Tue.Aug 04, 2020

article thumbnail

VMware Carbon Black Threat Report finds hackers using more aggressive and destructive tactics

Tech Republic Security

Security firm recommends digital distancing for devices and more collaboration between IT and security teams to harden the attack surface.

article thumbnail

Cybercrime in the Age of COVID-19

Schneier on Security

The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google and Amazon most impersonated brands in phishing attacks

Tech Republic Security

WhatsApp, Facebook, and Microsoft rounded out the top five as the most spoofed brands last quarter, says Check Point Research.

Phishing 200
article thumbnail

UberEats data leaked on the dark web

Security Affairs

Security researchers from threat intelligence firm Cyble have discovered user records of American online food ordering and delivery platform UberEats on DarkWeb. Another day, another data breach made the headlines, this time the alleged victim is UberEATS. UberEats is an American online food ordering and delivery platform launched by Uber in 2014. During the process of darkweb and deep web monitoring, the Cyble Research Team came across a threat actor who leaked user records of UberEATS.

Banking 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Why multi-factor authentication should be set up for all your services and devices

Tech Republic Security

More than ever, now is the time to make absolutely sure that your services and devices are using the best protection available to keep data secured and away from unauthorized hands.

article thumbnail

Maze Ransomware operators published data from LG and Xerox

Security Affairs

Maze ransomware operators published internal data from LG and Xerox after the company did not pay the ransom. Ransomware crews are very active during these months, Maze ransomware operators have published tens of GB of internal data allegedly stolen from IT giants LG and Xerox following failed extortion attempts. Maze ransomware operators published 50.2 GB from LG’s network and 25.8 GB from Xerox.

More Trending

article thumbnail

US govt agencies share details of the China-linked espionage malware Taidoor

Security Affairs

China-linked hackers carried out cyber espionage campaigns targeting governments, corporations, and think tanks with TAIDOOR malware. The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense (DoD) released information on a RAT variant, dubbed TAIDOOR, used by China-linked hackers in cyber espionage campaigns targeting governments, corporations, and think tanks. “The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Inv

Malware 107
article thumbnail

Study finds misconfigured cloud storage services in 93% of cloud deployments analyzed

Tech Republic Security

An Accurics study said cloud breaches will likely increase in velocity and scale as more enterprises move to the cloud.

164
164
article thumbnail

Twitter Could Face $250M FTC Fine Over Improper Data Use

Threatpost

The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising.

article thumbnail

6 Dangerous Defaults Attackers Love (and You Should Know)

Dark Reading

Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network.

128
128
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

NetWalker ransomware operators have made $25 million since March 2020

Security Affairs

NetWalker ransomware operators continue to be very active, according to McAfee the cybercrime gang has earned more than $25 million since March 2020. McAfee researchers believe that the NetWalker ransomware operators continue to be very active, the gang is believed to have earned more than $25 million since March 2020. The malware has been active at least since August 2019, over the months the NetWalker ransomware was made available through a ransomware-as-a-service (RaaS) model attracting crimi

article thumbnail

Securing IoT as a Remote Workforce Strategy

Dark Reading

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security.

article thumbnail

Hackers Are Building an Army of Cheap Satellite Trackers

WIRED Threat Level

NyanSat is an open source ground station that lets you listen in on low-orbit transmissions for about $100 worth of gear.

100
100
article thumbnail

Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks

Threatpost

COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks.

Phishing 114
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Hackers Could Use IoT Botnets to Manipulate Energy Markets

WIRED Threat Level

With access to just 50,000 high-wattage smart devices, attackers could make a bundle off of causing minor fluctuations.

article thumbnail

How Ransomware Threats Are Evolving & How to Spot Them

Dark Reading

A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.

article thumbnail

NetWalker ransomware operators have made $25 million since March 2020

Security Affairs

NetWalker ransomware operators continue to be very active, according to McAfee the cybercrime gang has earned more than $25 million since March 2020. McAfee researchers believe that the NetWalker ransomware operators continue to be very active, the gang is believed to have earned more than $25 million since March 2020. The malware has been active at least since August 2019, over the months the NetWalker ransomware was made available through a ransomware-as-a-service (RaaS) model attracting crimi

article thumbnail

Newsletter WordPress Plugin Opens Door to Site Takeover

Threatpost

An XSS bug and a PHP object-injection vulnerability are present in a plugin used by hundreds of thousands of websites.

92
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Decades-Old Email Flaws Could Let Attackers Mask Their Identities

WIRED Threat Level

Researchers found 18 exploits that take advantage of inconsistencies in the email plumbing most people never think about.

83
article thumbnail

Podcast: Learning to ‘Speak the Language’ of OT Security Teams

Threatpost

Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, talks about the differing priorities between IT and OT security teams as industrial control systems become connected.

article thumbnail

New Spin on a Longtime DNS Intel Tool

Dark Reading

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features.

DNS 82
article thumbnail

NetWalker Ransomware Rakes in $29M Since March

Threatpost

The ransomware has surged since moving to a RaaS model.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

When the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) all work together on something, you know the subject is serious. And when any subject comes up relating to cybersecurity and China, "serious" is the name of the game. CISA reports on Chinese malware strain.

article thumbnail

China Attacks Surge as Cyber Criminals Capitalize on COVID-19

The Security Ledger

COVID-19 has created a perfect storm for cybercriminals and nation-state hackers from China and elsewhere, according to research released Tuesday from VMWare and Carbon Black. The post China Attacks Surge as Cyber Criminals Capitalize on COVID-19 appeared first on The Security Ledger. Related Stories New LastPass report finds consumer behavior affects the workplace As Cybercrooks Specialize, More Snooping, Less Smash and Grab How NIST Is Securing The Quantum Era.

52
article thumbnail

Retooling the SOC for a Post-COVID World

Dark Reading

Residual work-from-home policies will require changes to security policies, procedures, and technologies.

article thumbnail

Best Enterprise Network Security Products

eSecurity Planet

Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Google & Amazon Replace Apple as Phishers' Favorite Brands

Dark Reading

Google and Amazon were the most imitated brands in the second quarter, knocking out Apple.

76
article thumbnail

Twitter Hack Tied To Employee Spearphishing

Adam Levin

With the arrest of 17-year-old hacker Graham Ivan Clark in Tampa, Florida and more than 30 charges later, we’re starting to get a better understanding of the July 15 hack that compromised 130 Twitter high-profile accounts. . As suspected by many, including us, the hack deployed a spearphishing attack on Twitter employees. . An official statement from Twitter confirmed the method of attack, announcing that a “small” number of employees had been duped by a social engineering campaign that provided

Hacking 194
article thumbnail

Top 5 Questions About Ransomware and Digital Extortion

SecureWorld News

The digital world of ransomware, malware, and extortion is full of questions. SecureWorld has some answers. At our recent New York and Philadelphia virtual conference , cyber attorney Daniel Pepper addressed five major questions surrounding ransomware. Here is a summary. What are the top ways cybercriminals gain access to a corporate network to launch ransomware?