Wed.Apr 05, 2023

article thumbnail

Seized Genesis Market Data is Now Searchable in Have I Been Pwned, Courtesy of the FBI and "Operation Cookie Monster"

Troy Hunt

A quick summary first before the details: This week, the FBI in cooperation with international law enforcement partners took down a notorious marketplace trading in stolen identity data in an effort they've named "Operation Cookie Monster" They've provided millions of impacted email addresses and passwords to Have I Been Pwned (HIBP) so that victims of the incident can discover if they have been exposed.

Marketing 354
article thumbnail

FBI (and Others) Shut Down Genesis Market

Schneier on Security

Genesis Market is shut down : Active since 2018, Genesis Market’s slogan was, “Our store sells bots with logs, cookies, and their real fingerprints.” Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials. But earlier today, multiple domains associated with Genesis had their homepages replaced with a seizure notice from the FBI, which said the domains were seized pursuan

Marketing 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get two years of ultimate VPN protection on unlimited connections for only $60

Tech Republic Security

Windscribe has functions you probably didn’t know you need and is offering new users best-on-web pricing for one-to-three-year subscriptions. The post Get two years of ultimate VPN protection on unlimited connections for only $60 appeared first on TechRepublic.

VPN 183
article thumbnail

The Telegram phishing market

SecureList

Telegram has been gaining popularity with users around the world year by year. Common users are not the only ones who have recognized the messaging app’s handy features — cybercrooks have already made it a branch of the dark web, their Telegram activity soaring since late 2021. The service is especially popular with phishers. They have become adept at using Telegram both for automating their activities and for providing various services — from selling phishing kits to helping with setting

Phishing 144
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Researcher Tricks ChatGPT into Building Undetectable Steganography Malware

Dark Reading

Using only ChatGPT prompts, a Forcepoint researcher convinced the AI to create malware for finding and exfiltrating specific documents, despite its directive to refuse malicious requests.

Malware 140
article thumbnail

US government warning! What if anyone could open your garage door?

Naked Security

Grab a message/Play it back/You've just performed/A big phat hack.

LifeWorks

More Trending

article thumbnail

Orca Security Traces Cloud Vulnerabilities Back to Code

Security Boulevard

Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it. Avi Shua, chief innovation officer for Orca Security, said the Cloud to Dev capabilities added to the company’s cloud-native application protection platform (CNAPP).

Risk 121
article thumbnail

How Can You Identify and Prevent Insider Threats?

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. If cyber threats feel like faceless intruders, you’re only considering a fraction of the risk. Insider threats pose a challenge for organizations, often catching them by surprise as they focus on securing the perimeter.

Risk 113
article thumbnail

Cyberattacks 2022: Phishing, Ransomware & Data Breach Statistics

Security Boulevard

Cyberattacks had yet another record-breaking year in 2022. Here's some statistics and trends on phishing, ransomware, and data breaches to be aware of. The post Cyberattacks 2022: Phishing, Ransomware & Data Breach Statistics appeared first on Security Boulevard.

article thumbnail

Let’s pump the brakes on the rush to incorporate AI into cybersecurity

CSO Magazine

It seems that everyone is rushing to embed artificial intelligence into their solutions, and security offerings are among the latest to obtain this shiny new thing. Like many, I see the potential for AI to help bring about positive change, but also its potential as a threat vector. To some, recent AI developments are a laughing matter. On April 1, 2023, that traditional day when technology and social media sites love to pull a fast one on us and engage in often elaborate pranks, the Twitter acco

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

5 Ways to Reduce the Attack Surface for Microservices

Security Boulevard

Microservices is a software development approach where an application is divided into small, independent and loosely coupled services that work together to provide the application’s overall functionality. Each microservice is designed to perform a specific task or function and communicates with other microservices via lightweight APIs. In a microservices architecture, each microservice can be developed, The post 5 Ways to Reduce the Attack Surface for Microservices appeared first on Securi

article thumbnail

Why you should spring clean your home network and audit your backups

We Live Security

Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit.

Backups 112
article thumbnail

Hackers can open Nexx garage doors remotely, and there's no fix

Bleeping Computer

Multiple vulnerabilities discovered Nexx smart devices can be exploited to control garage doors, disable home alarms, or smart plugs. [.

111
111
article thumbnail

Garage Door Openers Open to Hijacking, Thanks to Unpatched Security Vulns

Dark Reading

CISA is advising Nexx customers to unplug impacted devices until the security issues are addressed — but so far, it's crickets as to patch timeline.

111
111
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Spain's most dangerous and elusive hacker now in police custody

Bleeping Computer

The police in Spain have arrested José Luis Huertas (aka "Alcaseca", "Mango", "chimichuri"), a 19-year-old regarded as the most dangerous hackers in the country. [.

111
111
article thumbnail

3 Ways AI Transforms Security

Security Boulevard

Security AI usage has surged, and enterprises are reaping the benefits. In its 2022 Cost of a Data Breach Report , IBM found that organizations deploying security AI and automation incurred $3.05 million less on average in breach costs – the biggest cost saver found in the study. According to the study, organizations using security AI and automation detected and contained breaches faster.

article thumbnail

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

The Hacker News

An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to a victim's environment, new findings from CrowdStrike show. SFX files are capable of extracting the data contained within them without the need for dedicated software to display the file contents.

Software 110
article thumbnail

How to defend lean security teams against cyber threats

CyberSecurity Insiders

In today’s digital age, companies face an ever-increasing number of cyber threats. The reality is that no organization is immune to cyber attacks, regardless of its size or industry. However, lean security teams, which are commonplace in smaller companies and startups, can be particularly vulnerable to these threats. Having a lean security team means that there are fewer people to handle the various security issues that can arise, from detecting and responding to threats to patching vulner

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Strategic risk analysis is key to ensure customer trust in product, customer-facing app security

CSO Magazine

CISOs are no longer only responsible for the cybersecurity of systems used internally. In many organizations they also focus on securing products and public-facing applications, and one way to do this well is through risk assessment. Assessing risk requires identifying baseline security criteria around key elements such as customer contracts and regulatory requirements, Neil Lappage, partner at LeadingEdgeCyber and ISACA member, tells CSO.

Risk 107
article thumbnail

North Korea dedicates a hacking group to fund cyber crime

CyberSecurity Insiders

North Korea has established a hacking group named APT43 to fund its cybercrime activities, aimed at advancing Pyongyang’s geopolitical interests. According to a study conducted by se-curity firm Mandiant, the group has been in operation since 2018 and has now been tasked with carrying out both espionage and financially motivated attacks such as credential harvesting and social engineering.

Hacking 105
article thumbnail

New Rilide Malware Strikes Chromium-Based Browsers to Steal Cryptocurrency

Heimadal Security

Researchers discovered a new malware that fakes legitimate Google Drive extensions to inject malicious scripts and steal cryptocurrency. The new Rilide malware targets Chromium-based browsers like Google Chrome, Microsoft Edge, Brave, and Opera. How Is Rilide Different Just like other malware strains, Rilide also uses malicious browser extensions. But what makes it stand out from […] The post New Rilide Malware Strikes Chromium-Based Browsers to Steal Cryptocurrency appeared first on Heimd

article thumbnail

QNAP Zero-Days Leave 80K Devices Vulnerable to Cyberattack

Dark Reading

Multiple QNAP operating systems are affected, including QTS, QuTS hero, QuTScloud, and QVP Pro appliances, and some don't yet have patches available.

103
103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Will US FTC issue ban on use of ChatGPT future versions

CyberSecurity Insiders

An ethics group that specializes in technology has lodged a complaint against OpenAI, the de-veloper of ChatGPT, with the Federal Trade Commission (FTC). The group, known as the Centre for AI and Digital Policy’s Complaint (CAIDP), has urged the FTC to block OpenAI from releasing more chatbot versions that utilize AI and machine learning tools like GPT-4, the lat-est AI-based release by OpenAI that generates human-like text.

article thumbnail

Google will require Android apps to let you delete your account

Bleeping Computer

Google has announced a new Google Play Store data deletion policy that will require Android developers to provide users with an online option to delete their accounts and in-app data. [.

article thumbnail

Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques

The Hacker News

The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that packs in improved capabilities to evade detection and resist analysis. The new version is offered for sale on the criminal underground for $59 per month, $360 per year, or alternatively, for $540 for a lifetime subscription.

Malware 99
article thumbnail

Stop! Are you putting sensitive company data into ChatGPT?

Malwarebytes

Helping to reduce costs and enhance productivity are both things that your employer will look kindly upon. But what if you use an external tool for those tasks and the tasks involve confidential data that ended up on a server outside of the control of your company? That’s a problem. As a news writer at Tom’s Hardware reported there were 3 incidents in 20 days where Samsung staff shared confidential information with ChatGPT.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and take control of alarms and plugs. In late 2022, the researcher Sam Sabetan discovered a series of critical vulnerabilities in several smart devices manufactured by Nexx, including Smart Garage Door Openers, Alarms, and Plugs.

article thumbnail

Extreme Networks ExtremeControl: NAC Product Review

eSecurity Planet

As a leader in wireless and wired large area network (LAN) infrastructure, Extreme Networks deeply understands the operational requirements for networks and the IT teams managing them. To aid in reducing IT labor requirements and to improve security, Extreme Networks created their ExtremeControl network access solution. To compare ExtremeControl against competitors, see our complete list of top network access control (NAC) solutions.

article thumbnail

HP would take up to 90 days to fix a critical bug in some business-grade printers

Security Affairs

HP would take up to 90 days to address a critical flaw, tracked as CVE-2023-1707, that resides in the firmware of some business-grade printers. HP is aware of a critical vulnerability, tracked as CVE-2023-1707 (CVSS v3.1 score 9.1), that affects tens of HP Enterprise LaserJet and HP LaserJet Managed Printers models. The exploitation of the flaw can potentially lead to information disclosure and the IT giant announced that it would take up to 90 days to address the vulnerability.

article thumbnail

MixMode Welcomes John Phillips as VP Federal Sales

Security Boulevard

MixMode, the leader in AI-driven network security, announces hiring John Phillips as VP of Federal Sales. Phillips will oversee the continued growth of MixMode’s federal business and adoption of the MixMode platform by federal partners, and he will be focused on accelerating MixMode’s triple-digit growth in 2021 and 2022. The post MixMode Welcomes John Phillips as VP Federal Sales appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!