Wed.Aug 19, 2020

article thumbnail

Voice Phishers Targeting Corporate VPNs

Krebs on Security

The COVID-19 epidemic has brought a wave of email phishing attacks that try to trick work-at-home employees into giving away credentials needed to remotely access their employers’ networks. But one increasingly brazen group of crooks is taking your standard phishing attack to the next level, marketing a voice phishing service that uses a combination of one-on-one phone calls and custom phishing sites to steal VPN credentials from employees.

Phishing 353
article thumbnail

Industrial control system cybersecurity vulnerabilities are rising in 2020

Tech Republic Security

365 ICS vulnerabilities were disclosed in the first half of the year, 75% of them are high or critical on the CVSS scale, and nearly three-quarters can be exploited remotely, according to a report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Worthwhile books Q2 2020

Adam Shostack

These are the books that I read in Q2 2020 that I think are worth your time. Sorry it’s late. They’re still worthwhile. Cyber. You’ll See This Message When It Is Too Late , by Josephine Wolff. This is an interesting examination of the effects of finger-pointing and blame avoidance on the cybersecurity landscape, with chapter titles like “How the TJX breach set the sate for a decade of payment card conflict” and “what they aren’t telling you is their rule

Internet 147
article thumbnail

IBM finds vulnerability in IoT chips present in billions of devices

Tech Republic Security

Manufactured by Thales, the EHS8 module family has security flaws that could allow attackers to take total control over internet-connected industrial machines.

IoT 218
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The Sounds a Key Make Can Produce 3D-Printed Replica

Threatpost

Researchers reveal technology called SpiKey that can ‘listen’ to the clicks a key makes in a lock and create a duplicate from the sounds.

article thumbnail

How to keep your company secure while employees work from home

Tech Republic Security

There are new issues organizations should consider as work from home continues with no end in sight. One expert offers ideas to secure your widening perimeter.

212
212

More Trending

article thumbnail

NordVPN: How to protect your organization from DDoS attacks

Tech Republic Security

Without early threat detection, you may not know your website has been hit by a DDoS attack until it slows down or stops, says NordVPN Teams.

DDOS 207
article thumbnail

Researchers Warn of Flaw Affecting Millions of IoT Devices

Threatpost

A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manufacturers to update their devices ASAP.

IoT 116
article thumbnail

Carnival Cruises hit with a costly ransomware attack

Tech Republic Security

The company says in SEC filing it is preparing for potential claims from guests, employees, and shareholders based on the data accessed.

article thumbnail

Airline DMARC Policies Lag, Opening Flyers to Email Fraud

Threatpost

Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to restrict Nextcloud logins to IP addresses

Tech Republic Security

If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.

177
177
article thumbnail

How Financial Apps Get You to Spend More and Question Less

WIRED Threat Level

You should never invest without fully understanding the risks, but tax prep and stock trading services often obfuscate the things you really need to know.

Risk 97
article thumbnail

Newly Patched Alexa Flaws a Red Flag for Home Workers

Dark Reading

Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.

article thumbnail

FritzFrog Botnet Attacks Millions of SSH Servers

Threatpost

The unique, advanced worming P2P botnet drops backdoors and cryptominers, and is spreading globally.

Malware 99
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Stolen Data: The Gift That Keeps on Giving

Dark Reading

Users regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.

Passwords 133
article thumbnail

CISA’s MAR warns of North Korean BLINDINGCAN RAT

Security Affairs

US CISA published an alert related to a new North Korean malware, dubbed BLINDINGCAN, used in attacks on the US defense and aerospace sectors. The US Cybersecurity and Infrastructure Security Agency (CISA) has published a Malware Analysis Report (MAR) that includes technical details about a new strain of malware, tracked as BLINDINGCAN, that was attributed to North Korea.

Malware 70
article thumbnail

How to Control Security Costs During a Down Economy

Dark Reading

Three key areas security professionals should watch when managing their budgets.

107
107
article thumbnail

Actively exploited CVE-2020-1464 Windows Spoofing flaw was known since 2018

Security Affairs

The actively exploited Windows spoofing vulnerability (CVE-2020-1464) recently patched by Microsoft has been known for more than two years. The actively exploited Windows spoofing flaw, tracked as CVE-2020-1464 and patched last week by Microsoft, has been known for more than two years, researchers revealed. Microsoft’s August 2020 Patch Tuesday security updates addressed 120 vulnerabilities, including two zero-days that have been exploited in attacks in the wild.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Fuzzing Services Help Push Technology into DevOps Pipeline

Dark Reading

As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.

article thumbnail

Researchers Disrupt Grid with Cyber-Physical Attack

SecureWorld News

What could you do with $50 and a disposable coffee cup? One option would be to order a lot of coffee. Another option: take down part of the power grid. And security researchers at the University of California, Irvine (UCI) just revealed how it's possible. How does a cyber-physical attack work? When we think about cyberattacks and cybersecurity, the concept that comes to mind is intangibility.

article thumbnail

CISA Warns of New RAT Aimed at US Defense Contractors

Dark Reading

Hidden Cobra, an APT group associated with the government of North Korea, is thought to be behind the campaign.

article thumbnail

Is August DDoS Attack Month?

SecureWorld News

According to Akamai, these old dogs have some new tricks. And by new tricks, we mean new DDoS extortion threats. This August, old cyber actors have returned with a string of malicious DDoS attacks. Or are they copycats? Old actors, new threats. They might sound strange to anyone outside the cybersecurity sphere, but the names Fancy Bear and Armada Collective are well-known bad actors.

DDOS 52
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

ICS Vulnerability Reports Rapidly Rise

Dark Reading

More scrutiny of products for industrial control systems is expected to expose even more weaknesses in devices that run critical infrastructure.

80
article thumbnail

NBlog Aug 20 - creative teamwork in lockdown

Notice Bored

Inspired by a heads-up from a colleague on LinkeDin, I bumped into MURAL today. MURAL is a 'digital workspace for visual collaboration' by virtual teams. The animated demonstration on their home page caught my beady eye. Here's a static snapshot as a small group of people are busy placing/moving blobs on a graphic, presumably while discussing what they are doing on a parallel channel (e.g.

article thumbnail

Sophisticated P2P Botnet Targeting SSH Servers

Dark Reading

'FritzFrog' is fileless, uses its own proprietary P2P implementation, and has breached at least 500 servers so far, Guardicore says.

79
article thumbnail

credential digger v4.12 releases: identifies hardcoded credentials

Penetration Testing

Credential Digger Credential Digger is a GitHub scanning tool that identifies hardcoded credentials (Passwords, API Keys, Secret Keys, Tokens, personal information, etc), filtering the false positive data through machine learning models. It supports Python... The post credential digger v4.12 releases: identifies hardcoded credentials appeared first on Penetration Testing.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How to Initiate Contact With a Mentor

Daniel Miessler

I’ve been in security for over 20 years now and have received thousands of emails asking for help or mentorship. And throughout that time I’ve also reached out to hundreds of people asking for something similar. I’ve had a mix of success and failure on both ends of that equation, and I think I might have deciphered what was going wrong. This can still work with some people, if it’s authentic.

article thumbnail

FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

Security Affairs

Researchers spotted a new sophisticated peer-to-peer (P2P) botnet, dubbed FritzFrog, that has been actively targeting SSH servers since January 2020. FritzFrog is a new sophisticated botnet that has been actively targeting SSH servers worldwide since January 2020. The bot is written in Golang and implements wormable capabilities, experts reported attacks against entities in government, education, and finance sectors.

article thumbnail

Over 6,000 email accounts belonging to Taiwan government agencies hacked by Chinese hacked

Security Affairs

Chinese hackers have hacked thousands of Taiwan Government email accounts belonging at least 10 Taiwan government agencies, officials said. Chinese hackers have gained access to around 6,000 email accounts belonging to at least 10 Taiwan government agencies, officials said. According to a top Taiwan cyber official, the attacks are part of a cyber espionage campaign.