ACC S. Florida Conference – Recap

On September 29, 2023, TCDI sponsored the Association of Corporate Counsel (ACC) South Florida’s 13th Annual CLE Conference titled, “Game On! Leveling Up In-House.” The day was structured around three tracks of programming, providing seminars that catered to the interests of all attendees. Among those sessions was TCDI’s panel discussion that focused on the importance […]

The post ACC S. Florida Conference – Recap appeared first on TCDI.

October 13, 2023
Read More >>

Improving Crime Solving with Wireless Home Security Systems

In Orange County, New Jersey, the implementation of wireless home security systems, complete with smart surveillance cameras across the city, resulted in a remarkable 50% reduction in various crime categories. Law enforcement officers involved in this research underscored the invaluable access to surveillance footage, greatly facilitating their investigative efforts and leading to successful apprehensions and […]

The post Improving Crime Solving with Wireless Home Security Systems appeared first on Johns Brothers Security.

October 13, 2023
Read More >>

Fire Prevention Month: Fire Safety for Small Businesses

October is National Fire Prevention Month and while much time is devoted to raising awareness on preventing home fires, residences aren’t the only places affected. As a small business owner, you are responsible for making sure your staff and customers have a safe place to conduct business. While a fire is unlikely, things like faulty […]

October 12, 2023
Read More >>

Uncloaking Fake Search Ads

Search engine ads are not always as they seem. Cybercriminals can take advantage of the ability to precisely target potential victims, tricking them into clicking malicious links prominently displayed before the intended legitimate destination.

This blog post takes a detailed look at the increasingly sophisticated usage of the technique known as cloaking, which is used to surreptitiously direct users to malicious URLs from search adverts displaying legitimate URLs of real companies.

How does cloaking work?

For legitimate adverts displayed in search engine results pages, when the link is clicked, it directs the user to the displayed website. These adverts are ostensibly verified by ad publishers such as Google or Bing. Bing’s platform is also used by Yahoo and AOL.

The most naive use of fake search adverts displays the fake destination to the victim. If clicked, this would direct the user to the website as displayed, albeit a malicious copy of the intended destination. This makes it easy for ad publishers to automatically discover and block adverts pointing to malicious URLs using threat intelligence feeds.

Fake ads created using cloaking are different in several ways:

  • When clicked, the user is sometimes taken to a different URL to the URL shown in the search results.
  • The ad publisher will not necessarily know that the URL to which the fake ad directs the user is malicious, as the cloaker ensures that the publisher is directed to the displayed URL when checking the ad. The displayed URL does not contain malicious content.
  • Clicking on the same advert can direct different users to different final URLs.

It is easier for users to fall victim to this type of fake ad:

  • The fake ad will display a legitimate URL on the search engine results, alongside the legitimate page title, description and even Google reviews.

October 12, 2023
Read More >>

Picking the “Perfect” Time for Your Penetration Test

Timing is everything, and if you’re anything like me, you live by your task list. Every task must have a deadline or face the possibility of falling through the cracks. When it comes to cybersecurity and compliance, however, that simply isn’t an option. As you’re developing your annual cybersecurity strategy and goals, it is important […]

The post Picking the “Perfect” Time for Your Penetration Test appeared first on TCDI.

October 11, 2023
Read More >>

[Weekly Security News] Cyber Attacks: A Part of the WAR

[Weekly Security News] Cyber Attacks: A Part of the WAR [October 11, 2023] 1. Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks Several hacker groups have joined in on the Israel-Hamas conflict escalation  that started over the weekend after the Palestinian militant group launched a major attack. Source : SECURITY WEEK 2. Cyberattacks Targeting […]

The post [Weekly Security News] Cyber Attacks: A Part of the WAR first appeared on Cloudbric.

October 11, 2023
Read More >>

How Security Can Better Support Software Engineering Teams

As the CISO at a tech company (Axonius), my responsibilities include empowering our software engineering teams to maintain a strong security posture of our products. While everyone agrees that security is important, the different incentives of security and engineering teams can make it harder to collaborate. Here’s some advice on weaving security into the software…

Read more

October 5, 2023
Read More >>

Navigating the Future of Cybersecurity with NIST’s Enhanced Framework

In the ever-changing world of cybersecurity, where the only constant is change itself, staying one step ahead has never been more important. The responsibility of safeguarding an organization’s digital assets against evolving threats falls squarely on the shoulders of business leaders and IT professionals. Our goal is simple. We aim to provide you with the […]

The post Navigating the Future of Cybersecurity with NIST’s Enhanced Framework appeared first on TCDI.

October 4, 2023
Read More >>