Wed.Nov 02, 2022

article thumbnail

Open-source repository SourceHut to remove all cryptocurrency-related projects

Tech Republic Security

Also including blockchain-related projects in the ban, SourceHut's creator said the technology is associated with fraudulent activities and high-risk investments. The post Open-source repository SourceHut to remove all cryptocurrency-related projects appeared first on TechRepublic.

article thumbnail

Still Using Passwords? Get Started with Phishing-Resistant, Passwordless Authentication Now!

Cisco Security

Going beyond the hype, passwordless authentication is now a reality. Cisco Duo’s passwordless authentication is now generally available across all Duo Editions. “ Cisco Duo simplifies the passwordless journey for organizations that want to implement phishing-resistant authentication and adopt a zero trust security strategy. “ – Jack Poller, Senior Analyst, ESG.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dropbox discloses unauthorized access to 130 GitHub source code repositories

Security Affairs

Dropbox disclosed a security breach, threat actors gained unauthorized access to 130 of its source code repositories on GitHub. File hosting service Dropbox announced that threat actors gained unauthorized access to 130 of its source code repositories on GitHub. According to the advisory published by Dropbox, the company was the target of a phishing campaign that resulted in access to the GitHub repositories.

Phishing 136
article thumbnail

Hundreds of U.S. news sites push malware in supply-chain attack

Bleeping Computer

The compromised infrastructure of an undisclosed media company is being used by threat actors to deploy the SocGholish JavaScript malware framework (also known as FakeUpdates) on the websites of hundreds of newspapers across the U.S. [.].

Malware 131
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

OpenSSL fixed two high-severity vulnerabilities

Security Affairs

The OpenSSL project fixed two high-severity flaws in its cryptography library that can trigger a DoS condition or achieve remote code execution. The OpenSSL project has issued security updates to address a couple of high-severity vulnerabilities, tracked as CVE-2022-3602 and CVE-2022-3786 , in its cryptography library. The flaws impact versions 3.0.0 through 3.0.6 of the library.

article thumbnail

New Windows 'LockSmith' PowerToy lets you free locked files

Bleeping Computer

Microsoft has a new utility to the PowerToys toolset that will help Windows users find the processes using selected files and unlock them without requiring a third-party tool. [.].

131
131

LifeWorks

More Trending

article thumbnail

Employee Volunteers Enrich Communities From the Farm to the Theatre and Beyond

Cisco Security

Cisconians delight in contributing to their communities in a variety of ways including at the local theatre, farm and library. Cisco’s paid Time2Give benefit encourages team members to volunteer at the places where their passions thrive. How should you decide where to get involved? Customer Success Program Manager Kate Pydyn advises: “Find something that speaks to your passion while giving back.

125
125
article thumbnail

SandStrike Spyware Uses VPN App to Infect Android Devices

Heimadal Security

A newly discovered spyware is affecting more and more Android devices. Threat actors have become quite keen on SandStrike, spyware that they deliver via a malicious VPN app. The targeted group seems to be Persian-speaking practitioners of the Bahá?í Faith, a religion practiced in Iran and parts of the Middle East. How SandStrike Works? The […].

Spyware 124
article thumbnail

Preventing Hyperjacking in a virtual environment

Security Boulevard

In the rapidly evolving world of information security, attack vectors, and cyberattacks, there is a. The post Preventing Hyperjacking in a virtual environment appeared first on Entrust Blog. The post Preventing Hyperjacking in a virtual environment appeared first on Security Boulevard.

article thumbnail

The OpenSSL security update story – how can you tell what needs fixing?

Naked Security

How to Hack! Finding OpenSSL library files and accurately identifying their version numbers.

Hacking 120
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to securely manage LAPS on a Windows network

CSO Magazine

Passwords have always been a pain point in securing computing infrastructure. Complexity and length are key components of a strong password, but both make it inherently difficult for a human to remember. Additionally, passwords should be changed periodically, fine when you’re working with a handful of devices, but when your network is distributed geographically with hundreds, or thousands of computers things get more complex.

Passwords 119
article thumbnail

Why Aren’t You Following These 5 Kubernetes Best Practices?

Security Boulevard

As containers have taken hold as the standard method of developing and deploying cloud-native applications, many organizations are adopting Kubernetes as the solution they use for container orchestration. A recent Cloud Native Computing Foundation (CNCF) survey showed that 96% of respondents were using or evaluating Kubernetes and 93% of respondents are using containers in production environments.

article thumbnail

SandStrike, a previously undocumented Android malware targets a Persian-speaking religion minority

Security Affairs

Threat actors are using previously undocumented Android spyware, dubbed SandStrike, to spy on a Persian-speaking religion minority. In Q3 2022, Kaspersky researchers uncovered a previously undocumented Android spyware, dubbed SandStrike, employed in an espionage campaign targeting the Persian-speaking religion minority, Bahá?í. The threat actors were distributing a VPN app embedding a highly sophisticated spyware.

Spyware 119
article thumbnail

Netacea launches malicious bot intelligence service to help customers tackle threats

CSO Magazine

Cybersecurity vendor Netacea has announced the launch of a new Business Logic Intelligence Service (BLIS) designed to give customers actionable insight to help them tackle malicious bot activity and security threats. The firm said that the tiered, fee-based service will provide organizations with bot threat intelligence based on research including analysis of dark web forums and marketplaces.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CISA Urges Organizations to Implement Phishing-Resistant MFA

Hacker Combat

By deploying phishing-resistant multi-factor authentication (MFA) and number matching in MFA applications, organisations may defend themselves against phishing and other attacks, according to recommendations provided by the US Cybersecurity and Infrastructure Security Agency (CISA). MFA requires users to submit a combination of two or more separate authenticators to prove their identity.

Phishing 116
article thumbnail

Government Employees at High Risk for Mobile Phishing

SecureWorld News

New research from Lookout reveals the most common mobile threats aimed at federal, state, and local government agencies and their employees—all of which have increased since 2021. The U.S. government threat report , released this morning and titled "Rise in Mobile Phishing Credential Theft Targeting Public Sector," includes these key findings: Nearly 50% of state and local government employees are running outdated Android operating systems, exposing them to hundreds of device vulnerabilities.

Mobile 116
article thumbnail

Twitter Verified Blue Tick Cyber Scam costing $100

CyberSecurity Insiders

As soon as Tesla Chief Elon Musk took the reign of Twitter as the CEO, the very first move he made was to remove Parag Agarwal and the legal head of the company Vijaya Gadde from their respective jobs. And soon, some more C-level employees are expected to leave the company or face the axe soon. Well, this is already old news to most of you, right? But here’s some fresh news that not only seems interesting but knowing it will help you out from falling prey to a cyber scam.

Scams 115
article thumbnail

The Main Advantages Of Using XDR Security System To Safeguard Business Data

IT Security Guru

The goal of XDR systems is to detect and counter security threats at all stages of the cyber-attack, from the point of entry to data extraction. This system offers a universal approach to ensuring the entire security landscape is protected from threats that could cause considerable losses to the organization. The following are the main advantages of using XDR in your business: #1.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

GAO report: government departments need dedicated leaders to oversee privacy goals

CSO Magazine

The US Government Accountability Office (GAO) released a comprehensive report in late September 2022 that discussed the need for dedicated privacy leadership within the departments and agencies of the executive branch of government if goals surrounding privacy are to be achieved. The report highlighted how this void in leadership was in essence putting at risk well-intentioned plans and procedures for protecting the personal identifiable information (PII) held within those entities.

article thumbnail

Chinese Mob Has 100K Slaves Working in Cambodian Cybercrime Mills

Dark Reading

Vulnerable people are lured by Facebook ads promising high-paying jobs, but instead they're held captive and put to work in Cambodia running cyber scams.

article thumbnail

Legacy Effect: Why Innovation is Hard for Decades-old Companies.

Security Boulevard

Legacy services for traditional network visibility and detection companies have a hard time innovating when the market has evolved. The post Legacy Effect: Why Innovation is Hard for Decades-old Companies. appeared first on Netography. The post Legacy Effect: Why Innovation is Hard for Decades-old Companies. appeared first on Security Boulevard.

Marketing 111
article thumbnail

Successful Phishing Attack Causes Dropbox Data Breach

Heimadal Security

Dropbox announced on November 1, 2022, a data breach that led to the exfiltration of 130 GitHub code repositories. The breach was discovered on October 14, 2022, after GitHub identified some suspicious activity the day before. The threat actors gained access to one of company’s GitHub accounts after obtaining employee credentials in a successful phishing […].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

OpenSSL 3.0.0-3.0.6 Vulnerabilities: ?Less Heartbleed, more paper cut

Security Boulevard

Patch this with OpenSSL 3.0.7. You’ll be a bit safer. The world will be, too. But don’t spend one minute panicking. The post OpenSSL 3.0.0-3.0.6 Vulnerabilities: ?Less Heartbleed, more paper cut appeared first on Invicti. The post OpenSSL 3.0.0-3.0.6 Vulnerabilities: ?Less Heartbleed, more paper cut appeared first on Security Boulevard.

110
110
article thumbnail

Heimdal® Launches Broad Investigation into Russian Cybercrime Trend

Heimadal Security

Heimdal® has recently launched an ample investigation into the Russia-linked cybercrime wave. Based on the data gathered from internal and external sources, Heimdal® has discovered that the phenomenon is expanding, both in magnitude and frequency. This article will showcase our SOC team’s discoveries, delineate methodology, and propose actionable strategies that will aid organizations to counter […].

article thumbnail

Inside Raccoon Stealer V2

The Hacker News

Raccoon Stealer is back on the news again. US officials arrested Mark Sokolovsky, one of the malware actors behind this program. In July 2022, after several months of the shutdown, a Raccoon Stealer V2 went viral. Last week, the Department of Justice's press release stated that the malware collected 50 million credentials.

Malware 105
article thumbnail

Google Ad Exploited to Deliver Infostealing Malware

Heimadal Security

For the past week, upon searching for ‘GIMP’ on Google, visitors would be shown an ad for ‘GIMP.org,’ the official website of the graphics editor. This is where the things would take a turn for the worse: the ad appeared legitimate but clicking it resulted in visitors landing on a lookalike phishing website. The 700 MB executable pretending […].

Malware 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Attack Surface Management 2022 Midyear Review Part 3

Trend Micro

In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in the first half of the year.

article thumbnail

Smashing Security podcast #296: Twitter turmoil, AI animal chatters, and metaverse at work

Graham Cluley

Twitter has a new chief twit in the form of Elon Musk and he’s causing problems, scientists say artificial intelligence may help us communicate with animals, and is the office of the future set in the metaverse? All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by … Continue reading "Smashing Security podcast #296: Twitter turmoil, AI animal chatters, and metaverse at work".

article thumbnail

The Most Vulnerable Place on the Internet

WIRED Threat Level

Underwater cables keep the internet online. When they congregate in one place, things get tricky.

Internet 101
article thumbnail

Dropbox Breach: Hackers Unauthorizedly Accessed 130 GitHub Source Code Repositories

The Hacker News

File hosting service Dropbox on Tuesday disclosed that it was the victim of a phishing campaign that allowed unidentified threat actors to gain unauthorized access to 130 of its source code repositories on GitHub.

Phishing 100
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!