DDoS as a risk for e-commerce. Meta GDPR well. The TikTok challenge spreads malware. US CYBERCOM to Ukraine.

People and organizations act separately to protect themselves in this cyber war, while hackers have banded together to get stronger. At CrowdSec, we’ve developed a solution to overcome the number of hackers through a collaborative cybersecurity effort. Our open-source participatory security stack analyzes visitor habit and handles malicious traffic. Whenever a malicious IP address is blocked, network users are notified. We harness the strength of the crowd to make the web safer. Why not give it a try, it’s free!

As consumers seek to protect themselves from scams when shopping for groceries online this holiday season, stores face an additional risk: distributed denial of service (DDoS) attacks designed to make their sites unavailable to customers. Bloomberg Law reports that the motives for such attacks on e-diversity of trading sites (it can be anything from extortion to economic disruption, from hacktivist protest to the undeniable lulz), and risk actors can range from Americans to geographic region services. At peak hours instead of days, they can still come at a high cost to affected traders. And, unfortunately, victims rarely have realistic legal therapy against DDoS attacks: perpetrators are regularly out of reach.

Migrating to a cloud provider, such as AWS, provides many benefits to your customers, but the configuration will need to be done correctly to avoid imaginable security breaches.

Learn about the 7 most sensitive AWS security configuration errors you want to be aware of for potential security breaches in your infrastructure and stay informed about solutions, including:

The Irish Data Protection Commission has fined Facebook’s parent company, Meta, €265 million for a breach that affected the non-public data of “hundreds of millions” (up to 525 million) of people. Facebook users, reports the BBC. The case is rare that most of the knowledge received and then dumped on an online forum was recovered and not hacked. The Data Protection Commission found that Meta violated article 25 of the General Data Protection Regulation (GDPR). The Commission noted in its resolution that this was not Facebook’s first encounter with unwanted and illegal knowledge scraping. The BBC quotes a Facebook spokesperson: “We made adjustments to our systems in the era in question, including removing the ability to remove our features in this way using phone numbers. Unauthorized data scraping is unacceptable and we oppose to our policies and we will continue to work with our peers on this industry challenge. We are seriously considering this resolution. ” More on this story will appear later in CyberWire’s Professional Privacy Report.

Machine information (ML) has been used in cybersecurity for decades. Unfortunately, ML can be just as useful to attackers as it is to defenders. Explore the application possibilities of ML in bot detection and cybersecurity with this DataDome SOC consultant and risk studies experts. . Review non-unusual demanding ML style education situations and gain step-by-step insights on how to create and monitor ML styles with two examples of real-life ML case studies implemented for bot detection.

Attackers take advantage of a popular TikTok challenge to distribute malware, according to Checkmarx researchers. One TikTok challenge that’s hot is posing nude in a clearing called “Invisible Body,” which (they say) replaces the user’s frame with a blurry outline. The attackers took merit of this by claiming that it is offering another cleanse that can simply remove the cleansing of the Invisible Body and divulge the user’s naked frame. This cleaning is fake and will install the WASP theft malware. (If you fall into the trap, we’ve probably stumbled upon X-Ray Specs classified ads in older comics. )The researchers noted that more than 30,000 users have joined the attackers’ Discord server so far. For more information about this cyber version of X-Ray Specs, see CyberWire Pro.

When your business accelerates faster than your cybersecurity capabilities, it can be tricky to respond to core vulnerabilities. In the State of Risks and Corrective Action 2022 report, Censys’ research team analyzed recent celebrity vulnerabilities and looked at how organizations responded to each. What have we learned and how can you apply this wisdom to your own organization?

U. S. Cyber Command The U. S. Department of Health and Security released a brief outline that provides more information about when U. S. aid began. The U. S. military for Ukraine’s cyber defense and what that help was. Cyber Command; This initial deployment continued until March of this year. Despite the aggressive-sounding name, “forward fighter” operations are, according to U. S. Cyber Command, aggressive in the U. S. Cyber Command. USA, defensive in nature. Hunting is carried out in prohibited nets. and operations are reported through intelligence. “

Although the workforce of the U. S. National Cyber Mission Force. If the U. S. is no longer physically deployed in Ukraine, cyber defense continues directly to Ukraine. European theatre. This included sharing cyber risks and information, such as signals of compromise and malware. For example, in July 2022, the CNMF publicly revealed new signals to spouses of the cybersecurity industry in close cooperation with the Security Service of Ukraine.

CyberWire’s course of the current crisis in Ukraine can be found out here.

Someone once said, “If it’s not broken, don’t fix it. “That has not been reflected in cybersecurity. And that doesn’t work at Raytheon, Intelligence

Today’s factor includes events from Australia, Belgium, China, the European Union, Germany, Israel, NATO/NATO, Poland, Russia, Spain, Taiwan, Ukraine, the United Kingdom and the United States.

Ukraine on day 278: Bakhmut remains the Russian target to save face. (CyberWire) Bakhmut becomes Russia’s prestige target as the indiscriminate bombing of cities anywhere Russian systems are within range continues. U. S. Cyber Command

Russian-Ukrainian War: List of Key Events, Day 279 (Al Jazeera) As the Russo-Ukrainian War enters its 279th day, we take a look at major events.

Fighting intensifies in eastern Ukraine as Zelensky warns of new Russian missile attacks (Wall Street Journal) Russia is pushing towards the town of Bakhmut and wins symbolic victory, and rejects claims it will abandon the Zaporizhzhia nuclear power plant.

Russia rejects hypothesis it was taking off from Ukraine’s nuclear power plant (The Hill) The Kremlin on Monday rejected reports that Russian forces were possibly taking off from Ukraine’s Zaporizhzhia nuclear power plant. Dmitry Peskov, press secretary of the Russian president. . .

Torture allegations multiply after Kherson’s profession (AP NEWS) When a dozen Russians stormed Dmytro Bilyi’s home in August, the 24-year-old police officer said he had been given a terrifying choice: hand over his gun or his mother and brother would. disappear.

The harsh reality of protracted wars (Foreign Affairs) The confrontation in Ukraine will end soon.

Russian exiles struggle to form a united opposition to Putin (foreign policy) Historically, Russian emigrants have been reluctant to form communities in exile and have tried to assimilate.

Why Putin Can Stand (Foreign Affairs) Powerful leaders have withstood surprising defeats.

NATO to renew pledge of Ukraine membership, encourage non-lethal aid (Military Times) Foreign ministers will meet in Bucharest, where the alliance was signed 14 years ago to allow Ukraine and Georgia to register despite Russia’s vehement objections.

U. S. says Russia postpones arms control talks (AP NEWS) Biden’s management said Monday that Russia postponed without explanation the scheduled resumption of arms control talks this week. The State Department said Russia had “unilaterally postponed” a Bilateral Advisory Commission meeting that was scheduled to begin Tuesday in Egypt and last until next week.

EXCLUSIVE: USA The U. S. and Russia have used the military’s hotline once so far Ukraine War (Reuters)The U. S. has called for considerations about Russian military operations near critical infrastructure in Ukraine.

Senators urge Pentagon to send complex Grey Eagle drones to Ukraine (Defense News) Senators are pressuring the Pentagon to modify MQ-1C Gray Eagle drones so the U. S. can move them to Ukraine.

Poland needs to divert promised German air defenses to Ukraine (Defense News) Berlin is unlikely to settle for the situations, as they would involve sending German forces to Ukraine.

Before the invasion: Forward Hunting Operations in Ukraine (U. S. Cyber Command)UU) The U. S. Joint Forces, in close cooperation with the Ukrainian government, conducted defensive cyber operations throughout the Ukrainian Cyber Command workforce from December 2021 to March 2022, as a component of a

According to a study by the British weekly, more Europeans will die from the energy crisis than those affected by the war in Ukraine (Modern Diplomacy). Last week, the newspaper The Economist in Ukraine had risen to almost [. . . ]

Biden, Macron in a position to communicate on Ukraine and state scale in industry (AP NEWS) French President Emmanuel Macron is heading to Washington for the first state stop in Joe Biden’s presidency, a resumption of diplomatic pomp that had been suspended due to the COVID-19 pandemic.

China Steps Up Cyberattacks on Taiwan: Report (Taipei Times) Bringing Taiwan to the World and the World to Taiwan

Cyber-Threat Group Targets RCE Vulnerability in “Bleed You” Crusade More than 1,000 systems are exposed to a crusade to hunt weak Windows servers and more.

Black Basta Gang deploys Qakbot malware in a competitive cyber crusade (dark reading) The ransomware organization uses Qakbot to identify the initial access point before moving laterally within an organization’s network.

Infosec Researcher Reports Imaginable “Massive” Twitter Leak (SearchSecurity) Security researcher Chad Loder reported last week on a “massive” Twitter leak involving millions of phone numbers in the U. S. USA and Europe.

Meta fined for knowledge breach in 2021 as millions of Twitter users were also leaked (Forbes) A major knowledge breach would likely have affected some 5. 4 million Twitter user accounts containing private data in Europe and the US. U. S.

TikTok’s ‘Invisible Body’ Challenge Exploited to Spread Malware (BleepingComputer) Hackers are taking advantage of a trending TikTok challenge called the ‘Invisible Challenge’ to install malware on thousands of devices and steal their passwords, Discord accounts, and potentially cryptocurrency wallets.

Hackers spread malware TikTok Trending Challenge: Report (The Record to Recorded Future) Hackers use TikTok’s popular “Invisible” challenge to trick other people into downloading malware that steals information.

Three new vulnerabilities allow code manipulation, denial of service (and worse) for commercial controllers (SC Media) The insects allow logical manipulation and denial of service, basically affecting the products of two important German suppliers: the Festo automated drivers and the CODESYS runtime.

A flaw in some Acer laptops can be used to bypass security features (Security Affairs) ESET has announced the discovery of a vulnerability affecting Acer laptops that may allow an attacker to disable UEFI Secure Boot. ESET researchers announced in a series of tweets the discovery of a vulnerability affecting Acer laptops, which could allow an attacker to disable UEFI Secure Boot. Experts explained that the failure continued as [. . . ]

One school told parents that the hackers were only divulging “limited” information. about the death of a student.

Alarming Dangers for Law Firms Cyber Security (Sal | Cybercrime has increased dramatically in recent years, damaging key businesses and facilities in unfathomable amounts. Cyber security breaches cost billions of pounds and are responsible for 50% of all crimes in the UK. Attacks carried out by cybercriminals for non-public gain are increasingly complex, with threats coming from domestic and foreign resources [. . . ]

Belgian police fire after primary ransomware leak (Infosecurity Magazine) 15-year-old crime reports made public

Stop before you buy: Do grocery shopping apps match your device?(Incogni Blog) In a recent customer survey, 88% of respondents said they had at least one grocery shopping app installed on their mobile device.

Vulnerability Summary for the Week of November 21, 2022 (CISA) The CISA vulnerability bulletin provides a summary of new vulnerabilities that have been registered through the National Institute of Standards and Technology (NIST) national vulnerability database (NVD) over the past week. NVD is sponsored through CISA. In some cases, bulletin vulnerabilities may not yet have CVSS scores. Stop at NVD for updated vulnerability entries, which come with CVSS scores once they’re available.

Chrome fixes the eighth day 0 of 2022: its edition now (Naked Security) There is no rhyme to remind you what months have 0 days of the browser . . . Just keep your eyes and ears open!

SIEM 2022 Status Report | Panther Labs (Panther Labs) Panther relieves the pain of classic SIEM with on-the-fly code detection, a physically powerful security knowledge lake, and flexible scalability. Visit our for a demo or price.

NSA Cyber Director on Threats and Opportunities The nation’s most sensible cyber warriors are devoting “substantial resources” to fighting ransomware, but attack activity “has returned as much or more than the old norm,” Rob Joyce said.

What’s Next in Cybersecurity (MIT Technology Review) “When it comes to removing ransomware from the source, I think we’ve taken a step back. “

Don’t be fooled by year-end articles on cybersecurity trends. Most of them don’t do the right thing (Geektime) Why Threat Intelligence Should Drive Cybersecurity Setup in 2023?

Cloud is a developing target for cyberattacks, according to a new Sophos survey (GlobeNewswire News Room) Among infrastructure-as-a-service (IaaS) users, 56% experienced an increase in attack volume and 67% were affected by ransomware.

The truth of SMB cloud security in 2022 (Sophos News) 4986 small and medium-sized business (SMB) IT professionals share their real-world experiences

Cyber insurers draw attention to catastrophic cyberattacks (Wall Street Journal) Although cyber insurance has evolved particularly in recent years, insurers say they may not yet be prepared for the consequences of a catastrophic cyberattack.

Is it worth taking out private cyber insurance if you get caught up in a data breach?(The Guardian) Experts say investing in identity theft coverage can provide peace of mind, but it wouldn’t help you lose data

RegScale Acquires GovReady to Provide NIST OSCAL-ENABLED CRM Platform (PR Newswire) RegScale, a next-generation governance, threat control and compliance (GRC) software company, announced that it has acquired GovReady, a new generation of GovReady. . .

Recorded Future Surpasses ARR $250 Million (Benzinga) Company Reaches Major Milestone as Intelligence Proves Key to Defending Against Converging Threats BOSTON, Nov. 28, 2022 /PRNewswire/ — Recorded Future, the intelligence firm, announced that it has surpassed

Cybersecurity consolidation continues, even as valuations stagnate (Dark Reading) Financing and acquisitions tend to smaller deals, which means fewer purchases and high-valuation financings, but probably also fewer layoffs after the merger.

The layoffs wiped out Twitter’s child protective equipment (WIRED) Only one user remains in the company’s ban on child sexual abuse in Japan and the Asia-Pacific region.

Aqua Security Named Best Innovation Leader in Frost’s Global Cloud-Native Application Protection Platform Report

Avint Selects Brian Edwards, CEO of BD and Capture, as First Chief Growth Officer (PR Newswire) Avint LLC, a fast-growing federal cybersecurity and control consulting firm, announced the hiring of Brian Edwards as a director of the company’s company.

For a complete list of existing events, see Event Tracking.

Vision 23: Cyber Threat Outlook 2023 (virtual, December thirteen – November 23, 2022) Registration for Vision 2023 is now open!Join us for a half-day virtual convention to stay informed about the latest attack trends and New Year’s predictions from some of the biggest names in cybersecurity. Vision 2023 is committed to helping security leaders stay informed about the ever-evolving threats facing modern organizations, either and in the future.

Certified CMMC Professional (CCP) 2. 0 Exam Preparation (virtual, November 28 – December 2, 2022) This 5-day CCP course covers the required core curriculum such as CMMC Level 2 scope and the 110 completed practices. CCP 2. 0 courses approved through Edwards Cyber AB allows participants to take the CCP exam, making it a valuable resource for a consulting firm offering CMMC preparation, C3PAO offering qualified evaluator support, or an organization that wants to have internal resources trained in CMMC. Edwards’ Provisional Instructor (PI) line includes many of CMMC’s most reputable industry experts, such as Edwards’ internal SMBs, to deliver their action-packed bootcamps. Learn more and sign in now.

Healthcare Cybersecurity Forum (Boston, Massachusetts, USA, December 5-6, 2022) The HIMSS 2022 Healthcare Cybersecurity Forum will explore how the industry protects itself today and how it wants to evolve for the future. As healthcare cybersecurity professionals adapt to new threats, you also want to remain focused on protecting patients, protecting against attackers, and creating business value. At this year’s forum, gain actionable insights from leading organizations on how to proactively protect the developing virtual footprint of healthcare and secure knowledge inside and outside the doors of your business. walls

Open Source Security Summit (virtual, December 8, 2022) Explore advances in open source security and how employing open source equipment can build acceptance among consumers and consumers. , business leaders and industry visionaries to chart the way forward and highlight the long-term open source security responses at this loose virtual event.

Ignite ’22 (Las Vegas, Nevada, USA, December 12-15, 2022) Protecting our long-term virtual from cyber threats has never been more critical. Collectively, we have a great opportunity to get it right. At Palo Alto Networks, our project is to make sure that each day is safer than the last. But we can’t do it alone. We are committed to partnering with global cybersecurity leaders, professionals and strategists to build the right long-term security architectures. At Ignite ’22, we will share our innovations, ideas, methods and training. We invite you to register so that, together, we can build the long term.

CMMC Professional (CCP) 2. 0 Certified Exam Preparation (virtual, January 9-13, 2023) This 5-day CCP course covers the required core curriculum such as the scope of CMMC Level 2 and the 110 completed practices. CCP 2. 0 courses approved through Edwards Cyber AB allows participants to take the CCP exam, making it a valuable resource for a consulting firm offering CMMC preparation, C3PAO offering support from qualified evaluators, or an organization that wants to have internal resources trained in CMMC. Edwards’ Interim Instructor (PI) line includes many of CMMC’s most renowned industry experts, such as Edwards in-house SMBs, to deliver their action-packed bootcamps. Learn more and sign in now.

Leave a Comment

Your email address will not be published. Required fields are marked *