Thu.May 27, 2021

article thumbnail

The Story of the 2011 RSA Hack

Schneier on Security

Really good long article about the Chinese hacking of RSA, Inc. They were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come.

Hacking 272
article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Anton on Security

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next Now, we all agree that various cloud technologies such as SaaS SIEM help your Security Operations Center (SOC). However, there’s also a need to talk about how traditional SOCs are challenged by the need to monitor cloud computing environments for threats. In this post, I wanted to quickly touch on this very topic and refresh some past analysis of this (and perhaps reminisce on how sad things were in 2012 ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Homeland Security unveils new cybersecurity requirements for pipeline operators

Tech Republic Security

Owners and operators will have to identify any gaps in their security and report new incidents to key federal agencies because of the Colonial Pipeline ransomware attack.

article thumbnail

I hacked my friend’s website after a SIM swap attack

We Live Security

Here’s how easily your phone number could be stolen, why a successful SIM swap scam is only the beginning of your problems, and how you can avoid becoming a victim of the attack. The post I hacked my friend’s website after a SIM swap attack appeared first on WeLiveSecurity.

Hacking 144
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Scripps Health still grappling with impact of May 1 ransomware attack

Tech Republic Security

The hospital chain has been forced to reschedule operations and is working to bring its electronic health record systems back online.

article thumbnail

FBI: APT hackers breached US local govt by exploiting Fortinet bugs

Bleeping Computer

The Federal Bureau of Investigation (FBI) says the webserver of a US municipal government was breached by state-sponsored attackers after hacking a Fortinet appliance. [.].

More Trending

article thumbnail

FBI to share compromised passwords with Have I Been Pwned

Bleeping Computer

The FBI will soon begin to share compromised passwords with Have I Been Pwned's 'Password Pwned' service that were discovered during law enforcement investigations. [.].

Passwords 144
article thumbnail

Supreme Court To Decide Scope of Federal Hacking Law

Security Boulevard

For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on the use of computers, computer databases and data gleaned from computers. In the next few weeks, the U.S. Supreme Court will decide whether. The post Supreme Court To Decide Scope of Federal Hacking Law appeared first on Security Boulevard.

Hacking 138
article thumbnail

Japanese government agencies suffer data breaches after Fujitsu hack

Bleeping Computer

Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool. Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data. [.].

article thumbnail

Cryptocurrency scam attack on Twitter reminds users to check their app connections

The State of Security

Are you doing enough to prevent scammers from hijacking your social media accounts? Even if you have chosen a strong, unique password for your online presence and enabled two-factor authentication it's possible that you've overlooked another way in which online criminals could commandeer your social media accounts and spam out a message to your followers.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Klarna mobile app bug let users log into other customers' accounts

Bleeping Computer

Klarna Bank suffered a severe technical issue this morning that allowed mobile app users to log into other customers' accounts and see their stored information. [.].

Mobile 138
article thumbnail

How to achieve persistent SSH connections with the open source MOSH

Tech Republic Security

MOSH makes it possible for SSH connection to persist, even as you roam from one network to another. Jack Wallen shows you how to install and use this handy tool.

121
121
article thumbnail

M1RACLES, the unpatchable bug that impacts new Apple M1 chips

Security Affairs

A security expert has discovered a vulnerability in Apple M1 chips, dubbed M1RACLES, that cannot be fixed. Software engineer Hector Martin from Asahi Linux has discovered a vulnerability in the new Apple M1 chips, tracked as CVE-2021-30747, that was named M1RACLES. The expert pointed out that the issue can only be fixed with a redesign of the circuits, but the good news is that the severity of the vulnerability is very low and doesn’t pose a major security risk because there are other side

article thumbnail

Cyber Insurers Pull Back Amid Increase in Cyber Attacks, Costs

eSecurity Planet

The explosion of ransomware and similar cyber incidents along with rising associated costs is convincing a growing number of insurance companies to raise the premiums on their cyber insurance policies or reduce coverage, moves that could further squeeze organizations under siege from hackers. A report this month from the Government Accountability Office (GAO) found that the number of companies seeking cyber insurance coverage has steadily risen since 2016 and that insurers are increasing the pri

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How remote work forced the enterprise’s hand at cybersecurity

Security Boulevard

The last 18 months proved to be quite challenging for businesses both large and small. But if we spotlight enterprises, the drastic changes introduced due to remote workforces caused a paradigm shift in the way work is protected. . The post How remote work forced the enterprise’s hand at cybersecurity appeared first on Security Boulevard.

article thumbnail

Quick Heal announces SHA-1 deprecation for its products

Quick Heal Antivirus

What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses. The post Quick Heal announces SHA-1 deprecation for its products appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

article thumbnail

Three Things Holding Back Cloud Security

Security Boulevard

A recent PwC report found that a staggering 96% of executives are shifting their cybersecurity strategies due to COVID-19. While the majority of these changes are likely long overdue, the transition to the cloud isn’t a simple “lift and shift” of servers from on-premises to the cloud, but rather a complete rearchitecting of how applications.

article thumbnail

Google Chrome now 23% faster after JavaScript engine improvements

Bleeping Computer

Google says the latest Google Chrome release comes with a significant performance boost due to newly added improvements to the open-source V8 JavaScript and WebAssembly engine. [.].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

APT hacked a US municipal government via an unpatched Fortinet VPN

Security Affairs

The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an unpatched Fortinet VPN. The Federal Bureau of Investigation (FBI) reported that an APT group had breached the network of a local US municipal government by exploiting vulnerabilities in an unpatched Fortinet VPN. “The FBI is continuing to warn about Advanced Persistent Threat (APT) actors exploiting Fortinet vulnerabilities.

VPN 119
article thumbnail

Credential stuffing explained: How to prevent, detect, and defend against it

CSO Magazine

What is credential stuffing? Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts. Billions of login credentials have landed in the hands of hackers over the past several years as a result of data breaches. These credentials fuel the underground economy and are used for everything from spam to phishing and account takeovers.

CSO 119
article thumbnail

NASA identified 1,785 cyber incidents in 2020

Security Affairs

NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office of Inspector General. The U.S. National Aeronautics and Space Administration (NASA) has identified more than 6,000 cyber-related incidents in the last four years, according to a report published by NASA’s Office of Inspector General.

article thumbnail

Fujitsu SaaS Hack Sends Govt. of Japan Scrambling

Threatpost

Tech giant disables ProjectWEB cloud-based collaboration platform after threat actors gained access and nabbed files belonging to several state entities.

Hacking 127
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

US announces new security directive after critical pipeline hack

Bleeping Computer

The US Department of Homeland Security (DHS) has announced new pipeline cybersecurity requirements after the largest fuel pipeline in the United States was forced to shut down operations in early May following a ransomware attack. [.].

Hacking 116
article thumbnail

Malvertising Campaign On Google Distributed Trojanized AnyDesk Installer

The Hacker News

Cybersecurity researchers on Wednesday publicized the disruption of a "clever" malvertising network targeting AnyDesk that delivered a weaponized installer of the remote desktop software via rogue Google ads that appeared in the search engine results pages.

article thumbnail

HPE fixes critical zero-day vulnerability disclosed in December

Bleeping Computer

Hewlett Packard Enterprise (HPE) has released a security update to address a zero-day remote code execution vulnerability disclosed last year, in December. [.].

117
117
article thumbnail

Hackers Using Fake Foundations to Target Uyghur Minority in China

The Hacker News

The Uyghur community located in China and Pakistan has been the subject of an ongoing espionage campaign aiming to trick the targets into downloading a Windows backdoor to amass sensitive information from their systems.

115
115
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Hackers compromised Japanese government offices via Fujitsu ‘s ProjectWEB tool

Security Affairs

Threat actors have compromised offices of multiple Japanese agencies via Fujitsu ‘s ProjectWEB information sharing tool. Threat actors have breached the offices of multiple Japanese agencies after they have gained access to projects that uses the Fujitsu ‘s ProjectWEB information sharing tool. ProjectWEB is a software-as-a-service (SaaS) platform for enterprise collaboration and file-sharing that was provided by Fujitsu.

article thumbnail

4 Steps to a Cybersecurity Career

CompTIA on Cybersecurity

Did you know that businesses experience ransomware attacks once every 40 seconds? Do you have what it takes to defend against them? Follow these four steps to get a cybersecurity job and build your cybersecurity career.

article thumbnail

Canada Post hit by data breach after supplier ransomware attack

Bleeping Computer

Canada Post has informed 44 of its large commercial customers that a ransomware attack on a third-party service provider exposed shipping information for their customers. [.].

article thumbnail

Biden’s Cybersecurity Executive Order Puts Emphasis on the Wrong Issues

Threatpost

David Wolpoff, CTO at Randori, argues that the call for rapid cloud transition Is a dangerous proposition: "Mistakes will be made, creating opportunities for our adversaries.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.