Tue.Jun 13, 2023

article thumbnail

Identifying the Idaho Killer

Schneier on Security

The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students. Pay attention to the techniques: The case has shown the degree to which law enforcement investigators have come to rely on the digital footprints that ordinary Americans leave in nearly every facet of their lives.

article thumbnail

Microsoft Patch Tuesday, June 2023 Edition

Krebs on Security

Microsoft Corp. today released software updates to fix dozens of security vulnerabilities in its Windows operating systems and other software. This month’s relatively light patch load has another added bonus for system administrators everywhere: It appears to be the first Patch Tuesday since March 2022 that isn’t marred by the active exploitation of a zero-day vulnerability in Microsoft’s products.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New phishing and business email compromise campaigns increase in complexity, bypass MFA

Tech Republic Security

Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat. The post New phishing and business email compromise campaigns increase in complexity, bypass MFA appeared first on TechRepublic.

Phishing 205
article thumbnail

Chinese hackers used VMware ESXi zero-day to backdoor VMs

Bleeping Computer

VMware patched today a VMware ESXi zero-day vulnerability exploited by a Chinese-sponsored hacking group to backdoor Windows and Linux virtual machines and steal data. [.

Hacking 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Cyberattacks surge to 61% of small and medium-sized businesses, says study

Tech Republic Security

A poll of security software buyers shows 39% of small and medium-sized businesses lost customer data due to cyberattacks. The post Cyberattacks surge to 61% of small and medium-sized businesses, says study appeared first on TechRepublic.

Software 179
article thumbnail

Pirated Windows 10 ISOs install clipper malware via EFI partitions

Bleeping Computer

Hackers are distributing Windows 10 using torrents that hide cryptocurrency hijackers in the EFI (Extensible Firmware Interface) partition to evade detection. [.

Firmware 145

More Trending

article thumbnail

Massive phishing campaign uses 6,000 sites to impersonate 100 brands

Bleeping Computer

A widespread brand impersonation campaign targeting over a hundred popular apparel, footwear, and clothing brands has been underway since June 2022, tricking people into entering their account credentials and financial information on fake websites. [.

Phishing 137
article thumbnail

Hiring kit: Cryptographer

Tech Republic Security

A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers and other encryption systems to protect sensitive data. It can be a difficult position to fill. This hiring kit from TechRepublic Premium provides a workable framework you can use to find the best cryptographer candidate for your business. It includes a.

article thumbnail

WordPress Stripe payment plugin bug leaks customer order details

Bleeping Computer

The WooCommerce Stripe Gateway plugin for WordPress was found to be vulnerable to a bug that allows any unauthenticated user to view order details placed through the plugin. [.

128
128
article thumbnail

Google Recruits Allies to Apply Generative AI to Cybersecurity

Security Boulevard

At the Google Cloud Security Summit, Google today announced that Broadcom, Crowdstrike, Egnyte, Exabeam, F5, Fortinet, Netskope, Securiti, SentinelOne, Sysdig, Tenable and Thales have all committed to using generative artificial intelligence AI capabilities from Google within their cybersecurity platforms. Last month, Google launched a Google Cloud Security AI Workbench, an extensible large language model (LLM).

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Microsoft: Windows 10 21H2 has reached end of servicing

Bleeping Computer

Multiple editions of Windows 10 21H2 have reached their end of service (EOS) in this month's Patch Tuesday, as Microsoft reminded customers today. [.

134
134
article thumbnail

Analysis: Social Engineering Drives BEC Losses to $50B Globally

Dark Reading

Threat actors have grown increasingly sophisticated in applying social engineering tactics against their victims, which is key to this oft-underrated cybercriminal scam's success.

article thumbnail

CISA orders federal agencies to secure Internet-exposed network devices

Bleeping Computer

CISA issued this year's first binding operational directive (BOD) ordering federal civilian agencies to secure misconfigured or Internet-exposed networking equipment within 14 days of discovery. [.

Internet 120
article thumbnail

Microsoft to pay $20m penalty for collecting children info without consent

CyberSecurity Insiders

Microsoft has made an official announcement that it will pay a $20m penalty to the US Federal Trade Commission (FTC) as it was found guilty of collecting children info via gaming consoles without their valid consent. Digging deep into the context, a lawsuit was slapped against the technology giant for collecting information of children playing games on Xbox Gaming Consoles.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft June 2023 Patch Tuesday fixes 78 flaws, 38 RCE bugs

Bleeping Computer

Today is Microsoft's June 2023 Patch Tuesday, with security updates for 78 flaws, including 38 remote code execution vulnerabilities.

138
138
article thumbnail

What To Look for in a HIPAA-Compliant Email Provider

Digital Guardian

Whether you work for a doctor's office, healthcare organization, or just find yourself handling protected health information or ePHI, this blog breaks down what to look for in a HIPAA-compliant email service provider.

article thumbnail

Windows 11 KB5027231 cumulative update released with 34 changes

Bleeping Computer

Microsoft has released the Windows 11 22H2 KB5027231 cumulative update to fix security vulnerabilities and introduce 34 changes, improvements, and bug fixes. [.

114
114
article thumbnail

Clop Ransomware gang strikes London Transport for London (TfL)

CyberSecurity Insiders

Clop ransomware gang has targeted the databases of Transport for London (TfL) customers, thus stealing information of over 13,000 drivers listed on the Ulez and Congestion Charges Repository. Clop is the same gang that struck MoveIT file transfer software last week and the TFL seems to be one of the impacted customers worldwide. And TfL became a victim as one of its customers incharge of storing and securing the databases was affected by the file encrypting malware spreading gang.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The High Stakes of Personal Cyber Attacks: Impact on Business, Data, and Reputation

Security Boulevard

In the digital age, we all live in glass houses. Our lives, personal and professional, are intertwined with technology in a way that renders us vulnerable to cyber threats. The consequences of these threats are not limited to our personal realm. The spillover into the professional sphere often results in significant business losses, theft of […] The post The High Stakes of Personal Cyber Attacks: Impact on Business, Data, and Reputation appeared first on BlackCloak | Protect Your Digital Li

article thumbnail

Cyber insurance: What is it and does my company need it?

We Live Security

While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident The post Cyber insurance: What is it and does my company need it?

article thumbnail

Encryption Evolution is on the Horizon

Security Boulevard

Quantum computers are an emerging technology that will revolutionize several aspects of computational power across countless fields. One of the more concerning predictions is the likelihood that quantum computers will eventually break and expose many of the technologies we use to secure information transmissions and storage today. In fact, The Department of Commerce’s National Institute.

article thumbnail

Artificial intelligence is coming to Windows: Are your security policy settings ready?

CSO Magazine

What’s in your Windows security policy? Do you review your settings on an annual basis or more often? Do you provide education and training regarding the topics in the policy? Does it get revised when the impact of an incident showcases that an internal policy violation led to the root cause of the issue? And, importantly, do you have a security policy that includes your firm’s overall policies around the increasing race towards artificial intelligence, which is seemingly in nearly every applica

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Windows 10 KB5026435 and KB5027215 updates released

Bleeping Computer

Microsoft has released the Windows 10 KB5027215 and KB5026435 cumulative updates for versions 22H2, version 21H2, version 21H1, and 1809 to fix problems and add new features to the operating system. [.

article thumbnail

Windows PGM Accounts for Half of Patch Tuesday’s Critical Flaws

eSecurity Planet

Microsoft’s Patch Tuesday for June 2023 addresses 78 vulnerabilities, a significant increase from last month’s total of 37. While six of the flaws are critical, Microsoft says none are currently being exploited in the wild. The six critical vulnerabilities are as follows: CVE-2023-24897 , a remote code execution vulnerability in.NET,NET Framework, and Visual Studio, with a CVSS score of 7.8 CVE-2023-29357 , an elevation of privilege vulnerability in Microsoft SharePoint Server, with

article thumbnail

CyberArk Survey Surfaces Identity Security Challenges

Security Boulevard

A global survey of 2,300 security decision-makers published today by CyberArk, a provider of a privileged access management (PAM) platform, finds that while there is a much greater appreciation for the need to secure identities, most organizations are encountering major challenges securing them. Macroeconomic changes resulting in layoffs coupled with digital transformation initiatives and a.

article thumbnail

St. Margaret’s Health is the first hospital to cite a cyberattack as a reason for its closure

Security Affairs

St. Margaret’s Health in Illinois is partly closing operations at its hospitals due to a 2021 ransomware attack that impacted its payment system. In February 2021a ransomware attack hit the St. Margaret’s Health in Illinois and forced the organization to shutdown of IT infrastructure at the Spring Valley hospital to contain the threat. The cyber attack did not impact the Peru branch because it relies on a separate infrastructure The payment system was taken offline for months, which caused delay

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Combating the cybersecurity tools overload

Security Boulevard

Anyone who knows me knows my passion for hiking, so let me start with a question close to my heart – Have you explored a new trail while hiking? Imagine this: You are deep into your hike, surrounded by beautiful scenery, and come across a hidden trail that not many have explored. You forge the … Read More The post Combating the cybersecurity tools overload appeared first on Security Boulevard.

article thumbnail

RDP honeypot targeted 3.5 million times in brute-force attacks

Bleeping Computer

Remote desktop connections are so powerful a magnet for hackers that an exposed connection can average more than 37,000 times every day from various IP addresses. [.

99
article thumbnail

A Zero-Day Should Not Be a Crisis

Security Boulevard

The next time there is a zero-day sweeping the internet, your organization shouldn’t have to panic. This shouldn’t be a crisis. Instead, it should be a controlled exercise that follows a playbook that a drill has validated. While that’s easier said than done, this proactive approach will yield long-term benefits, saving time and minimizing stress.

article thumbnail

Why Critical Infrastructure Remains a Ransomware Target

Dark Reading

While protecting critical infrastructure seems daunting, here are some critical steps the industry can take now to become more cyber resilient and mitigate risks.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.