Sun.Apr 18, 2021

article thumbnail

Discord Nitro gift codes now demanded as ransomware payments

Bleeping Computer

In a novel approach to ransom demands, a new ransomware calling itself 'NitroRansomware' encrypts victim's files and then demands a Discord Nitro gift code to decrypt files. [.].

article thumbnail

Diversity in the Cybersecurity Workforce

Security Boulevard

Like most technology workforce segments, the cybersecurity diversity issue is a very acute problem: there simply isn’t nearly enough representation of diverse backgrounds in cybersecurity roles, from security operations center (SOC) analysts all the way up through enterprise-level CISOs and board members. Erkang Zheng, founder and CEO of JupiterOne, said the primary issue that comes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WordPress to automatically disable Google FLoC on websites

Bleeping Computer

WordPress announced today that they plan on treating Google's new FLoC tracking technology as a security concern and plans to block it by default on WordPress sites. [.].

article thumbnail

Idaho CISO Shares Experience from Public, Private Sectors

Lohrman on Security

CISO 239
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

US sanctions cryptocurrency addresses linked to Russian cyberactivities

Bleeping Computer

The US government sanctioned this week twenty-eight cryptocurrency addresses allegedly associated with entities or individuals linked to Russian cyberattacks or election interference. [.].

article thumbnail

Google One gets certified by Internet of Secure Things Alliance

CyberSecurity Insiders

For building trust among users, companies manufacturing web connected devices should get the approval of Internet of Secure Things Alliance (iOXT) that approves the product only when it passes all the eight security principles planned by it before. Thus, based on these 8 principles, the iOXT has launched a new certification for mobile apps and VPNs that over 20 companies including Google and Amazon have passed with colors.

Internet 125

More Trending

article thumbnail

Codecov was a victim of a supply chain attack

Security Affairs

The software company Codecov suffered a security breach, threat actors compromised the supply chain of one of its tools. A new supply chain attack made the headlines, the software company Codecov recently disclosed a major security breach after a threat actor compromised its infrastructure to inject a credentials harvester code to one of its tools named Bash Uploader.

Software 121
article thumbnail

Windows 10 feature update: Here's what to expect in the next release

Bleeping Computer

With Windows 10 Sun Valley update, we're expecting new features for Start Menu, Taskbar, Action Center (notification center), File Explorer, and more. [.].

Software 123
article thumbnail

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

Fedir Hladyr (35), a Ukrainian national was sentenced today to 10 years in prison for his role in the financially motivated group FIN7, aka Carbanak. The Ukrainian national Fedir Hladyr (35), aka “das” or “AronaXus,” was sentenced to 10 years in prison for having served as a manager and systems administrator for the financially motivated group FIN7 , aka Carbanak.

article thumbnail

Cybersecurity in MEA: A Chat with Tripwire’s New RSM for the Africa and Levant Region

The State of Security

Tripwire recently hired Naoufal Mzali as its first local regional sales manager specifically for the Africa and Levant region. I therefore decided to sit down with Naoufal and have a chat about cybersecurity and Tripwire’s mission for the region. Here’s what he had to say. Joe Pettit: Is the Levant and Africa a new territory […]… Read More.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Is BazarLoader malware linked to Trickbot operators?

Security Affairs

Experts warn of malware campaigns delivering the BazarLoader malware abusing popular collaboration tools like Slack and BaseCamp. Since January, researchers observed malware campaigns delivering the BazarLoader malware abusing popular collaboration tools like Slack and BaseCamp. The campaigns aimed at employees of large organizations, the messages attempt to trick the victims that they contain important information relating to payroll, contracts, invoices, or customer service inquiries. .

Malware 95
article thumbnail

Data Breaches vs. Data Leaks, FBI Exchange Server Controversy

Security Boulevard

This week Tom and Kevin are back with an all new episode! Data breaches vs. recent data leaks, and the controversy over the FBI operation conducted to remove web shells from compromised Microsoft Exchange servers. ** Links mentioned on the show ** Facebook Data Breach: Here’s What To Do Now [link] LinkedIn says some user […]. The post Data Breaches vs.

article thumbnail

Monero Cryptocurrency campaign exploits ProxyLogon flaws

Security Affairs

Threat actors targeted are exploiting the ProxyLogon vulnerabilities in Microsoft Exchange servers to deploy Monero cryptocurrency miners. Sophos researchers reported that threat actors targeted Microsoft Exchange by exploiting ProxyLogon vulnerabilities to deploy malicious Monero cryptominer in an unusual attack. The unknown attacker is attempting to deliver a payload which is being hosted on a compromised Exchange server. “The attack begins with a PowerShell command to retrieve a file na

article thumbnail

CPDP 2021 – Moderator: Ian Brown ‘User Choice And Freedom Through Portability And Interoperability Rights?’

Security Boulevard

Speakers: Christoph Schmon, Rossana Ducato, Olivier Dion, Dita Charanzová. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Ian Brown ‘User Choice And Freedom Through Portability And Interoperability Rights?

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

What is Credential Stuffing?

Identity IQ

Hackers can use different techniques and methods to steal your passwords. One way they can use your stolen personal data is called credential stuffing. Read on to learn more about what credential stuffing entails and how you can help protect yourself. Credential Stuffing: Highly Risky. Credential stuffing is a type of security breach in which hackers use stolen lists containing usernames and passwords and try to gain unauthorized access.

article thumbnail

Policy development process: phase 2

Notice Bored

Today we completed and published a new "topic-specific" information security policy template on clear desk and screen. Having previously considered information risks within the policy scope, writing the policy involved determining how to treat the risks and hence what information security or other controls are most appropriate. Here we drew on guidance from the ISO27k standards, plus other standards, advisories and good practices that we've picked up in the course of ~30 years in the field, work

Risk 60
article thumbnail

Idaho CISO Shares Experience from Public, Private Sectors

Security Boulevard

This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: [link]. The post Idaho CISO Shares Experience from Public, Private Sectors appeared first on Security Boulevard.

CISO 59
article thumbnail

Ep. 144 – Adaptive Problem Solving with Ashley Rose

Security Through Education

In this episode of the SECurity Awareness Series of the SEPodcast , Chris Hadnagy and Ryan MacDougall are joined by Ashley Rose , the CEO of Living Security. Listen in as they discuss the best methods to teach cybersecurity awareness, as well as the unique advantages when using escape rooms to do so. April 19, 2021 . Download. Ep. 144- Adaptive Problem Solving with Ashley Rose.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cybersecurity in MEA: A Chat with Tripwire’s New RSM for the Africa and Levant Region

Security Boulevard

Tripwire recently hired Naoufal Mzali as its first local regional sales manager specifically for the Africa and Levant region. I therefore decided to sit down with Naoufal and have a chat about cybersecurity and Tripwire’s mission for the region. Here’s what he had to say. Joe Pettit: Is the Levant and Africa a new territory […]… Read More. The post Cybersecurity in MEA: A Chat with Tripwire’s New RSM for the Africa and Levant Region appeared first on The State of Security.

article thumbnail

Zscalar to buy cloud security firm Trustdome

CyberSecurity Insiders

Zscalar, the American cloud security firm has made it official last weekend that it is going to acquire Israel-based Trustdome for an undisclosed sum. The deal is said to close before the 3Q of 2021 and will be free from the latest law that bans tech companies in going for merger and acquisition deals till this year end based on the yearly profit margin cut off mark of $37 billion.

article thumbnail

Agentless Monitoring with Tripwire Enterprise: What You Need to Know

Security Boulevard

As we know, Tripwire Enterprise (TE) is the de-facto go-to solution for File Integrity Monitoring (FIM). In normal operations, we deploy a TE agent to a system we want to monitor. TE then uses that agent to baseline the system against the appropriate rules, creating a known good state for that system. Moving forward, that system […]… Read More. The post Agentless Monitoring with Tripwire Enterprise: What You Need to Know appeared first on The State of Security.

52
article thumbnail

Security Affairs newsletter Round 310

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. Is the recent accident at Iran Natanz nuclear plant a cyber attack? Joker malware infected 538,000 Huawei Android devices Personal data of 1.3 million Clubhouse users leaked online Fitch Ratings: Cyberattacks could pose a material risk to water and sewer utilities LinkedIn confirmed that it was not a victim of a data breach Two former NSA Offic

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

CPDP 2021 – Moderator: Christian Wiese Svanberg ‘E2EE: Stuck Between A Rock And A Hard Place’

Security Boulevard

Speakers: Scott Charney, Susan Landau, Christine Runnegar. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Christian Wiese Svanberg ‘E2EE: Stuck Between A Rock And A Hard Place’ appeared first on Security Boulevard.

article thumbnail

CommitStrip ‘Another Day, Another Daily’

Security Boulevard

Permalink. The post CommitStrip ‘Another Day, Another Daily’ appeared first on Security Boulevard.

59