October 14, 2021

Aqua Security adds a new detection and response capability (CNDR) to its Cloud Native Application Protection Platform (CNAPP), using real-time behavioral indicators to identify zero-day attacks from low-level eBPF events surfaced by Aqua’s open source …

Read More Aqua Security launches CNDR capabilities to detect patterns and respond with granular runtime controls

Keysight Technologies has delivered a new Internet of Things (IoT) Security Assessment software solution that enables IoT chip and device manufacturers, as well as organizations deploying IoT devices, to perform comprehensive, automated cybersecurity a…

Read More Keysight’s IoT Security Assessment software offers automated cybersecurity validation of IoT devices

WhatsApp made available end-to-end encrypted chat backups on iOS and Android to prevent anyone from accessing user chats. WhatsApp is rolling out end-to-end encrypted chat backups on both iOS and Android devices, the move aims at implementing an optional layer of security to protect backups stored on Google Drive or iCloud cloud storage. Currently, WhatsApp […]

The post WhatsApp made available end-to-end encrypted chat backups appeared first on Security Affairs.

Read More WhatsApp made available end-to-end encrypted chat backups

SentinelOne announced that the company has achieved Amazon Web Services (AWS) Security Competency status. The designation recognizes SentinelOne’s deep technical expertise and proven customer success protecting user endpoints and securing cloud adoptio…

Read More SentinelOne achieves AWS Security Competency status to help customers in defending cloud workloads

The popular Google’s VirusTotal scanning service has published an interesting analysis of more than 80 Million ransomware samples. VirusTotal has published its first ransomware activity report based on the analysis of more than 80 million samples that have been uploaded from 140 countries worldwide. Since 2020, at least 130 different ransomware families have been active. […]

The post Since 2020, at least 130 different ransomware families have been active appeared first on Security Affairs.

Read More Since 2020, at least 130 different ransomware families have been active

Google revealed to have sent roughly 50,000 alerts of state-sponsored phishing or hacking attempts to customers since January. Google announced to have sent roughly 50,000 alerts of state-sponsored phishing or hacking attempts to customers during 2021. The data were provided by Google’s Threat Analysis Group (TAG), which tracks government-backed hacking campaign, which warns of a […]

The post Google sent over 50,000 warnings of state-sponsored attacks, +33% from same period in 2020 appeared first on Security Affairs.

Read More Google sent over 50,000 warnings of state-sponsored attacks, +33% from same period in 2020

Apple’s next event occurs on Monday, and rumors suggest that the company will announce updated 14- and 16-inch MacBook Pros. Consumer-level Macs have already received an Apple Silicon update, and it’s expected that the Pro models will receive their …

Read More Podcast: Apple’s ‘Unleashed’ event preview: 14- and 16-in. MacBook Pros with Apple Silicon

On Wednesday, the St. Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social Security numbers of 100,000 elementary and secondary teachers. In a press conference this morning, Missouri Gov. Mike Parson (R) said fixing the flaw could cost the state $50 million, and vowed his administration would seek to prosecute and investigate the “hackers” and anyone who aided the publication in its “attempt to embarrass the state and sell headlines for their news outlet.”

Read More Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability

Forty-three per cent of cyber attacks are against small and medium-sized businesses (SMB), according to recent Verizon data. However, only 14 per cent of them say they’re prepared for it. Smaller organizations may believe they won’t be targets because they think their data isn’t “important,” said Stephen Nichols, Solution Engineer with Acronis at a recent […]

The post Is it time for small businesses to rethink their cyber security strategies? first appeared on IT World Canada.

Read More Is it time for small businesses to rethink their cyber security strategies?

Forty-three per cent of cyber attacks are against small and medium-sized businesses (SMB), according to recent Verizon data. However, only 14 per cent of them say they’re prepared for it. Smaller organizations may believe they won’t be targets because they think their data isn’t “important,” said Stephen Nichols, Solution Engineer with Acronis at a recent […]

The post Is it time for small businesses to rethink their cyber security strategies? first appeared on IT World Canada.

Read More Is it time for small businesses to rethink their cyber security strategies?

Microsoft Teams has seen a surge in growth during the pandemic with over 115 million daily active users and growing. With it, customer imperative for enabling safe and trustworthy online collaboration has also increased significantly.

The post archTIS and Microsoft: Zero Trust information security for Microsoft Teams appeared first on Microsoft Security Blog.

Read More archTIS and Microsoft: Zero Trust information security for Microsoft Teams

The Hillel Yaffe Medical Center in Hadera, Israel, was hit by a ransomware attack that was defined by Israel’s National Cyber Directorate as a “major” attack. The Hillel Yaffe Medical Center in Hadera, Israel was hit by a ransomware attack that impacted the system of the hospital. Local media outlets reported that the hospital has […]

The post For the first time, an Israeli hospital was hit by a major ransomware attack appeared first on Security Affairs.

Read More For the first time, an Israeli hospital was hit by a major ransomware attack

The Hillel Yaffe Medical Center in Hadera, Israel, was hit by a ransomware attack that was defined by Israel’s National Cyber Directorate as a “major” attack. The Hillel Yaffe Medical Center in Hadera, Israel was hit by a ransomware attack that impacted the system of the hospital. Local media outlets reported that the hospital has […]

The post For the first time, an Israeli hospital was hit by a major ransomware attack appeared first on Security Affairs.

Read More For the first time, an Israeli hospital was hit by a major ransomware attack

New paper: “This Person (Probably) Exists. Identity Membership Attacks Against GAN Generated Faces.

Abstract: Recently, generative adversarial networks (GANs) have achieved stunning realism, fooling even human observers. Indeed, the popular tongue-in-cheek website http://thispersondoesnotexist.com, taunts users with GAN generated images that seem too real to believe. On the other hand, GANs do leak information about their training data, as evidenced by membership attacks recently demonstrated in the literature. In this work, we challenge the assumption that GAN faces really are novel creations, by constructing a successful membership attack of a new kind. Unlike previous works, our attack can accurately discern samples sharing the same identity as training samples without being the same samples. We demonstrate the interest of our attack across several popular face datasets and GAN training procedures. Notably, we show that even in the presence of significant dataset diversity, an over represented person can pose a privacy concern…

Read More Recovering Real Faces from Face-Generation ML System

New paper: “This Person (Probably) Exists. Identity Membership Attacks Against GAN Generated Faces.

Abstract: Recently, generative adversarial networks (GANs) have achieved stunning realism, fooling even human observers. Indeed, the popular tongue-in-cheek website http://thispersondoesnotexist.com, taunts users with GAN generated images that seem too real to believe. On the other hand, GANs do leak information about their training data, as evidenced by membership attacks recently demonstrated in the literature. In this work, we challenge the assumption that GAN faces really are novel creations, by constructing a successful membership attack of a new kind. Unlike previous works, our attack can accurately discern samples sharing the same identity as training samples without being the same samples. We demonstrate the interest of our attack across several popular face datasets and GAN training procedures. Notably, we show that even in the presence of significant dataset diversity, an over represented person can pose a privacy concern…

Read More Recovering Real Faces from Face-Generation ML System

Data plays a vital role in the effectiveness and success of a digital marketing campaign. Marketers use data to gain insights into consumer behavior and market trends to identify distinctive customer needs and create targeted marketing campaigns. The availability and ease of access to data can, however, be a blessing and a mishap.  While data […]

The post 6 Ways To Protect Consumer Data During Marketing Campaigns appeared first on CyberDB.

Read More 6 Ways To Protect Consumer Data During Marketing Campaigns

Grant Thornton and Xero have teamed up to help women entrepreneurs in Canada solve business pain points with a complimentary custom cloud accounting solution.

The post Grant Thornton and Xero partner to provide free custom cloud accounting solution to Canadian women-owned SMBs first appeared on IT World Canada.

Read More Grant Thornton and Xero partner to provide free custom cloud accounting solution to Canadian women-owned SMBs

Taiwanese electronics technology giant Acer discloses a security breach suffered by its after-sales service systems in India after an isolated attack. Bad news for the Taiwanese electronics technology giant Acer, it disclosed a second security breach this year. The company revealed that its after-sales service systems in India were hit by an isolated attack. The […]

The post Acer suffered the second security breach in a few months appeared first on Security Affairs.

Read More Acer suffered the second security breach in a few months

Heimdal™ Security’s Security team has recently unearthed a new typosquatting domain specifically crafted to resemble Trader Joe XYZ’s URL, one of the most sought-after cryptocurrency trading platforms. Tricked by a typo in the spelling of the crypto-sw…

Read More Heimdal™ Security SOC Team Discovers Typosquatting Domain Masquerading as Crypto-Swapping Platform

Researchers spotted a new strain of ransomware, dubbed Yanluowang, that was used in highly targeted attacks against enterprises. Researchers from Symantec Threat Hunter Team discovered a ransomware family, tracked as Yanluowang ransomware that was used in highly targeted attacks against large enterprises. The discovery is part of an investigation into a recent attempted ransomware attack […]

The post New Yanluowang ransomware used in highly targeted attacks on large orgs appeared first on Security Affairs.

Read More New Yanluowang ransomware used in highly targeted attacks on large orgs

Today’s Hashtag Trending script was prepared by Samira Balsara. Amazon is alleged to copy products and manipulate search results, Nvidia’s plan to buy Arm hits a snag, and Google is planning an app design change for iOS. It’s all the tech news that’s trending right now, welcome to Hashtag Trending! It’s Thursday, October 14, and […]

The post Hashtag Trending Oct. 14- Amazon copies products; NVIDIA and Arm deal; Google app design change first appeared on IT World Canada.

Read More Hashtag Trending Oct. 14- Amazon copies products; NVIDIA and Arm deal; Google app design change