Fri.Aug 05, 2022

article thumbnail

Weekly Update 307

Troy Hunt

A very early weekly update this time after an especially hectic week. The process with the couple of data breaches in particular was a real time sap and it shouldn't be this hard. Seriously, the amount of effort that goes into trying to get organisations to own their breach (or if they feel strongly enough about it, help attribute it to another party) is just nuts.

DNS 280
article thumbnail

How to use Authy: A guide for beginners

Tech Republic Security

Learn how to set up and sync Authy on all your devices for easy two-factor authentication. The post How to use Authy: A guide for beginners appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mysterious threat actor TAC-040 used previously undetected Ljl Backdoor

Security Affairs

A threat actor, tracked as TAC-040, exploited Atlassian Confluence flaw CVE-2022-26134 to deploy previously undetected Ljl Backdoor. Cybersecurity firm Deepwatch reported that a threat actor, tracked as TAC-040, has likely exploited the CVE-2022-26134 flaw in Atlassian Confluence servers to deploy a previously undetected backdoor dubbed Ljl Backdoor.

article thumbnail

Upskilling is Critical to Closing Cybersecurity Skills Gaps

Security Boulevard

Cybersecurity is the number-one skills gap in 2022, surpassing cloud computing as the top-ranking area of focus for individuals and organizations, according to a Pluralsight survey of more than 700 tech professionals. Respondents with access to modern upskilling options demonstrated more confidence in their skills and trust in their organizations. These technologists had access to.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Twitter confirms zero-day used to expose data of 5.4 million accounts

Bleeping Computer

Twitter has confirmed a recent data breach was caused by a now-patched zero-day vulnerability used to link email addresses and phone numbers to users' accounts, allowing a threat actor to compile a list of 5.4 million user account profiles. [.].

article thumbnail

New Linux botnet RapperBot brute-forces SSH servers

Security Affairs

RapperBot is a new botnet employed in attacks since mid-June 2022 that targets Linux SSH servers with brute-force attacks. Researchers from FortiGuard Labs have discovered a new IoT botnet tracked as RapperBot which is active since mid-June 2022. The bot borrows a large portion of its code from the original Mirai botnet, but unlike other IoT malware families, it implements a built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai.

IoT 143

LifeWorks

More Trending

article thumbnail

CISA adds Zimbra email bug to Known Exploited Vulnerabilities Catalog

Security Affairs

US Critical Infrastructure Security Agency (CISA) adds a recently disclosed flaw in the Zimbra email suite to its Known Exploited Vulnerabilities Catalog. The Cybersecurity & Infrastructure Security Agency (CISA) has added a recently disclosed flaw in the Zimbra email suite, tracked as CVE-2022-27924 , to its Known Exploited Vulnerabilities Catalog.

Passwords 139
article thumbnail

Kaspersky blames “misconfiguration” after customers receive “dear and lovely” email

Graham Cluley

Did Russian security Kaspersky really choose to send an email to its customers addressing them as "dear and lovely"? Had Kaspersky suffered a data breach? Had a hacker found a way to send messages to Kaspersky's customer base?

article thumbnail

8 Questions Cybersecurity Pros Should Ask Hiring Managers

Security Boulevard

Not too long ago, the consensus on the economy was that it was firing on all cylinders. Unemployment was low, investment across all sectors was through the roof, and within the cybersecurity vendor community, opportunities for career growth and change proliferated. Then, suddenly, the sentiment changed. Inflation skyrocketed, the stock market went into a tailspin, The post 8 Questions Cybersecurity Pros Should Ask Hiring Managers appeared first on Security Boulevard.

article thumbnail

DHS warns of critical flaws in Emergency Alert System encoder/decoder devices

Security Affairs

The U.S. DHS warns of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. The Department of Homeland Security (DHS) warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. Threat actors could exploit the flaws to send fake emergency alerts via TV, radio networks, and cable networks.

Wireless 134
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Suffering From a Surfeit of Security Tools

Security Boulevard

It’s almost ingrained in our collective psyche that more of a good thing is an even better thing. If you have one of something that you really like, then there is nothing wrong with having two or three, or even more. After all, you can’t have too much of a good thing, right? Unfortunately, while. The post Suffering From a Surfeit of Security Tools appeared first on Security Boulevard.

article thumbnail

Traffic Light Protocol for cybersecurity responders gets a revamp

Naked Security

Traffic lights make a handy global metaphor for denoting the sensitivity of cybersecurity threat data - three colours that everyone knows.

article thumbnail

US Emergency Alert System Has ‘Huge Flaw’ — Broadcasters Must Patch NOW

Security Boulevard

The Emergency Alert System run by FEMA and the FCC is vulnerable to hacking. This is NOT a test. All will be revealed next week at DEF?CON?30. The post US Emergency Alert System Has ‘Huge Flaw’ — Broadcasters Must Patch NOW appeared first on Security Boulevard.

Hacking 124
article thumbnail

Facebook discovers new android malware connected to APT threat group

CyberSecurity Insiders

Facebook security researchers released their second quarter Adversarial Threat Report that confirms two APT groups using a new android malware dubbed Dracarys. Dubbed as ‘Bitter APT’ and ‘APT36’ the newly discovered groups are being used to populate Dracarys malware via Facebook(FB) platform mainly to collect personal information or befriend a person, without the knowledge of the actual profile owner.

Malware 114
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Building a Defense Against Cybersecurity Fraud and Brand Impersonation

Security Boulevard

Cyber threats present themselves in a variety of ways. We constantly hear about cyberwarfare, supply chain attacks and breaches through security gaps. While these are all serious issues and something we should be seriously concerned about, they only represent a percentage of the threats enterprises face today. Take a look outside the security operations centers (SOC), and you’ll quickly see.

article thumbnail

Report Finds 49% of Security Teams Plan to Replace their ASM Solution in the next 12 Months

CyberSecurity Insiders

Team Cymru recently surveyed 440 security practitioners in the US and Europe. Each survey participant works for a company that currently uses an ASM platform. These professionals were able to provide first-hand knowledge about the benefits and drawbacks of ASM tools today. They shared what they liked and disliked about the tools they use. The Team Cymru State of Attack Surface Management Report covers a broad spectrum of topics.

Risk 111
article thumbnail

8 Best Hacking Training Courses to Boost your IT Career

CompTIA on Cybersecurity

Want to learn ethical hacking skills? Our experts have shared some of the best training courses that can help you kickstart your career as an ethical hacker.

Hacking 111
article thumbnail

Twitter confirms zero-day used to access data of 5.4 million accounts

Security Affairs

Twitter confirmed that the recent data breach that exposed data of 5.4 million accounts was caused by the exploitation of a zero-day flaw. At the end of July, a threat actor leaked data of 5.4 million Twitter accounts that were obtained by exploiting a now-fixed vulnerability in the popular social media platform. The threat actor offered for sale the stolen data on the popular hacking forum Breached Forums.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

A Ransomware Explosion Fosters Thriving Dark Web Ecosystem

Dark Reading

For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.

article thumbnail

Open Redirect Flaw Snags Amex, Snapchat User Data

Threatpost

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.

Phishing 107
article thumbnail

Top 10 Cookie Consent plugins for WordPress

Security Boulevard

We have researched all cookie consent plugins available on WordPress's marketplace and compiled a list of the top 10 plugins for cookie consent. The post Top 10 Cookie Consent plugins for WordPress appeared first on Security Boulevard.

105
105
article thumbnail

DHS Alerts of Critical Vulnerabilities in EAS Devices

Heimadal Security

The Department of Homeland Security (DHS) issued a warning that hackers might abuse critical weaknesses in Emergency Alert System (EAS) encoder/decoder devices that haven’t been patched in order to send bogus emergency notifications over TV and radio networks. What Is the Emergency Alert System (EAS)? The Emergency Alert System (EAS) is a national warning system […].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Top 10 Cookie Consent plugins for WordPress

GlobalSign

We have researched all cookie consent plugins available on WordPress's marketplace and compiled a list of the top 10 plugins for cookie consent.

105
105
article thumbnail

Iranian Hackers likely Behind Disruptive Cyberattacks Against Albanian Government

The Hacker News

A threat actor working to further Iranian goals is said to have been behind a set of disruptive cyberattacks against Albanian government services in mid-July 2022. Cybersecurity firm Mandiant said the malicious activity against a NATO state represented a "geographic expansion of Iranian disruptive cyber operations.

article thumbnail

How to Resolve Permission Issues in CI/CD Pipelines

Dark Reading

This Tech Tip outlines how DevOps teams can address security integration issues in their CI/CD pipelines.

101
101
article thumbnail

All the Data Amazon's Ring Cameras Collect About You

WIRED Threat Level

The popular security devices are tracking (and sharing) more than you might think.

101
101
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

UK NHS suffers outage after cyberattack on managed service provider

Bleeping Computer

United Kingdom's National Health Service (NHS) 111 emergency services are affected by a major outage triggered by a cyberattack that hit the systems of managed service provider (MSP) Advanced. [.].

100
100
article thumbnail

Resolving Availability vs. Security, a Constant Conflict in IT

The Hacker News

Conflicting business requirements is a common problem – and you find it in every corner of an organization, including in information technology. Resolving these conflicts is a must, but it isn’t always easy – though sometimes there is a novel solution that helps. In IT management there is a constant struggle between security and operations teams.

article thumbnail

Facebook finds new Android malware used by APT hackers

Bleeping Computer

Meta (Facebook) has released its Q2 2022 adversarial threat report, and among the highlights is the discovery of two cyber-espionage clusters connected to hacker groups known as 'Bitter APT' and APT36 (aka 'Transparent Tribe') using new Android malware. [.].

Malware 100
article thumbnail

A Growing Number of Malware Attacks Leveraging Dark Utilities 'C2-as-a-Service'

The Hacker News

A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal of commandeering compromised systems.

DDOS 99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!