Thu.Jun 15, 2023

article thumbnail

CISA Order Highlights Persistent Risk at Network Edge

Krebs on Security

The U.S. government agency in charge of improving the nation’s cybersecurity posture is ordering all federal agencies to take new measures to restrict access to Internet-exposed networking equipment. The directive comes amid a surge in attacks targeting previously unknown vulnerabilities in widely used security and networking appliances. Under a new order from the Cybersecurity and Infrastructure Security Agency (CISA), federal agencies will have 14 days to respond to any reports from CISA

Risk 210
article thumbnail

CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020

Tech Republic Security

FBI, CISA and international organizations released an advisory detailing breadth and depth of LockBit, and how to defend against the most prevalent ransomware of 2022 and (so far) 2023. The post CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020 appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Shady Chinese Encryption Chips Got Into the Navy, NATO, and NASA

WIRED Threat Level

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

article thumbnail

Android GravityRAT malware now steals your WhatsApp backups

Bleeping Computer

A new Android malware campaign spreading the latest version of GravityRAT has been underway since August 2022, infecting mobile devices with a trojanized chat app named 'BingeChat,' which attempts to steal data from victims' devices. [.

Backups 143
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

A Guide to Key Management as a Service madhav Thu, 06/15/2023 - 11:29 As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure data security is through encryption and proper key management. Key Management as a Service (KMaaS) allows companies to manage encryption keys more effectively through a cloud-based solution instead of running the service on physical, on-premises

article thumbnail

Rhysida ransomware leaks documents stolen from Chilean Army

Bleeping Computer

Threat actors behind a recently surfaced ransomware operation known as Rhysida have leaked online what they claim to be documents stolen from the network of the Chilean Army (Ejército de Chile). [.

More Trending

article thumbnail

Russian hackers use PowerShell USB malware to drop backdoors

Bleeping Computer

The Russian state-sponsored hacking group Gamaredon (aka Armageddon, or Shuckworm) continues to target critical organizations in Ukraine's military and security intelligence sectors, employing a refreshed toolset and new infection tactics. [.

article thumbnail

Understanding Malware-as-a-Service

SecureList

Money is the root of all evil, including cybercrime. Thus, it was inevitable that malware creators would one day begin not only to distribute malicious programs themselves, but also to sell them to less technically proficient attackers, thereby lowering the threshold for entering the cybercriminal community. The Malware-as-a-Service (MaaS) business model emerged as a result of this, allowing malware developers to share the spoils of affiliate attacks and lowering the bar even further.

Malware 128
article thumbnail

Clop ransomware gang starts extorting MOVEit data-theft victims

Bleeping Computer

The Clop ransomware gang has started extorting companies impacted by the MOVEit data theft attacks by listing them on a data leak site, a common extortion tactic used as a precursor for the public leaking of stolen data. [.

article thumbnail

ChatGPT Spreads Malicious Packages in AI Package Hallucination Attack

Security Boulevard

A newly discovered ChatGPT-based attack technique, dubbed AI package hallucination, lets attackers publish their own malicious packages in place of an unpublished package. In this way, attackers can execute supply chain attacks through the deployment of malicious libraries to known repositories. The technique plays off of the fact that generative AI platforms like ChatGPT use.

Software 126
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

MOVEit Transfer customers warned of new flaw as PoC info surfaces

Bleeping Computer

Progress warned MOVEit Transfer customers to restrict all HTTP access to their environments after info on a new SQL injection (SQLi) vulnerability was shared online today. [.

130
130
article thumbnail

News Alert: Dropblock mobile app gives developers, businesses secure data storage and sharing

The Last Watchdog

London, UK, June 15, 2023 – Dropblock for mobile launches today, a free, Web3 storage application offering individuals, developers, and business users a unique and completely secure mobile storage and data sharing solution. Simply download Dropblock today from the App Store or from the Google Play Store to get 5GB of secure blockchain storage for free.

Mobile 100
article thumbnail

Barracuda ESG zero-day attacks linked to suspected Chinese hackers

Bleeping Computer

A suspected pro-China hacker group tracked by Mandiant as UNC4841 has been linked to data-theft attacks on Barracuda ESG (Email Security Gateway) appliances using a now-patched zero-day vulnerability. [.

126
126
article thumbnail

News Alert: W3C advances technology to streamline payment authentication

The Last Watchdog

Cambridge, Mass., June 15, 2023. The World Wide Web Consortium today announced a standardization milestone for a new browser capability that helps to streamline user authentication and enhance payment security during Web checkout. Secure Payment Confirmation (SPC) enables merchants, banks, payment service providers, card networks, and others to lower the friction of strong customer authentication (SCA), and produce cryptographic evidence of user consent, both important aspects of regulatory re

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

5 best practices to ensure the security of third-party APIs

CSO Magazine

When organizations consider application programming interface (API) security, they typically focus on securing APIs that are written in-house. However, not all the APIs that companies use are developed internally, rather some are designed and developed by other organizations. The problem is that many companies don't realize that using third-party APIs can expose their applications to security issues, such as malware, data breaches, and unauthorized access.

article thumbnail

Trend Micro Brings Generative AI to XDR Platform

Security Boulevard

Trend Micro Inc. today launched a revamped extended detection and response (XDR) platform that leverages Microsoft’s generative artificial intelligence (AI) capabilities to make it simpler for cybersecurity analysts to use a Companion conversational interface to launch queries. Lori Smith, director of product marketing for Trend Micro, said the Trend Vision One platform will be infused.

article thumbnail

Security culture improving in businesses despite factors holding teams back

CSO Magazine

The vast majority of CISOs have observed positive security culture gains in their organizations in the last year despite a perceived dip in the quality of overall security posture, according to the 10 th annual Information Security Maturity Report published by ClubCISO and Telstra Purple. The research surveyed 182 members of ClubCISO, a global community of information security leaders working in public and private sector companies.

CISO 120
article thumbnail

Valence Security Taps Generative AI to Secure SaaS Apps

Security Boulevard

Valence Security added a generative artificial intelligence (AI) capability to its security posture management platform for software-as-a-service (SaaS) applications via an alliance with Microsoft. The Valence platform enables cybersecurity teams to assess the cybersecurity risks attached to a wide range of SaaS platforms that many business units routinely use without any awareness of their potential.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

LockBit Affiliate Arrested, as Extortion Totals Reach $91M Since 2020

Dark Reading

A third perp has been fingered, but CISA warns that LockBit variants continue to be a major threat on a global scale.

134
134
article thumbnail

Passkeys Can Make Passwords a Thing of the Past

Security Boulevard

We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our most sensitive data. The number of data breaches increases almost daily–and in recent weeks, a leading password manager vendor, an internet hosting provider. The post Passkeys Can Make Passwords a Thing of the Past appeared first on Security Boulevard.

Passwords 111
article thumbnail

5 Stages of the Vulnerability Management Lifecycle

eSecurity Planet

Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities. It is a critical part of an organization’s cybersecurity program. There are many different vulnerability management frameworks, but the vulnerability management lifecycle of most organizations today typically includes five phases. We’ll examine those and then look at vulnerability management lifecycle best practices.

article thumbnail

CISOs Expect Stable IT Security Budgets in 2023

Security Boulevard

Cybersecurity budgets are on the rise despite continued economic uncertainty as CISOs and IT decision-makers (ITDMs) report increased confidence in their cybersecurity systems, especially as it relates to end-user compliance. These were among the findings of a Nupsire survey of 200 CISOs and ITDMs, which also revealed respondents are increasingly concerned with software applications and.

CISO 111
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Understanding the Importance of Cyberthreat Analysis Training Programs

CyberSecurity Insiders

In today’s digital landscape, cybersecurity has become a critical concern for organizations worldwide. With the ever-evolving threat landscape, it is imperative to develop robust defense mechanisms to safeguard sensitive data and infrastructure from cyberattacks. One vital aspect of this defense strategy is Cyberthreat Analysis Training Programs. This article aims to shed light on the significance of such programs and their role in fortifying an organization’s security posture.

article thumbnail

Android App Penetration Testing Checklist with 129+ Test cases [Free Excel File]

Security Boulevard

Discover the key steps to evaluate the security of your Android applications with our detailed Android penetration testing checklist. The post Android App Penetration Testing Checklist with 129+ Test cases [Free Excel File] appeared first on Indusface. The post Android App Penetration Testing Checklist with 129+ Test cases [Free Excel File] appeared first on Security Boulevard.

article thumbnail

Suspected LockBit ransomware affiliate arrested, charged in US

Bleeping Computer

Russian national Ruslan Magomedovich Astamirov was arrested in Arizona and charged by the U.S. Justice Department for allegedly deploying LockBit ransomware on the networks of victims in the United States and abroad. [.

article thumbnail

Web3 Security: Safeguarding Assets and Data Privacy

Security Boulevard

Introduction Technological advancements reshape daily life and redefine digital interactions. Among these technological swifts, Web3 Security has stood out as a game-changer. It is promising a decentralized future and revolutionizing how we create and use online platforms and apps. Web3, enabled by blockchain and decentralization, presents exciting opportunities for a user-centric, secure, and open internet. […] The post Web3 Security: Safeguarding Assets and Data Privacy appeared first on Krat

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Warning: GravityRAT Android Trojan Steals WhatsApp Backups and Deletes Files

The Hacker News

An updated version of an Android remote access trojan dubbed GravityRAT has been found masquerading as messaging apps BingeChat and Chatico as part of a narrowly targeted campaign since June 2022. "Notable in the newly discovered campaign, GravityRAT can exfiltrate WhatsApp backups and receive commands to delete files," ESET researcher Lukáš Štefanko said in a new report published today.

Backups 100
article thumbnail

New Russian APT Group Responsible for Wiper Attacks in Ukraine Exposed

Heimadal Security

Security researchers have made a public disclosure about the identification of a new Advanced Persistent Threat (APT) group associated with Russia’s General Staff Main Intelligence Directorate (GRU). The experts have issued a warning, revealing that this threat actor has been involved in destructive wiper malware attacks on various organizations in Ukraine.

Malware 99
article thumbnail

Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack

The Hacker News

Progress Software on Thursday disclosed a third vulnerability impacting its MOVEit Transfer application, as the Cl0p cybercrime gang deployed extortion tactics against affected companies. The new flaw, which is yet to be assigned a CVE identifier, also concerns an SQL injection vulnerability that "could lead to escalated privileges and potential unauthorized access to the environment.

article thumbnail

Private Data Compromised in Healthcare Breach

Heimadal Security

In a recent announcement, the Commonwealth Health System revealed that threat actors have successfully breached the computer network of a Scranton cardiology group, potentially compromising the private data of 181,764 patients. This incident marks the latest in a series of breaches targeting medical providers in Northeast Pennsylvania, including previous attacks on Commonwealth Health hospitals.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.