Thu.Jun 30, 2022

article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Four and a half years ago now, I rolled out version 2 of HIBP's Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. Later in 2018, I did the same thing with the email address search feature used by Mozilla, 1Password and a handful of other paying subscribers. It works beautifully; it's ridiculously fast, efficient and above all, anonymous.

Passwords 356
article thumbnail

ZuoRAT Malware Is Targeting Routers

Schneier on Security

Wired is reporting on a new remote-access Trojan that is able to infect at least eighty different targets: So far, researchers from Lumen Technologies’ Black Lotus Labs say they’ve identified at least 80 targets infected by the stealthy malware, including routers made by Cisco, Netgear, Asus, and DrayTek. Dubbed ZuoRAT, the remote access Trojan is part of a broader hacking campaign that has existed since at least the fourth quarter of 2020 and continues to operate.

Malware 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How traditional security tools fail to protect companies against ransomware

Tech Republic Security

Most organizations surveyed by Titaniam have existing security prevention and backup tools, but almost 40% have still been hit by ransomware attacks in the last year. The post How traditional security tools fail to protect companies against ransomware appeared first on TechRepublic.

article thumbnail

Top of Mind Security Insights from In-Person Interactions

Cisco Security

The past few months have been chockfull of conversations with security customers, partners, and industry leaders. After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions. It’s a reminder of just how enriching conversations are and how incredibly interconnected the world is.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Have you ever found phishing emails confusing? You aren’t alone

Tech Republic Security

Kaspersky explores the ways hackers are able to confuse users through seemingly legitimate email templates. The post Have you ever found phishing emails confusing? You aren’t alone appeared first on TechRepublic.

Phishing 158
article thumbnail

The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact

SecureList

Following on from our earlier Owowa discovery , we continued to hunt for more backdoors potentially set up as malicious modules within IIS, a popular web server edited by Microsoft. And we didn’t come back empty-handed… In 2021, we noticed a trend among several threat actors for deploying a backdoor within IIS after exploiting one of the ProxyLogon-type vulnerabilities within Microsoft Exchange servers.

Passwords 145

LifeWorks

More Trending

article thumbnail

ESG’s Report on the Role of XDR in SOC Modernization

Cisco Security

Extended Detection and Response, or XDR, the cybersecurity topic that dominated the RSA conference 2022 show floor with multiple vendors, has been getting a lot of attention lately, and for good reason. A connected, unified approach to detection and response promises to give security professionals all the tools and capabilities they need to address the ever-growing attack surface.

article thumbnail

SOHO routers used as initial point of compromise in stealth attack campaign

Tech Republic Security

The attack campaign, possibly state-sponsored, went undetected for nearly two years while targeting SOHO routers to compromise remote workers. The post SOHO routers used as initial point of compromise in stealth attack campaign appeared first on TechRepublic.

148
148
article thumbnail

Hacking Linux is Easy with PwnKit

eSecurity Planet

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added PwnKit as a high-severity Linux vulnerability to its list of actively exploited bugs. Recorded as CVE-2021-4034 , with a CVSS score of 7.8/10, PwnKit was discovered by Qualys in November 2021 and can be used by hackers to gain full root control over major Linux distributions.

Hacking 139
article thumbnail

Protect your browsing for life with this innovative hardware

Tech Republic Security

The Deeper Connect Mini Decentralized VPN & Firewall Hardware provides reliable and secure network connectivity worldwide. The post Protect your browsing for life with this innovative hardware appeared first on TechRepublic.

VPN 148
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Brilliant Advice From Abraham Lincoln About Internet News Reports

Joseph Steinberg

Nearly a decade ago, well before most people had first heard the term “fake news,” I wrote a piece for Forbes unlike any other piece I had ever written before. Since then, I have seen many Internet memes circulate that appear to convey a similar message. As the result of several recent incidents, however, I have decided to re-share the piece… SO, here you go… Written for Forbes – April 2013: Yesterday’s posting by a hacker of a false report that President Obama was injured by explosi

Internet 130
article thumbnail

LockBit ransomware gang promises bounty payment for personal data

Tech Republic Security

The infamous ransomware-as-a-service group is offering money to researchers and hackers willing to share personal data for exploitation. The post LockBit ransomware gang promises bounty payment for personal data appeared first on TechRepublic.

article thumbnail

S3 Ep89: Sextortion, blockchain blunder, and an OpenSSL bugfix [Podcast + Transcript]

Naked Security

Latest episode - listen and read now! Use our advice to advise your own friends and family. let's all do our bit to stand up to scammers!

article thumbnail

Korean cybersecurity agency released a free decryptor for Hive ransomware

Security Affairs

Good news for the victims of the Hive ransomware, Korean security researchers have released a free decryptor for some versions. Good news for the victims of the Hive ransomware , the South Korean cybersecurity agency KISA has released a free decryptor for versions from v1 till v4. “The Korea Internet & Security Agency (KISA) is distributing the Hive ransomware integrated recovery tool.This recovery tool can recover Hive ransomware version 1 to version 4.” reads the announcement p

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

RansomHouse claims to have stolen at least 450GB of AMD’s data

Malwarebytes

AMD is investigating the claim that the RansomHouse extortion group has its hands on more than 450GB of the company’s data. AMD’s breach revelation came to light after RansomHouse teased on Telegram about selling data belonging to a popular ‘three-letter company that starts with the letter ‘A’ The event crescendoed with the addition of AMD to the group’s data leak site.

Passwords 115
article thumbnail

CISA Urges Exchange Online Authentication Update

eSecurity Planet

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is recommending that government agencies and private organizations that use Microsoft’s Exchange cloud email platform migrate users and applications to Modern Auth before Basic Auth is deprecated in October. CISA noted that Basic authentication is simple and pretty convenient but unsecured by design.

article thumbnail

Amazon Photos vulnerability could have given attackers access to user files and data

Malwarebytes

Amazon has patched a flaw in the Amazon Photos app which could have allowed an attacker to steal and use a user’s unique access token that verifies their identity across multiple Amazon APIs. That would give attackers access to a trove of information, since many of these APIs contain personal data, such as names, email addresses, and home addresses.

Software 112
article thumbnail

18 Zero-Days Exploited So Far in 2022

Dark Reading

It didn't have to be this way: So far 2022's tranche of zero-days shows too many variants of previously patched security bugs, according Google Project Zero.

111
111
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

ZuoRAT is a sophisticated malware that mainly targets SOHO routers

Malwarebytes

Researchers have analysed a campaign leveraging infected SOHO routers to target predominantly North American and European networks of interest. The so-called ZuoRAT campaign, which very likely started in 2020, is so sophisticated that the researchers suspect that there is a state sponsored threat actor behind it. SOHO routers. SOHO is short for small office/home office and SOHO routers are hardware devices that route data from a local area network (LAN) to another network connection.

Malware 112
article thumbnail

NFT marketplace OpenSea warns of data breach that could lead to phishing attacks

Graham Cluley

Popular NFT marketplace OpenSea has warned users that they might be targeted with phishing attacks following a data breach that exposed the email addresses of its users and newsletter subscribers.

article thumbnail

YouTube Creators Have Their Accounts Stolen by the New YTStealer Malware

Heimadal Security

YouTube content creators are the target of a new data-stealing malware called YTStealer, which aims to snatch their authentication tokens and take over their channels. An Intezer report that was released yesterday showed that by focusing on just one objective, the developers of YTStealer were able to significantly increase the effectiveness of its token-stealing operation, […].

article thumbnail

A Fintech Horror Story: How One Company Prioritizes Cybersecurity

Dark Reading

A password link that didn't expire leads to the discovery of exposed personal information at a payments service.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Great Tools To Help Protect Yourself And Your Devices

SecureBlitz

This post will show you great tools to help protect yourself and your devices. Protecting yourself from the dangers of. Read more. The post Great Tools To Help Protect Yourself And Your Devices appeared first on SecureBlitz Cybersecurity.

article thumbnail

What is Data Security?

Digital Guardian

What is data security, why does it matter, and what are the best ways to address data security?

105
105
article thumbnail

Passive Vs Active Investing: Which Should I Go For?

SecureBlitz

Read on for the Passive vs Active Investing comparison. For the casual investor, passive investing is appealing because of its. Read more. The post Passive Vs Active Investing: Which Should I Go For? appeared first on SecureBlitz Cybersecurity.

article thumbnail

ZuoRAT Exploits Weaknesses in SOHO Routers to Target Remote Employees

Heimadal Security

A Remote Access Trojan (RAT) is a type of malware that provides the attacker with full remote control over your system. When a RAT reaches your computer, it allows the hacker to easily access your local files, secure login authorization, and other sensitive information, or use that connection to download viruses you could unintentionally pass on to […].

Malware 104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Costco 40th anniversary scam targets WhatsApp users

We Live Security

If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is. The post Costco 40th anniversary scam targets WhatsApp users appeared first on WeLiveSecurity.

Scams 102
article thumbnail

Criminals are applying for remote work using deepfake and stolen identities, says FBI

Malwarebytes

The FBI has warned businesses of an uptick in reports of criminals applying for remote work using deepfake and stolen PII (personally identifiable information). A deepfake is essentially created or modified media (image, video, or audio), often with the help of artificial intelligence (AI) and machine learning (ML). Deepfake creations are designed to appear and sound as authentic as possible.

article thumbnail

Your Ultimate Social Media Security Checklist [2022 Updated]

Appknox

Social media is both a boon and a bane. While it has connected billions of people, made them more accessible, and created more possibilities for the end-users. There's no doubt that it has also made them more susceptible to security threats and vulnerabilities. According to We Are Social , there are around 4.62 billion active social media users worldwide.

Media 102
article thumbnail

Pro-Russian hackers launched a massive DDoS attack against Norway

Security Affairs

Norway’s National Security Authority (NSM) confirmed that a DDoS attack took down some of the country’s most important websites. Norway’s National Security Authority (NSM) confirmed that some of the country’s most important websites and online services were taken down by a massive DDoS attack conducted by a pro-Russian group.

DDOS 101
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!