Cybersecurity - Tagged - Security Boulevard The Home of the Security Bloggers Network Mon, 24 Jul 2023 19:06:16 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Cybersecurity - Tagged - Security Boulevard 32 32 133346385 Google Launches Red Team to Secure AI Systems Against Attacks https://securityboulevard.com/2023/07/google-launches-red-team-to-secure-ai-systems-against-attacks/ Mon, 24 Jul 2023 19:06:16 +0000 https://securityboulevard.com/?p=1982549 red team SEC data security privacy How to Bring DevOps and Security Teams Closer Together

Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by cybercriminals.

The post Google Launches Red Team to Secure AI Systems Against Attacks appeared first on Security Boulevard.

]]>
1982549
Insider Indicted for Attempting to Sabotage California Water Plant https://securityboulevard.com/2023/07/insider-indicted-for-attempting-to-sabotage-california-water-plant/ Mon, 24 Jul 2023 12:00:18 +0000 https://securityboulevard.com/?p=1981638 TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

Earlier this month, Rambler Gallo pled not guilty to charges that he attempted to sabotage the water treatment facility in Discovery Bay, California. The facility provides treatment for the water and wastewater systems for the town’s 15,000 residents. An unsealed federal court indictment showed Gallo logged into the Supervisory Control and Data Acquisition (SCADA) network..

The post Insider Indicted for Attempting to Sabotage California Water Plant appeared first on Security Boulevard.

]]>
1981638
Understanding the Importance of a HIPAA Audit Log in Compliance https://securityboulevard.com/2023/07/understanding-the-importance-of-a-hipaa-audit-log-in-compliance/ https://securityboulevard.com/2023/07/understanding-the-importance-of-a-hipaa-audit-log-in-compliance/#respond Mon, 24 Jul 2023 11:59:53 +0000 https://scytale.ai/?p=20709 A HIPAA audit log, also known as an audit trail, is a chronological record of access to electronic protected health information (ePHI).

The post Understanding the Importance of a HIPAA Audit Log in Compliance appeared first on Scytale.

The post Understanding the Importance of a HIPAA Audit Log in Compliance appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/understanding-the-importance-of-a-hipaa-audit-log-in-compliance/feed/ 0 1982582
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program https://securityboulevard.com/2023/07/microsoft-lost-its-keys-voice-cloning-scams-the-biden-harris-cybersecurity-labeling-program/ https://securityboulevard.com/2023/07/microsoft-lost-its-keys-voice-cloning-scams-the-biden-harris-cybersecurity-labeling-program/#respond Mon, 24 Jul 2023 04:00:34 +0000 https://sharedsecurity.net/?p=101499 In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key to forge authentication tokens. A TikTok influencer used a voice cloning app to expose a cheating boyfriend. But wait, there’s more to this […]

The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Shared Security Podcast.

The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/microsoft-lost-its-keys-voice-cloning-scams-the-biden-harris-cybersecurity-labeling-program/feed/ 0 1982480
Crossing the road https://securityboulevard.com/2023/07/crossing-the-road/ https://securityboulevard.com/2023/07/crossing-the-road/#respond Sun, 23 Jul 2023 00:00:26 +0000 https://medium.com/p/ba89058667a4

Last week I spoke for Jersey Cyber Security Centre ( CERT.JE) about the changing threats facing us — from the very active offensive cyber campaign forming part of the war in Ukraine, to the emerging threat from AI tools that can be used for harm as well as for good.

But the important part of my comments was to show that whilst these cyber threats are real, there are sensible steps we can take to respond — we do not have to bury our heads in the sand and hope for the best.

I made the analogy of crossing a road safely. We do basic things like looking left and right consistently and well. We don’t make pedestrians wear crash helmets, reduce speed limits to 5mph, or ban people from leaving the house.

However, we also do the basics every time, not most of the time. Look left and right only 99% of the time and you will eventually be hit by a car. Not maybe — definitely.

So when we talk about basic controls — two factor authentication, rapid patching, only running supported systems, basic assurance like The IASME Consortium and the UK Government’s Cyber Essentials Plus Scheme — these are not optional, nice to have or aspirational. We can’t opt one system out because it’s difficult, inconvenient, or the CEO’s pet project. This is basic hygiene that that we can’t afford to get wrong.

If you’re a business and you are running systems without 2FA, operating unsupported hardware or software, more than 14 days behind in your security patching, or sending confidential information such as bills or passwords to your customers by email: my simple message is just stop now. If you can’t fix it, turn it off today. And if you can’t turn it off? You know you need to fix it today.

That malicious hacker, organised crime group or aggressive nation state doesn’t care about you, and they will simply run you over. So look left and right. Do the basics. Every time.

Because we’re watching.

And so are they.

Originally published at https://mattpalmer.net on July 23, 2023.

The post Crossing the road appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/crossing-the-road/feed/ 0 1982468
GitHub Developers Targeted by North Korea’s Lazarus Group https://securityboulevard.com/2023/07/github-developers-targeted-by-north-koreas-lazarus-group/ Fri, 21 Jul 2023 19:51:33 +0000 https://securityboulevard.com/?p=1982351 GitHub satellite cyberattack Strontium cyberwarfare counter-drone The Legality of Waging War in Cyberspace

The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub.

The post GitHub Developers Targeted by North Korea’s Lazarus Group appeared first on Security Boulevard.

]]>
1982351
Software Supply Chain Attackers Targeting Banks, Checkmarx Says https://securityboulevard.com/2023/07/software-supply-chain-attackers-targeting-banks-checkmarx-says/ Fri, 21 Jul 2023 15:46:14 +0000 https://securityboulevard.com/?p=1982335 supply chain SMB Cowbell Cyber cyberattack colonial ransomware insurance attacks access

Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry.

The post Software Supply Chain Attackers Targeting Banks, Checkmarx Says appeared first on Security Boulevard.

]]>
1982335
Setting Up DKIM on On-Prem Exchange Servers https://securityboulevard.com/2023/07/setting-up-dkim-on-on-prem-exchange-servers/ https://securityboulevard.com/2023/07/setting-up-dkim-on-on-prem-exchange-servers/#respond Fri, 21 Jul 2023 10:32:23 +0000 https://powerdmarc.com/?p=49406 This is a comprehensive guide on how to deploy DKIM on On-prem exchange servers by installing the free Exchange DKIM Signer.

The post Setting Up DKIM on On-Prem Exchange Servers appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/setting-up-dkim-on-on-prem-exchange-servers/feed/ 0 1982318
What is a Customer Experience Reference Architecture?   https://securityboulevard.com/2023/07/what-is-a-customer-experience-reference-architecture/ https://securityboulevard.com/2023/07/what-is-a-customer-experience-reference-architecture/#respond Fri, 21 Jul 2023 09:50:03 +0000 https://truefort.com/?p=3344 Creating and deploying a customer experience reference architecture is tricky, but microsegmentation can drastically increase the chances of success  Customer experience reference architecture is the structured framework or model that provides guidance to organizations on best practices for designing and delivering a consistent and excellent customer experience across all touchpoints and interactions with their company...

The post What is a Customer Experience Reference Architecture?   appeared first on TrueFort.

The post What is a Customer Experience Reference Architecture?   appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/what-is-a-customer-experience-reference-architecture/feed/ 0 1982428
AI Alone Is Not the Answer to Cybersecurity; Humans Are Needed https://securityboulevard.com/2023/07/ai-alone-is-not-the-answer-to-cybersecurity-humans-are-needed/ https://securityboulevard.com/2023/07/ai-alone-is-not-the-answer-to-cybersecurity-humans-are-needed/#respond Thu, 20 Jul 2023 18:46:22 +0000 https://www.pondurance.com/?p=10136 The substantial rise in cybercrime in the past few years has generated a tremendous market for artificial intelligence (AI)-driven cybersecurity products. The global AI market totaled $428 billion in 2022 and is expected to surge to more than $2 trillion by 2030, according to Fortune Business Insights. The introduction of ChatGPT, the OpenAI tool that...

The post AI Alone Is Not the Answer to Cybersecurity; Humans Are Needed appeared first on Pondurance.

The post AI Alone Is Not the Answer to Cybersecurity; Humans Are Needed appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2023/07/ai-alone-is-not-the-answer-to-cybersecurity-humans-are-needed/feed/ 0 1982196