Sat.Jul 30, 2022

article thumbnail

Weekly Update 306

Troy Hunt

I didn't intend for a bunch of this week's vid to be COVID related, but between the breach of an anti-vaxxer website and the (unrelated) social comments directed at our state premier following some pretty simple advice, well, it just kinda turned out that way. But there's more on other breaches too, in particular the alleged Paytm one and the actual Customer.io one.

article thumbnail

Meta, US hospitals sued for using healthcare data to target ads

Bleeping Computer

A class action lawsuit has been filed in the Northern District of California against Meta (Facebook), the UCSF Medical Center, and the Dignity Health Medical Foundation, alleging that the organizations are unlawfully collecting sensitive healthcare data about patients for targeted advertising. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Staying Ahead of the Distortion of a Cyber Attack?

Security Boulevard

Staying Ahead of the Distortion of a Cyber Attack? One of the most sacred responsibilities of all cybersecurity professionals is protecting information. Corporate financials, client information, sales records, and product designs are all critical to an organization’s success. Each firewall, IDS, MFA, and email security is built to protect and stop cyber attacks.

article thumbnail

Facebook ads push Android adware with 7 million installs on Google Play

Bleeping Computer

Several adware apps promoted aggressively on Facebook as system cleaners and optimizers for Android devices are counting millions of installations on Google Play store. [.].

Adware 110
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CISA orders to patch an actively exploited flaw in Confluence servers

Security Affairs

US Critical Infrastructure Security Agency (CISA) adds the critical Confluence flaw, tracked as CVE-2022-26138, to its Known Exploited Vulnerabilities Catalog. US CISA has added the recently disclosed Confluence vulnerability, tracked as CVE-2022-26138 , to its list of bugs abused in the wild, a flaw that can provide remote attackers with hardcoded credentials following successful exploitation.

article thumbnail

Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers

The Hacker News

Microsoft on Friday disclosed a potential connection between the Raspberry Robin USB-based worm and an infamous Russian cybercrime group tracked as Evil Corp. The tech giant said it observed the FakeUpdates (aka SocGholish) malware being delivered via existing Raspberry Robin infections on July 26, 2022.

More Trending

article thumbnail

Stop Putting Your Accounts At Risk, and Start Using a Password Manager

The Hacker News

Image via Keeper Right Now, Get 30% Off Keeper, the Most Trusted Name in Password Management. In one way or another, almost every aspect of our lives is online, so it’s no surprise that hackers target everything from email accounts to banks to smart home devices, looking for vulnerabilities to exploit. One of the easiest exploits is cracking a weak password.

article thumbnail

Scam Robotexts on the Rise, FCC Warns

SecureWorld News

Have you recently noticed an increase in the number of random scam texts being sent your way? It's likely not because you clicked on a malicious link but because threat actors are ramping up their efforts to gain access to your device—and ultimately your money. The U.S. Federal Communications Commission (FCC) Robocall Response Team has issued an alert to consumers, warning of the threat of rising robotexts.

Scams 68
article thumbnail

You Pay More When Companies Get Hacked

WIRED Threat Level

Plus: Google delays the end of cookies (again), EU officials were targeted with Pegasus spyware, and more of the top security news.

Spyware 74
article thumbnail

Aspen Security Forum 2022 – Moderator: Mary Louise Kelly, Co-Host, All Things Considered, NPR – Fireside Chats with General John W. “Jay” Raymond Chief of Space Operations, U.S. Space Force

Security Boulevard

Our thanks to The Aspen Institute for publishing their cogent conference videos on the organization's YouTube channel. Updated with byline of Moderator Mary Louise Kelly, a Co-Host at All Things Considered, NPR. Permalink. The post Aspen Security Forum 2022 – Moderator: Mary Louise Kelly, Co-Host, All Things Considered, NPR – Fireside Chats with General John W. “Jay” Raymond Chief of Space Operations, U.S.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Aspen Security Forum 2022 – Anja Manuel’s ‘Opens The 22 Aspen Security Forum’

Security Boulevard

Our thanks to The Aspen Institute for publishing their cogent conference videos on the organization's YouTube channel. Permalink. The post Aspen Security Forum 2022 – Anja Manuel’s ‘Opens The 22 Aspen Security Forum’ appeared first on Security Boulevard.

article thumbnail

XKCD ‘Proxy Variable’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Proxy Variable’ appeared first on Security Boulevard.

52