Tag Archive for: Resilient

Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits


Twitter suffers a data breach of phone numbers and email addresses belonging to 5.4 million accounts, new research shows that attackers are finding and exploiting zero-day vulnerabilities in 15 minutes, and details on how a resilient trait in videos and images could aid in deepfake detection.

** Links mentioned on the show **

DevOps Connect:DevSecOps @ RSAC 2022

Hacker selling Twitter account data of 5.4 million users for $30k
https://www.bleepingcomputer.com/news/security/hacker-selling-twitter-account-data-of-54-million-users-for-30k/

Race against time: Hackers start hunting for victims just 15 minutes after a bug is disclosed
https://www.zdnet.com/article/race-against-time-hackers-start-hunting-for-victims-just-15-minutes-after-a-bug-is-disclosed/

Researchers Identify a Resilient Trait of Deepfakes That Could Aid Long-Term Detection
https://www.unite.ai/researchers-identify-a-resilient-trait-of-deepfakes-that-could-aid-long-term-detection/

** Watch this episode on YouTube **

** Thank you to our sponsors! **

SLNT

Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity

** Subscribe and follow the show **

Join the Shared Security Community on Reddit: https://www.reddit.com/r/SharedSecurityShow/

Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast

Follow us on Twitter: https://twitter.com/sharedsec

Website: https://sharedsecurity.net

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Sign-up for our email newsletter to receive updates about the show, contest announcements, and special offers from our sponsors: http://eepurl.com/dwcc8D

Leave us a rating and review: https://ratethispodcast.com/sharedsecurity

Contact us: https://sharedsecurity.net/contact

The post Twitter Data…

Source…

GarbleCloud Launches “Ransomware Resilient” Technology to Enterprises


Pleasanton, California–(Newsfile Corp. – January 14, 2022) – Based in Silicon Valley, GarbleCloud has launched a ransomware resilient technology to allow enterprises and individuals to protect their documents and files stored in platforms such as Google Drive, Dropbox, and Google Workspace applications like Google Docs, and soon Gmail and GoogleMeet. It does so today by enabling user-controlled encryption of files, without compromising functionality of these underlying platforms and applications.

GarbleCloud Logo

Cannot view this image? Visit:
https://orders.newsfilecorp.com/files/8397/110254_gclogo.jpg

GarbleCloud at its core offers encryption services but also claims to take data encryption to a new level of functionality and ease of use by enabling useful operations on encrypted files while making those files completely opaque to the cloud service providers or SaaS applications. The platform uses a patented technology that businesses can access and leverage to be in complete control of important files and documents (unstructured data) even when stored in remote public clouds.

According to Founder and CEO Bijit Hore, “Large organizations are increasingly dealing with ransomware attacks and the potential exposure of sensitive data. In high-profile cases reported over the past year, attackers carry out reconnaissance after breaching the defenses of the company. They look to identify high-value accounts and compromise web application credentials-uncovering sensitive troves of data in online document processing platforms such as Google Workspace, Microsoft Office 365, etc. Our solution offers ransomware resiliency that protects against data exfiltration, doxing, and more. Even if your cloud ecosystem is breached, your enterprise’s data is always protected.”

The company’s core technology includes: AES-256 encryption that is user controlled and easy to use; a robust, industrial-grade encryption-key management framework; support for CRUD operations on encrypted files in popular SaaS platforms; the ability to do full-text search over encrypted documents; the ability to share and collaborate on encrypted documents between teams; and provides platform-agnostic, encryption-based file security…

Source…

Updated Trickbot Malware Is More Resilient


Cybercrime
,
Fraud Management & Cybercrime
,
Fraud Risk Management

Researchers Find 2 Fresh Versions Following Takedown Efforts

Updated Trickbot Malware Is More Resilient

The gang operating Trickbot is continuing its activities despite recent takedown efforts, rolling out two updates that make the malware more difficult to kill, according to the security firm Bitdefender.

See Also: 2020 Ponemon Cost of Insider Threats Global Report

The latest Trickbot versions – 2000016 and 100003 – were rolled out on Nov. 3 and Nov. 18, respectively, with changes that include using a new command-and-control infrastructure based on Mikrotik routers and only using packed modules. The malware was last updated in August, the researchers say.

Version 2000016 was active only about three weeks after Microsoft collaborated with other cybersecurity companies and government agencies to take down the million-device Trickbot botnet, Bitdefender says.


“Completely dismantling Trickbot has proven more than difficult, and similar operations in the past against popular Trojans has proven that the cybercriminal community will always push to bring back into operation something that’s profitable, versatile and popular,” the report states.


“Trickbot might have suffered a serious blow, but its operators seem to be scrambling to bring it back, potentially more resilient and difficult to extirpate than ever before.”

So far, the new versions have been used in attacks in the U.S., Malaysia, Romania,…

Source…

Can phones challenge the resilient plastic card? – SecurityNewsDesk

Can phones challenge the resilient plastic card?  SecurityNewsDesk

In a world where we never stop moving, it makes sense that mobile technology is everywhere. This includes almost all workplaces.

“mobile security news” – read more