executive order enhances federal protections and sanctions against cybercriminals, reflecting lessons learned from significant past cyberattacks.

Clop ransomware gang names dozens of victims hit by Cleo mass-hack, but several firms dispute breaches | TechCrunch

Clop ransomware gang exploited a vulnerability in Cleo's file transfer products, breaching 59 organizations and threatening to leak data unless ransom is paid.

SentinelOne brings Purple AI analyst to Zscaler, Okta and Microsoft

SentinelOne's Purple AI now integrates with third-party data sources, enhancing threat detection and accelerating cybersecurity investigations.

Biden issues an 11th hour executive order aimed at strengthening U.S. cybersecurity

Biden's executive order enhances cybersecurity measures, reflecting four years of responses to escalating digital threats against the U.S.

Prepping for your January 2025 board meeting

Effective communication of cybersecurity risks and strategies can align the CISO's priorities with business objectives, crucial for the organization's success.

File sync tool rsync is vulnerable, 660,000 servers exposed

CVE-2024-12084 is a serious vulnerability in rsync affecting 660,000 servers, mostly in China, requiring urgent attention.

Biden Administration proposes framework for AI chip exports

The Biden Administration's proposal focuses on modernizing chip licensing to enhance U.S. AI leadership and safeguard economic interests.

GoDaddy gets a stern finger-wagging for non-existent infosec

GoDaddy has been criticized for inadequate security measures, leading to multiple data breaches and misleading customers about their data protection standards.

Coram puts AI agents in existing security cameras. Check out the pitch deck the startup used to raise $13.8 million.

AI agents are expected to become a significant focus for investment by 2025, particularly in sectors like security.

Private security biz exposed 120K+ files, claims infoseccer

A London security company exposed over 120k sensitive files online via an unsecured server, highlighting serious data security concerns.
[ Load more ]