Wed.Jan 13, 2021

article thumbnail

On US Capitol Security — By Someone Who Manages Arena-Rock-Concert Security

Schneier on Security

Smart commentary : …I was floored on Wednesday when, glued to my television, I saw police in some areas of the U.S. Capitol using little more than those same mobile gates I had ­ the ones that look like bike racks that can hook together ­ to try to keep the crowds away from sensitive areas and, later, push back people intent on accessing the grounds.

Mobile 270
article thumbnail

Microsoft Patch Tuesday, January 2021 Edition

Krebs on Security

Microsoft today released updates to plug more than 80 security holes in its Windows operating systems and other software, including one that is actively being exploited and another which was disclosed prior to today. Ten of the flaws earned Microsoft’s most-dire “critical” rating, meaning they could be exploited by malware or miscreants to seize remote control over unpatched systems with little or no interaction from Windows users.

Backups 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Be proactive: 3 risk management steps to take before a cyberattack

Tech Republic Security

Risk management is more than recovery from a cyberattack. Learn how risk management can help your company discover gaps in security, as well as how to handle the fallout from a cybersecurity event.

Risk 192
article thumbnail

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are being used to radicalize youth. The question isn’t whether we should educate children about online safety, but how we can best inspire them to learn to be thoughtful, careful, and safe in the cyber world for their lifetime.

Scams 174
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Reserve Bank of New Zealand Data Breach Caused by Antiquated Third Party Software

Adam Levin

The data breach of the Reserve Bank of New Zealand has been attributed to the compromise of a third party file sharing service. “A third party file sharing service provided by Accellion called FTA (File Transfer Application), used by the Bank to share and store some sensitive information, was illegally accessed,” the bank announced in a January 11 press release.

article thumbnail

Google exposes malicious exploits targeting Windows and Android users

Tech Republic Security

Now patched, the exploits took advantage of bugs in Windows, Chrome, and older versions of Android though watering hole attacks, says Google.

139
139

More Trending

article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. madhav. Wed, 01/13/2021 - 09:42. Security of CNI is a national security issue. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. According to the EU NIS Directive, these entities are Operators of Essential Services (OES) and their reliability and ability to meet consumers’ demands at all times is of national interest.

article thumbnail

Hackers Leak Stolen Pfizer-BioNTech COVID-19 Vaccine Data

Threatpost

On the heels of a cyberattack on the EMA, cybercriminals have now leaked Pfizer and BioNTech COVID-19 vaccine data on the internet.

Internet 128
article thumbnail

Hackers leak stolen COVID?19 vaccine documents

We Live Security

The documents related to COVID-19 vaccine and medications were stolen from the EU's medicines agency last month. The post Hackers leak stolen COVID‑19 vaccine documents appeared first on WeLiveSecurity.

article thumbnail

8 Cloud Security Best Practice Fundamentals for Microsoft Azure

The State of Security

In a previous blog, I discussed securing AWS management configurations by combating six common threats with a focus on using both the Center for Internet Security (CIS) Amazon Web Services Foundations benchmark policy along with general security best practices. Now I’d like to do the same thing for Microsoft Azure. I had the privilege of being involved […]… Read More.

Internet 101
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Law Enforcement Gets Around Your Smartphone's Encryption

WIRED Threat Level

New research has dug into the openings that iOS and Android security provide for anyone with the right tools.

article thumbnail

Attackers targeted Accellion FTA in New Zealand Central Bank attack

Security Affairs

The root cause for the hack of the New Zealand Central Bank was the Accellion FTA (File Transfer Application) file sharing service. During the weekend, the New Zealand central bank announced that a cyber attack hit its infrastructure. According to the Government organization, one of its data systems has been breached by an unidentified hacker, commercially and personally sensitive information might have been accessed by the attackers.

Banking 94
article thumbnail

CISOs Prep For COVID-19 Exposure Notification in the Workplace

Threatpost

Security teams are preparing for the inevitable return to the workplace - and the privacy implications of exposure notification apps that companies may need to adopt.

CISO 96
article thumbnail

Rogue Android RAT emerges from the darkweb

Security Affairs

Experts discovered an Android Remote Access Trojan, dubbed Rogue , that can allow to take over infected devices and steal user data. Rogue is a new mobile RAT discovered by researchers from Check Point while investigating the activity of the darknet threat actors known as Triangulum and HeXaGoN Dev. Both actors are Android malware authors that are offering their malicious code on the darknet marketplaces.

Mobile 93
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Understanding TCP/IP Stack Vulnerabilities in the IoT

Dark Reading

Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to know to mitigate risks.

IoT 128
article thumbnail

Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums

Digital Shadows

It’s often the case that a sequel to a great book or a remake of a once-popular TV series doesn’t. The post Tracing the Rise and Fall of Dark Web Marketplaces and Cybercriminal Forums first appeared on Digital Shadows.

article thumbnail

How Amazon Sidewalk Works—and Why You May Want to Turn It Off

WIRED Threat Level

The premise is convenient. But the e-commerce giant's privacy track record isn't exactly inspiring.

109
109
article thumbnail

Sophisticated Hacks Against Android, Windows Reveal Zero-Day Trove

Threatpost

Watering-hole attacks executed by ‘experts’ exploited Chrome, Windows and Android flaws and were carried out on two servers.

Hacking 94
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CES 2021: Router swarms invade your home (and know where you are)

We Live Security

New mesh Wi-Fi routers may be the answer to your wireless signal woes, but how about your privacy and security? The post CES 2021: Router swarms invade your home (and know where you are) appeared first on WeLiveSecurity.

article thumbnail

Virtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation

Dark Reading

Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.

article thumbnail

Critical WordPress-Plugin Bug Found in ‘Orbit Fox’ Allows Site Takeover

Threatpost

Two security vulnerabilities -- one a privilege-escalation problem and the other a stored XSS bug -- afflict a WordPress plugin with 40,000 installs.

79
article thumbnail

SolarWinds Attackers May Have Hit Mimecast, Driving New Concerns

Dark Reading

Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations.

Software 114
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

TikTok Takes Teen Accounts Private

Threatpost

The company announced accounts for ages 13-15 will default to privacy setting, among other safety measures.

article thumbnail

Microsoft Patch Tuesday for January 2021 fixes 83 flaws, including an actively exploited issue

Security Affairs

Microsoft Patch Tuesday security updates for January 2021 address 83 vulnerabilities, including a critical flaw actively exploited in the wild. Microsoft Patch Tuesday security updates for January 2021 fix 83 security vulnerabilities in multiple products, including Microsoft Windows, Edge (EdgeHTML-based), ChakraCore, Office and Microsoft Office Services and Web Apps, Visual Studio, Microsoft Malware Protection Engine,NET Core, ASP.NET, and Azure. 10 of these flaws are rated as Critical and 73 a

article thumbnail

Top 10 Problems with Your Attack Surface

SecurityTrails

Learn about the most common problems that can happen to you attack surface and how to solve each of them.

85
article thumbnail

The Data-Centric Path to Zero Trust

Dark Reading

Data is an organization's most valuable asset, so a data-centric approach would provide the best value for organizations, now and in the future.

99
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals

Webroot

Top gaming companies positioned to be next major cyberattack target. After healthcare and higher education emerged as lucrative targets for cyberattacks in 2020, researchers have identified the video gaming industry as another key target. By scouring the dark web for stolen data belonging to any of the top 25 largest gaming firms, over a million unique and newly uploaded accounts were discovered.

article thumbnail

Microsoft patches anti-virus bug that allowed boobytrapped files to run malicious code when scanned

Graham Cluley

Microsoft has patched a security vulnerability that was - ironically - exploiting usage of the company's own Windows security product, Microsoft Defender Antivirus.

article thumbnail

Maze Ransomware is Dead. Or is it?

Webroot

“It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.”. Maze ransomware, which made our top 10 list for Nastiest Malware of 2020 (not to mention numerous headlines throughout the last year), was officially shut down in November of 2020. The ransomware group behind it issued a kind of press release , announcing the shutdown and that they had no partners or successors who would be taking up the mantle.

article thumbnail

SolarWinds Breach: 'Possible Tip of the Attack Iceberg'

SecureWorld News

As organizations around the globe continue examining their networks for tactics, techniques and procedures (TTPs) used in the SolarWinds cyberattack, something surprising is happening. Some revealed the attack TTPs were being carried out within their network even though they had not applied any of the compromised SolarWinds updates or use the SolarWinds Orion product.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.