Sat.May 15, 2021

article thumbnail

Colonial Pipeline, Darkside and Models

Adam Shostack

The Colonial Pipeline shutdown story is interesting in all sorts of ways, and I can’t delve into all of it. I did want to talk about one small aspect, which is the way responders talk about Darkside. Blog posts from Sophos and Mandiant seem really useful! Information sharing is working, and what the heck does a Cyber Review Board have left to do?

Phishing 357
article thumbnail

RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

The Last Watchdog

Much attention has been paid to the widespread failure to detect the insidious Sunburst malware that the SolarWinds hackers managed to slip deep inside the best-defended networks on the planet. Related: The undermining of the global supply chain. But there’s also an encouraging ‘response’ lesson SolarWinds teaches us, as well. Reacting to the disclosure of this momentous supply-chain hack , many of the breached organizations were able to deploy advanced tools and tactics to swiftly root out Sunb

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Hackers Steal Your Passwords

Identity IQ

Passwords are your first line of defense for protecting your digital identity. As important as they are, however, about 52 percent of people still use the same passwords across multiple accounts and 24 percent use a variation of common passwords that are easy to hack. Hackers employ different strategies to steal your passwords. So it helps to understand how they do it so you can prevent account takeover and other forms of identity theft.

Passwords 129
article thumbnail

Apple rejected over 215,000 apps in 2020 for privacy violations

Bleeping Computer

Apple says that more than 215,000 iOS apps were blocked by its App Store's App Review team for privacy violations in 2020, while another 150,00 were rejected because they were spamming or misleading iOS users. [.].

127
127
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Can I keep using WhatsApp without accepting their privacy policies?

Quick Heal Antivirus

WhatsApp’s new controversial privacy policies have been in the news lately and a hot topic of discussion among. The post Can I keep using WhatsApp without accepting their privacy policies? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

article thumbnail

Ireland’s Health Services hit with $20 million ransomware demand

Bleeping Computer

Ireland's health service, the HSE, says they are refusing to pay a $20 million ransom demand to the Conti ransomware gang after the hackers encrypted computers and disrupted health care in the country. [.].

More Trending

article thumbnail

QNAP warns of eCh0raix ransomware and Roon Server zero-day attacks

Security Affairs

QNAP warns of an actively exploited Roon Server zero-day flaw and eCh0raix ransomware attacks on its NAS devices. QNAP warns customers of threat actors that are targeting its Network Attached Storage (NAS) devices with eCh0raix ransomware attacks and exploiting a Roon Server zero-day vulnerability. The Taiwanese vendor was informed of ongoing eCh0raix ransomware attacks that infected QNAP NAS devices using weak passwords. “The eCh0raix ransomware has been reported to affect QNAP NAS device

article thumbnail

Security News in Review: Biden Administration Aims to Disrupt Ransomware Gangs

Security Boulevard

This week in Security News in Review, you’ll find plans from the U.S. government on disrupting threat actor networks, more action from the DarkSide gang, and FIN7 masquerading as a security analysis firm. . The post Security News in Review: Biden Administration Aims to Disrupt Ransomware Gangs appeared first on Security Boulevard.

article thumbnail

Best Windows 10 commands to diagnose your Internet connection

Bleeping Computer

Diagnosing an Internet connection in Windows can be a frustrating experience. To help with this, we have outlined six Windows 10 commands that you can use to troubleshoot your Internet connection and help determine why you cannot reach a website. [.].

article thumbnail

CPDP 2021 – Moderator: Luca Belli ‘Data Protection (R)Evolutions In The Brics Countries’

Security Boulevard

Speakers: Danilo Doneda, Wei Wang, Andrey Shcherbovich, Smriti Parsheera, Sizwe Snail Ka Mtuze. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Luca Belli ‘Data Protection (R)Evolutions In The Brics Countries’ appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

WhatsApp’s New Privacy Policy Just Kicked In

WIRED Threat Level

Instead of a hard cutoff, the messaging app will gradually degrade and eventually cease to function if you don’t accept the changes.

94
article thumbnail

Major hacking forums XSS and Exploit ban ads from ransomware gangs

Security Affairs

XSS forum (previously known as DaMaGeLab) one of the most popular hacking forums, announced that it would ban the ads published by ransomware gangs. The popular hacking forum XSS forum, previously known as DaMaGeLab, announced that that it would ban the ads published by ransomware gangs. The forum is one the most important places of aggregation where ransomware gangs offer their services and attempt to recruit new affiliates in their networks.

Hacking 78
article thumbnail

Windows 10 is gaining these nifty enhancements in the next update

Bleeping Computer

With Windows 10 Sun Valley update, we're expecting new features for Start Menu, Taskbar, Action Center (notification center), File Explorer, and more. [.].

article thumbnail

RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

Security Boulevard

Much attention has been paid to the widespread failure to detect the insidious Sunburst malware that the SolarWinds hackers managed to slip deep inside the best-defended networks on the planet. Related: The undermining of the global supply chain. But there’s … (more…). The post RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense appeared first on Security Boulevard.

Malware 90
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Episode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware

The Security Ledger

Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America's Critical Infrastructure. The post Episode 214: Darkside Down: What The Colonial Attack Means For The Future of. Read the whole entry. » Related Stories Deere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, Equipment Dispute Over Data Lea

article thumbnail

WWII Exploding Cylinders of Wires in the Sky

Security Boulevard

A paragraph in the 1977 book “The Shamrock and the Swastika: German Espionage in Ireland” on page 44 has this detail: …informers provided [Eduard Hempel, German Minister to Dublin from 1937 to 1945] with technical information. One, claiming to be a follower of the English Nazi, Oswald Mosely, said a Swedish firm was making 7-inch … Continue reading WWII Exploding Cylinders of Wires in the Sky ?.

article thumbnail

European police dismantle major online investment fraud ring that causes €30 Million in losses

Security Affairs

A joint operation of European law enforcement agencies and coordinated by Europol dismantled a criminal ring involved in investment fraud. A joint investigation of European law enforcement agencies supported by Europol and Eurojust dismantled a large criminal network involved in investment fraud and money laundering. The operation, led by Germany, involved authorities from Bulgaria, Israel, Latvia, North-Macedonia, Poland, Spain, and Sweden.

article thumbnail

XKCD ‘Astrophotography’

Security Boulevard

via the comic delivery system monikered Randall Munroe resident at XKCD ! Permalink. The post XKCD ‘Astrophotography’ appeared first on Security Boulevard.

62
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cybersecurity Executive Order: Can automation fix the nation’s misconfiguration problem?

Security Boulevard

President Joe Biden signed and released an Executive Order (EO) from the White House on May 12th, addressing his plan to improve the nation’s cybersecurity and protect federal government networks. This order comes on the heels of the Colonial Pipeline Ransomware attack and the now infamous SolarWinds breach. You can read the full text of […]. The post Cybersecurity Executive Order: Can automation fix the nation’s misconfiguration problem?