Mon.Nov 02, 2020

article thumbnail

New Windows Zero-Day

Schneier on Security

Google’s Project Zero has discovered and published a buffer overflow vulnerability in the Windows Kernel Cryptography Driver. The exploit doesn’t affect the cryptography, but allows attackers to escalate system privileges: Attackers were combining an exploit for it with a separate one targeting a recently fixed flaw in Chrome. The former allowed the latter to escape a security sandbox so the latter could execute code on vulnerable machines.

356
356
article thumbnail

If You Don't Want Guitar Lessons, Stop Following Me

Troy Hunt

I've had this blog post in draft for quite some time now, adding little bits to it as the opportunity presented itself. In a essence, it boils down to this: people expressing their displeasure when I post about a topic they're not interested in then deciding to have a whinge that my timeline isn't tailored to their expectation of the things they'd like me to talk about.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers have only just wet their whistle. Expect more ransomware and data breaches in 2021.

Tech Republic Security

The COVID-19 pandemic provided a huge opening for bad actors this year, thanks to remote work. Security experts expect more advanced cybersecurity threats in the coming year.

article thumbnail

UK ICO fines hotel chain giant Marriott over data breach

Security Affairs

The UK Information Commissioner’s Office fined US hotels group Marriott over the 2018 data breach that affected millions of customers worldwide. The UK Information Commissioner’s Office announced it has fined Marriott £18.4 million ($23.5 million) for multiple data breaches suffered by the company since 2018 that exposed the personal information of its customers. “The ICO has fined Marriott International Inc £18.4million for failing to keep millions of customers’ personal dat

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

It's an urgent plea this Election Eve: Don't click on ransomware disguised as political ads

Tech Republic Security

Remote work and social media have made it easier for businesses to be impacted by security breaches. Here's why, and how organizations can protect themselves.

Media 217
article thumbnail

Hackers stole credit card data from JM Bullion online bullion dealer

Security Affairs

JM Bullion, the leading online bullion dealer in the United States, has disclosed a data breach, hackers stole customers’ credit card information. JM Bullion, the online retailer of products made of precious metals (i.e. gold, silver, copper, platinum, and palladium) has disclosed a data breach. JM Bullion has sent a ‘ Notice of Data Security Incident ‘ to its customers, the security breach took place on February 18, 2020, when its staff discovered a malicious script on its web

More Trending

article thumbnail

North Korea-Linked APT Group Kimsuky spotted using new malware

Security Affairs

North Korea-linked APT group Kimsuky was recently spotted using a new piece of malware in attacks on government agencies and human rights activists. North Korea-linked cyber espionage group Kimsuky (aka Black Banshee, Thallium , Velvet Chollima) was recently observed using a new malware in attacks aimed at government agencies and human rights activists.

Malware 105
article thumbnail

Zoom Finally Has End-to-End Encryption. Here's How to Use It

WIRED Threat Level

You can lock down your meetings like never before—even if you have to give up a few features to do so.

article thumbnail

$100M Botnet Scheme Lands Cybercriminal 8 Years in Jail

Threatpost

Aleksandr Brovko faces jail time after stealing $100 million worth of personal identifiable information (PII) and financial data over the course of more than 10 years.

Hacking 107
article thumbnail

Oracle issues emergency patch for CVE-2020-14750 WebLogic Server flaw

Security Affairs

Oracle issued an out-of-band security update to address a critical remote code execution issue (CVE-2020-14750) impacting multiple Oracle WebLogic Server versions. Oracle issued an out-of-band security update to address a critical remote code execution (RCE) vulnerability, tracked as CVE-2020-14750 , which affects several versions of Oracle WebLogic Server.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Scammers Abuse Google Drive to Send Malicious Links

Threatpost

Cybercriminals are sending malicious links to hundreds of thousands of users via Google Drive notifications.

Scams 125
article thumbnail

Maze ransomware gang shuts down operations, states their press release

Security Affairs

The Maze ransomware operators finally announced that they have officially shut down their operations and denies the creation of a cartel. Today the Maze ransomware gang announced that they have officially shut down their operations, the news was anticipated last week. The cybercrime gang announced that it will no longer leak data of new companies infected with their ransomware. it was considered one of the most prominent and active ransomware crew since it began operating in May 2019.

article thumbnail

From Food Service to IT: 4 Tips to Get into IT Fast Without a Degree

CompTIA on Cybersecurity

Ian Clark changed careers from food service to IT in just 6 months. Here’s how he did it – and how you can, too.

121
121
article thumbnail

Maze Ransomware Operators: 'We Are Closing'

SecureWorld News

The Maze ransomware team, a pioneer in the cybercrime space, claims it is shutting down operations. Maze gained notoriety in 2019 for stealing data from organizations and demanding ransom for the data to be returned. This made Maze unique as the operators encrypted files on a corporate network with ransomware, making them inaccessible and also extracted the data and threatened to make the data public if the ransom was not paid.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Windows Zero-Day Used with Chrome Flaw in Targeted Attacks

Dark Reading

Google's Project Zero has disclosed a Windows kernel zero-day vulnerability being used with a known Chrome bug in targeted attacks.

110
110
article thumbnail

Unpatched Windows Zero-Day Exploited in the Wild for Sandbox Escape

Threatpost

Google Project Zero disclosed the bug before a patch becomes available from Microsoft.

121
121
article thumbnail

Microsoft & Others Catalog Threats to Machine Learning Systems

Dark Reading

Thirteen organizations worked together to create a dictionary of techniques used to attack ML models and warn that such malicious efforts will become more common.

124
124
article thumbnail

WordPress Pushes Out Multiple Flawed Security Updates

Threatpost

WordPress bungles critical security 5.5.2 fix and saves face next day with 5.5.3 update.

111
111
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

New Tools Make North Korea's Kimsuky Group More Dangerous

Dark Reading

Threat actor actively targeting US organizations in global intelligence-gathering campaign, government says.

article thumbnail

Texas Gold-Dealer Mined for Payment Details in Months-Long Data Breach

Threatpost

JM Bullion fell victim to a payment-card skimmer, which was in place for five months.

article thumbnail

California's Prop. 24 Splits Privacy Advocates

Dark Reading

Critics worry that the curatives in Prop. 24 are worse than the disease of privacy-rights violations.

99
article thumbnail

Strategies and Best Practices for Protecting Sensitive Data

Thales Cloud Protection & Licensing

Strategies and Best Practices for Protecting Sensitive Data. sparsh. Tue, 11/03/2020 - 06:29. Data has been migrating from traditional data centers to third-party hosted environments, private/public cloud infrastructures and Software-as-a-Service (SaaS) applications by leaps and bounds. With this in mind, providing easy access to data for everyone (customers, partners, employees) and securing sensitive data has to be a priority.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Fraud Prevention Strategies to Prepare for the Future

Dark Reading

While companies have largely adjusted to the new normal for security management, here are some tips for combatting fraud, post-COVID.

85
article thumbnail

User Deception: The Biggest Cyber Threat CISOs are Forgetting

Mitnick Security

As a CISO, you're always looking for the next big breakthrough to increase your organization's overall security posture. Next-generation firewalls (NGFW), intrusion prevention systems (IPS), and sophisticated anti-virus software are great, but the answer to strong cybersecurity starts with your weakest link: your employees. In fact, untrained employees are far more likely to lead to a breach than DDoS attacks or any other hacking technique.

CISO 52
article thumbnail

As Businesses Go Remote, Hackers Find New Security Gaps

Dark Reading

Improper access control, information disclosure, and SSRF are among the most impactful, and most awarded, security flaws found this year.

73
article thumbnail

Russian National Sentenced to 8 Years in Prison for Role in Botnet Operation

Dark Reading

Cybercrime scheme netted more than $100 million.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How Can I Help Remote Workers Secure Their Home Routers?

Dark Reading

The most effective way is with employee security education.

Education 111