Tue.Sep 06, 2022

article thumbnail

NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity

The Last Watchdog

Network security has been radically altered, two-plus years into the global pandemic. Related: ‘ Attack surface management’ rises to the fore. The new normal CISOs face today is something of a nightmare. They must take into account a widely scattered workforce and somehow comprehensively mitigate new and evolving cyber threats. Criminal hacking collectives are thriving, more than ever.

article thumbnail

New EvilProxy service lets all hackers use advanced phishing tactics

Bleeping Computer

A reverse-proxy Phishing-as-a-Service (PaaS) platform called EvilProxy has emerged, promising to steal authentication tokens to bypass multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI. [.].

Phishing 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In-app browser security risks, and what to do about them

CSO Magazine

In-app browsers can pose significant security risks to businesses, with their tendency to track data a primary concern. This was highlighted in recent research which examined how browsers within apps like Facebook, Instagram and TikTok can be a data privacy risk for iOS users. Researcher Felix Krause detailed how popular in-app browsers inject JavaScript code into third-party websites, granting host apps the ability to track certain interactions, including form inputs like passwords and addresse

Risk 137
article thumbnail

Worok: The big picture

We Live Security

Focused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files. The post Worok: The big picture appeared first on WeLiveSecurity.

136
136
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Good game, well played: an overview of gaming-related cyberthreats in 2022

SecureList

The gaming industry went into full gear during the pandemic, as many people took up online gaming as their new hobby to escape the socially-distanced reality. Since then, the industry has never stopped growing. According to the analytical agency Newzoo, in 2022, the global gaming market will exceed $ 200 billion , with 3 billion players globally. Such an engaged, solvent and eager-to-win audience becomes a tidbit for cybercriminals, who always find ways to fool their victims.

Mobile 133
article thumbnail

The Heartbleed bug: How a flaw in OpenSSL caused a security crisis

CSO Magazine

What is Heartbleed? Heartbleed is a vulnerability in OpenSSL that came to light in April of 2014; it was present on thousands of web servers, including those running major sites like Yahoo. OpenSSL is an open source code library that implements the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. The vulnerability meant that a malicious user could easily trick a vulnerable web server into sending sensitive information, including usernames and passwords.

LifeWorks

More Trending

article thumbnail

Security Breach Allegations Hover Over TikTok

Heimadal Security

On Friday, September 2, 2022, information emerged on a hacking forum about a data breach that affected TikTok and WeChat social networks. Representatives of TikTok denied firmly the allegation of stolen data. The claim was made by AgainstTheWest, a hacking group that posted screenshots of the database which supposedly was extracted from the two companies. […].

article thumbnail

Play Ransomware's Attack Playbook Similar to that of Hive, Nokoyawa

Trend Micro

Play is a new ransomware that takes a page out of Hive and Nokoyawa's playbook. The many similarities among them indicate that Play, like Nokoyawa, are operated by the same people.

article thumbnail

WhatsApp Scams in 2022: What to Look out for

The State of Security

WhatsApp is ranked as the most popular mobile messenger app in the world. In fact, there are two billion active users on the app. This is an incredibly large audience. Unfortunately, it is also a huge number of potential victims for criminals to target. Cybercriminals are increasingly using WhatsApp as the medium for their attacks, […]… Read More.

Scams 113
article thumbnail

Chrome and Edge fix zero-day security hole – update now!

Naked Security

This time, the crooks got there first - only 1 security hole patched, but it's a zero-day.

109
109
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

QNAP warns new Deadbolt ransomware attacks exploiting zero-day

Security Affairs

QNAP warns customers of ongoing DeadBolt ransomware attacks that are exploiting a zero-day vulnerability in Photo Station. QNAP warns customers of an ongoing wave of DeadBolt ransomware attacks, threat actors are exploiting a zero-day vulnerability in Photo Station. The attacks started on Saturday meantime the Taiwanese vendor has addressed the vulnerability. “QNAP Systems, Inc. today detected the security threat DEADBOLT leveraging exploitation of Photo Station vulnerability to encrypt QN

article thumbnail

A New and Upgraded Version of SharkBot Malware Has Been Detected

Heimadal Security

SharkBot malware is back in Google Play Store where two SharkbotDopper apps were identified. The two malicious apps are “Mister Phone Cleaner” and “Kylhavy Mobile Security,” both having cumulatively over 60,000 installations. The new version – 2.25 – is targeting banking credentials of Android users and its main update is a new function designed to […].

Malware 105
article thumbnail

Email Security News Round-Up [August 2022]

Security Boulevard

August was another busy month in the cyberworld. From email security news headlines and hot cybersecurity news, here’s our monthly news round-up. At the beginning of the month, researchers found that North Korean hackers used malware to read and download emails and attachments. Another email cybersecurity news story was connected to a cyberattack on Spain’s […].

Malware 105
article thumbnail

TikTok Data Breach 2022 details are here

CyberSecurity Insiders

TikTok, a sensation among the teenage folks, especially the dancing loving females, has stuck in a latest data breach controversy. According to a user named BlueHornet who tweeted on September 4th,2022, an exposed server named ‘Cabinet’ has led to the data breach of over 34GB worth of data and it could be more, as the breach history unfolds more. Despite clear-cut denial of TikTok, those who accessed the data leaked by a cloud storage platform have confirmed that the information truly belongs to

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

WordPress security survey results 2022

Security Boulevard

We recently ran a survey to get a better understanding of the state of WordPress security. The survey was open to everyone and included several WordPress security-related questions. This report details our findings. The post WordPress security survey results 2022 appeared first on WP White Security. The post WordPress security survey results 2022 appeared first on Security Boulevard.

105
105
article thumbnail

Samsung 2022 data breach leaks sensitive info of customers

CyberSecurity Insiders

Samsung has issued an apology for the latest data breach that affected a small portion of its US Customers leaking data such as demographic info, DoBs, product registration info, contact and names. The company has urged its customers to stay assured that the attack did not affect the information such as social security numbers and debit and credit card numbers.

article thumbnail

Build a Program that Fosters a Thoughtful Security Culture

SecureWorld News

People are the new perimeter and a prime target for attackers. In fact, according to the Verizon DBIR 2022 Report , 82% of breaches involve the human element. In this post-pandemic era where remote work has grown, people surf various websites and multitask their work and personal lives, opening the door to potential compromise. To reduce people-centric risk, most organizations have invested in end-user education.

article thumbnail

The nature of cyber incidents

SecureList

Kaspersky provides incident response services and trainings to organizations around the world. In our annual incident response report, we share our observations and statistics based on investigation of real-life incidents. The report contains anonymized data collected by the Kaspersky Global Emergency Response Team (GERT), which is our main incident response and digital forensics unit.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' Information

The Hacker News

Popular short-form social video service TikTok denied reports that it was breached by a hacking group, after it claimed to have gained access to an insecure cloud server. "TikTok prioritizes the privacy and security of our users' data," the ByteDance-owned company told The Hacker News. "Our security team investigated these claims and found no evidence of a security breach.

article thumbnail

A new Android malware used to spy on the Uyghur Community

Security Affairs

Experts spotted new Android spyware that was used by China-linked threat actors to spy on the Uyghur community in China. Researchers from Cyble Research & Intelligence Labs (CRIL) started their investigation after MalwareHunterTeam experts shared information about a new Android malware used to spy on the Uyghur community. "The China Freedom Trap.L1986v8V.apk": fd99acc504649e8e42687481abbceb71c730f0ab032357d4dc1e95a6ef8bb7ca Seems related to some possible Uyghur targeted samples ( [li

Malware 102
article thumbnail

Researchers Find New Android Spyware Campaign Targeting Uyghur Community

The Hacker News

A previously undocumented strain of Android spyware with extensive information gathering capabilities has been found disguised as a book likely designed to target the Uyghur community in China. The malware comes under the guise of a book titled "The China Freedom Trap," a biography written by the exiled Uyghur leader Dolkun Isa.

Spyware 99
article thumbnail

TikTok denies data breach following leak of user data

Security Affairs

Threat actors published a sample of data allegedly stolen from TikTok, but the company denies it was breached. The hacking collective AgainstTheWest recently published a post on Breach Forums message board claiming to have hacked TikTok and stolen source code and user data. The group published screenshots of an alleged stolen data, it claims to have had access to an Alibaba cloud instance containing data for both TikTok and WeChat users.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New Linux malware evades detection using multi-stage deployment

Bleeping Computer

A new stealthy Linux malware known as Shikitega has been discovered infecting computers and IoT devices with additional payloads. [.].

Malware 99
article thumbnail

China accuses the US of cyberattacks

Security Affairs

China accuses the United States of conducting tens of thousands of cyberattacks on its country, including cyberespionage campaigns. The Government of Beijing accused the United States of launching tens of thousands of cyberattacks on China. The attacks aimed at stealing sensitive data from government entities and universities. In the past, the US Government has accused China of cyberattacks against US organizations and private businesses, but Bejing always denied the claims.

article thumbnail

It’s Time to Get Real About TikTok’s Risks

WIRED Threat Level

US lawmakers keep warning about the popular app. But until they can explain what makes it uniquely dangerous, it’s difficult to tailor a resolution.

Risk 99
article thumbnail

Ransomware Attackers Abuse Genshin Impact Anti-Cheat System to Disable Antivirus

The Hacker News

A vulnerable anti-cheat driver for the Genshin Impact video game has been leveraged by a cybercrime actor to disable antivirus programs to facilitate the deployment of ransomware, according to findings from Trend Micro. The ransomware infection, which was triggered in the last week of July 2022, banked on the fact that the driver in question ("mhyprot2.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Defenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration

Dark Reading

Ransomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to be ready.

article thumbnail

TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor Attacks

The Hacker News

Cybersecurity researchers have offered insight into a previously undocumented software control panel used by a financially motivated threat group known as TA505. "The group frequently changes its malware attack strategies in response to global cybercrime trends," Swiss cybersecurity firm PRODAFT said in a report shared with The Hacker News.

article thumbnail

Experts discovered TeslaGun Panel used by TA505 to manage its ServHelper Backdoor

Security Affairs

Researchers discovered a previously undocumented software control panel, named TeslaGun, used by a cybercrime gang known as TA505. Researchers from cybersecurity firm PRODAFT have discovered a previously undocumented software control panel, tracked as TeslaGun, used by a cybercrime group known as TA505. Russian TA505 hacking group , aka Evil Corp , has been active since 2014 focusing on Retail and banking sectors.

article thumbnail

Worok Hackers Target High-Profile Asian Companies and Governments

The Hacker News

High-profile companies and local governments located primarily in Asia are the subjects of targeted attacks by a previously undocumented espionage group dubbed Worok that has been active since late 2020.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!