Wed.Nov 02, 2022

article thumbnail

Open-source repository SourceHut to remove all cryptocurrency-related projects

Tech Republic Security

Also including blockchain-related projects in the ban, SourceHut's creator said the technology is associated with fraudulent activities and high-risk investments. The post Open-source repository SourceHut to remove all cryptocurrency-related projects appeared first on TechRepublic.

article thumbnail

Hundreds of U.S. news sites push malware in supply-chain attack

Bleeping Computer

The compromised infrastructure of an undisclosed media company is being used by threat actors to deploy the SocGholish JavaScript malware framework (also known as FakeUpdates) on the websites of hundreds of newspapers across the U.S. [.].

Malware 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Preventing Hyperjacking in a virtual environment

Security Boulevard

In the rapidly evolving world of information security, attack vectors, and cyberattacks, there is a. The post Preventing Hyperjacking in a virtual environment appeared first on Entrust Blog. The post Preventing Hyperjacking in a virtual environment appeared first on Security Boulevard.

article thumbnail

New Windows 'LockSmith' PowerToy lets you free locked files

Bleeping Computer

Microsoft has a new utility to the PowerToys toolset that will help Windows users find the processes using selected files and unlock them without requiring a third-party tool. [.].

134
134
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to securely manage LAPS on a Windows network

CSO Magazine

Passwords have always been a pain point in securing computing infrastructure. Complexity and length are key components of a strong password, but both make it inherently difficult for a human to remember. Additionally, passwords should be changed periodically, fine when you’re working with a handful of devices, but when your network is distributed geographically with hundreds, or thousands of computers things get more complex.

Passwords 119
article thumbnail

Why Aren’t You Following These 5 Kubernetes Best Practices?

Security Boulevard

As containers have taken hold as the standard method of developing and deploying cloud-native applications, many organizations are adopting Kubernetes as the solution they use for container orchestration. A recent Cloud Native Computing Foundation (CNCF) survey showed that 96% of respondents were using or evaluating Kubernetes and 93% of respondents are using containers in production environments.

More Trending

article thumbnail

Server-side attacks, C&C in public clouds and other MDR cases we observed

SecureList

Introduction. This report describes several interesting incidents observed by the Kaspersky Managed Detection and Response (MDR) team. The goal of the report is to inform our customers about techniques used by attackers. We hope that learning about the attacks that took place in the wild helps you to stay up to date on the modern threat landscape and to be better prepared for attacks.

article thumbnail

Twitter Verified Blue Tick Cyber Scam costing $100

CyberSecurity Insiders

As soon as Tesla Chief Elon Musk took the reign of Twitter as the CEO, the very first move he made was to remove Parag Agarwal and the legal head of the company Vijaya Gadde from their respective jobs. And soon, some more C-level employees are expected to leave the company or face the axe soon. Well, this is already old news to most of you, right? But here’s some fresh news that not only seems interesting but knowing it will help you out from falling prey to a cyber scam.

Scams 115
article thumbnail

Dropbox discloses unauthorized access to 130 GitHub source code repositories

Security Affairs

Dropbox disclosed a security breach, threat actors gained unauthorized access to 130 of its source code repositories on GitHub. File hosting service Dropbox announced that threat actors gained unauthorized access to 130 of its source code repositories on GitHub. According to the advisory published by Dropbox, the company was the target of a phishing campaign that resulted in access to the GitHub repositories.

Phishing 113
article thumbnail

GAO report: government departments need dedicated leaders to oversee privacy goals

CSO Magazine

The US Government Accountability Office (GAO) released a comprehensive report in late September 2022 that discussed the need for dedicated privacy leadership within the departments and agencies of the executive branch of government if goals surrounding privacy are to be achieved. The report highlighted how this void in leadership was in essence putting at risk well-intentioned plans and procedures for protecting the personal identifiable information (PII) held within those entities.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Legacy Effect: Why Innovation is Hard for Decades-old Companies.

Security Boulevard

Legacy services for traditional network visibility and detection companies have a hard time innovating when the market has evolved. The post Legacy Effect: Why Innovation is Hard for Decades-old Companies. appeared first on Netography. The post Legacy Effect: Why Innovation is Hard for Decades-old Companies. appeared first on Security Boulevard.

Marketing 109
article thumbnail

U.S. govt employees exposed to mobile attacks from outdated Android, iOS

Bleeping Computer

Roughly half of all Android-based mobile phones used by state and local government employees are running outdated versions of the operating system, exposing them to hundreds of vulnerabilities threat actors can leverage to perform cyberattacks. [.].

Mobile 106
article thumbnail

OpenSSL 3.0.0-3.0.6 Vulnerabilities: ?Less Heartbleed, more paper cut

Security Boulevard

Patch this with OpenSSL 3.0.7. You’ll be a bit safer. The world will be, too. But don’t spend one minute panicking. The post OpenSSL 3.0.0-3.0.6 Vulnerabilities: ?Less Heartbleed, more paper cut appeared first on Invicti. The post OpenSSL 3.0.0-3.0.6 Vulnerabilities: ?Less Heartbleed, more paper cut appeared first on Security Boulevard.

108
108
article thumbnail

CISA Urges Organizations to Implement Phishing-Resistant MFA

Hacker Combat

By deploying phishing-resistant multi-factor authentication (MFA) and number matching in MFA applications, organisations may defend themselves against phishing and other attacks, according to recommendations provided by the US Cybersecurity and Infrastructure Security Agency (CISA). MFA requires users to submit a combination of two or more separate authenticators to prove their identity.

Phishing 105
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

SandStrike Spyware Uses VPN App to Infect Android Devices

Heimadal Security

A newly discovered spyware is affecting more and more Android devices. Threat actors have become quite keen on SandStrike, spyware that they deliver via a malicious VPN app. The targeted group seems to be Persian-speaking practitioners of the Bahá?í Faith, a religion practiced in Iran and parts of the Middle East. How SandStrike Works? The […].

Spyware 104
article thumbnail

Chinese Mob Has 100K Slaves Working in Cambodian Cybercrime Mills

Dark Reading

Vulnerable people are lured by Facebook ads promising high-paying jobs, but instead they're held captive and put to work in Cambodia running cyber scams.

article thumbnail

Government Employees at High Risk for Mobile Phishing

SecureWorld News

New research from Lookout reveals the most common mobile threats aimed at federal, state, and local government agencies and their employees—all of which have increased since 2021. The U.S. government threat report , released this morning and titled "Rise in Mobile Phishing Credential Theft Targeting Public Sector," includes these key findings: Nearly 50% of state and local government employees are running outdated Android operating systems, exposing them to hundreds of device vulnerabilities.

Mobile 101
article thumbnail

How to Prevent Ransomware Attacks

Security Boulevard

How to Prevent Ransomware Attacks. brooke.crothers. Wed, 11/02/2022 - 18:08. 9 views. Attacks doubled. Ransomware attacks almost doubled during 2021 over 2020, according to Sophos State of Ransomware 2022 report, affecting 66% of businesses, up from 37%. This represents a 78% year-over-year increase, indicating that adversaries have become far more capable at conducting operations at scale.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The Main Advantages Of Using XDR Security System To Safeguard Business Data

IT Security Guru

The goal of XDR systems is to detect and counter security threats at all stages of the cyber-attack, from the point of entry to data extraction. This system offers a universal approach to ensuring the entire security landscape is protected from threats that could cause considerable losses to the organization. The following are the main advantages of using XDR in your business: #1.

article thumbnail

The Core of Our Cybersecurity Products: Our Customers

Security Boulevard

The post The Core of Our Cybersecurity Products: Our Customers appeared first on Digital Defense. The post The Core of Our Cybersecurity Products: Our Customers appeared first on Security Boulevard.

article thumbnail

Dropbox Breach: Hackers Unauthorizedly Accessed 130 GitHub Source Code Repositories

The Hacker News

File hosting service Dropbox on Tuesday disclosed that it was the victim of a phishing campaign that allowed unidentified threat actors to gain unauthorized access to 130 of its source code repositories on GitHub.

article thumbnail

RegTech: Three Increasingly Regulated Industries

Security Boulevard

Regulatory technology (RegTech) companies perform exactly the function you’d expect; they provide technology that is used by businesses to manage and enhance regulations and regulatory processes to achieve and prove compliance. It’s a sector that is now growing at a pace of 19.5% annually and is expected to hit $21.73 billion by 2027, according to. The post RegTech: Three Increasingly Regulated Industries appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Four Google Play Apps With Over 1 Million Installs Are Deploying Malware

Heimadal Security

Four Android Applications listed on Google Play with over 1 million downloads were infected with the malware Android/Trojan.HiddenAds.BTGTHB, according to an analysis performed by cybersecurity researchers. The apps are directing users to sites that steal credentials or generate pay-per-click income for the operators. Some of these websites encourage users to download phony security updates or […].

Malware 96
article thumbnail

OpenSSL fixed two high-severity vulnerabilities

Security Affairs

The OpenSSL project fixed two high-severity flaws in its cryptography library that can trigger a DoS condition or achieve remote code execution. The OpenSSL project has issued security updates to address a couple of high-severity vulnerabilities, tracked as CVE-2022-3602 and CVE-2022-3786 , in its cryptography library. The flaws impact versions 3.0.0 through 3.0.6 of the library.

article thumbnail

Successful Phishing Attack Causes Dropbox Data Breach

Heimadal Security

Dropbox announced on November 1, 2022, a data breach that led to the exfiltration of 130 GitHub code repositories. The breach was discovered on October 14, 2022, after GitHub identified some suspicious activity the day before. The threat actors gained access to one of company’s GitHub accounts after obtaining employee credentials in a successful phishing […].

article thumbnail

SandStrike, a previously undocumented Android malware targets a Persian-speaking religion minority

Security Affairs

Threat actors are using previously undocumented Android spyware, dubbed SandStrike, to spy on a Persian-speaking religion minority. In Q3 2022, Kaspersky researchers uncovered a previously undocumented Android spyware, dubbed SandStrike, employed in an espionage campaign targeting the Persian-speaking religion minority, Bahá?í. The threat actors were distributing a VPN app embedding a highly sophisticated spyware.

Spyware 96
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Heimdal® Launches Broad Investigation into Russian Cybercrime Trend

Heimadal Security

Heimdal® has recently launched an ample investigation into the Russia-linked cybercrime wave. Based on the data gathered from internal and external sources, Heimdal® has discovered that the phenomenon is expanding, both in magnitude and frequency. This article will showcase our SOC team’s discoveries, delineate methodology, and propose actionable strategies that will aid organizations to counter […].

article thumbnail

4 Malicious apps on Play Store totaled +1M downloads

Security Affairs

Four malicious Android apps uploaded by the same developer to Google Play totaled at least one million downloads. Malwarebytes researchers discovered four malicious apps uploaded by the same developer ( Mobile apps Group ) to the official Google Play. The apps are infected with the Android/Trojan.HiddenAds.BTGTHB malware, the apps totaled at least one million downloads.

Adware 96
article thumbnail

Vodafone Italy discloses data breach after reseller hacked

Bleeping Computer

Vodafone Italia is sending customers notices of a data breach, informing them that one of its commercial partners, FourB S.p.A., who operates as a reseller of the telco's services in the country, has fallen victim to a cyberattack. [.].

article thumbnail

Vitali Kremez passed away

Security Affairs

I’m deeply saddened by the absurd death of Vitali Kremez, he died during a scuba diving off the coast of Hollywood Beach in Florida. Vitali Kremez (36), founder and CEO of AdvIntel, has been found dead after scuba diving off the coast of Hollywood Beach in Florida. Vitali Kremez had entered the water on October 30 at about 9 am local time, but he was never seen returning to shore.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.