Thu.Dec 22, 2022

article thumbnail

Critical Microsoft Code-Execution Vulnerability

Schneier on Security

A critical code-execution vulnerability in Microsoft Windows was patched in September. It seems that researchers just realized how serious it was (and is): Like EternalBlue, CVE-2022-37958, as the latest vulnerability is tracked, allows attackers to execute malicious code with no authentication required. Also, like EternalBlue, it’s wormable, meaning that a single exploit can trigger a chain reaction of self-replicating follow-on exploits on other vulnerable systems.

article thumbnail

Study to ace five cybersecurity certification exams

Tech Republic Security

Dive into CompTIA, NIST, CISSP and more with the online training offered in The 2022 Ultimate Advanced CyberSecurity Professional Certification Bundle. The post Study to ace five cybersecurity certification exams appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lastpass: Hackers stole customer vault data in cloud storage breach

Bleeping Computer

LastPass revealed today that attackers stole customer vault data after breaching its cloud storage earlier this year using information stolen during an August 2022 incident. [.].

145
145
article thumbnail

Cisco Talos report: Threat actors use known Excel vulnerability

Tech Republic Security

The use of.XLL Excel files by threat actors to infect computers with malware is growing fast. Learn more about this relatively new technique and how to protect from it. The post Cisco Talos report: Threat actors use known Excel vulnerability appeared first on TechRepublic.

Malware 167
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Vice Society ransomware gang is using a custom locker

Security Affairs

The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions. SentinelOne researchers discovered that the Vice Society ransomware gang has started using a custom ransomware that implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms. Vice Society ransomware has been active since June 2021, it is considered by researchers a spin-off of the HelloKitty ransomware , the malware targets both Windows and L

article thumbnail

The top cyber security stories of 2022

Security Boulevard

A look in the rearview can tell you a lot about the future, so we revisited the top cyber security stories of 2022 with experts in the field. The post The top cyber security stories of 2022 appeared first on Security Boulevard.

Internet 138

LifeWorks

More Trending

article thumbnail

Brave launches FrodoPIR, a privacy-focused database query system

Bleeping Computer

Brave Software developers have created a new privacy-centric database query system called FrodoPIR that retrieves data from servers without disclosing the content of user queries. [.].

Software 134
article thumbnail

Ransomware and wiper signed with stolen certificates

SecureList

Introduction. On July 17, 2022, Albanian news outlets reported a massive cyberattack that affected Albanian government e-services. A few weeks later, it was revealed that the cyberattacks were part of a coordinated effort likely intended to cripple the country’s computer systems. On September 10, 2022, Albanian local news reported a second wave of cyberattacks targeting Albania’s TIMS, ADAM and MEMEX systems – the latter two systems critical for law enforcement – reportedly using the

article thumbnail

A new Zerobot variant spreads by exploiting Apache flaws

Security Affairs

Microsoft spotted an upgraded variant of the Zerobot botnet that spreads by exploiting Apache vulnerabilities. Microsoft Threat Intelligence Center (MSTIC) researchers discovered a new variant of the Zerobot botnet (aka ZeroStresser) that was improved with the capabilities to target more Internet of Things (IoT) devices. The IT giant is tracking this cluster of threat activity as DEV-1061.

IoT 128
article thumbnail

Report Surfaces Top Vulnerabilities of 2022

Security Boulevard

Rezilion, a vulnerability management platform provider, shared a list of the top vulnerabilities discovered in 2022. The report suggested that organizations should address these before the start of the New Year if they have not already done so. Those vulnerabilities include: Pwnkit–CVE-2021-4034, a privilege escalation vulnerability in the pkexec file of the Linux Policykit package.

Malware 124
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Nation-state Hacking – What You Need to Know

Heimadal Security

Nation-state actors operate at a higher level than regular cybercriminals, posing critical challenges to cybersecurity. Today we’ll explore their common modus operandi, targets, and motivations, as well as what prevention strategies the business sector can apply against nation-state hacking. What Is Nation-state Hacking? Methodically planned and executed, nation-state cyberattacks are usually carried out by state-sponsored […].

Hacking 119
article thumbnail

Protecting a Network Without Concrete Boundaries

Security Boulevard

Communication service providers (CSPs) are required to invest more time, money and resources in security to build “digital trust” with their customers, especially as the openness of 5G environments and complexity of 5G services continue to grow. Further, we are seeing an increasing move away from bounded, self-contained networks to multi-cloud environments that lack a.

article thumbnail

DuckDuckGo now blocks Google sign-in pop-ups on all sites

Bleeping Computer

DuckDuckGo apps and extensions are now blocking Google Sign-in pop-ups on all its apps and browser extensions, removing what it perceives as an annoyance and a privacy risk for its users. [.].

Risk 110
article thumbnail

Defense in Depth: Everything to Know About the Cybersecurity Model

Security Boulevard

Defense in depth is a cybersecurity strategy that utilizes multiple layers of security for holistic protection. Learn about its benefits, key layers and more. The post Defense in Depth: Everything to Know About the Cybersecurity Model appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

New Brand of Security Threats Surface in the Cloud

Dark Reading

Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.

110
110
article thumbnail

How to share what you’ve learned from our audits

Security Boulevard

By Nick Selby Trail of Bits recently completed a security review of cURL, which is an amazing and ubiquitous tool for transferring data. We were really thrilled to see cURL founder and lead developer Daniel Stenberg write a blog post about the engagement and the report, and wanted to highlight some important things he pointed […]. The post How to share what you’ve learned from our audits appeared first on Security Boulevard.

110
110
article thumbnail

FIN7 hackers create auto-attack platform to breach Exchange servers

Bleeping Computer

The notorious FIN7 hacking group uses an auto-attack system that exploits Microsoft Exchange and SQL injection vulnerabilities to breach corporate networks, steal data, and select targets for ransomware attacks based on financial size. [.].

article thumbnail

How Marvel’s Avengers inspire Pinsent Masons CISO to adapt cybersecurity hiring

CSO Magazine

Cybersecurity’s ongoing battle with a “skills shortage” has seen the sector lose its way regarding talent hiring and retention, says Christian Toon, CISO at London-based law firm Pinsent Masons. In an industry crying out for diversity and innovation, this year’s number one UK CSO 30 Awards winner says he takes inspiration from the Marvel Comics universe to challenge traditional HR approaches and more effectively recruit and keep security talent.

CISO 107
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Don’t click too quick! FBI warns of malicious search engine ads

Graham Cluley

The FBI is warning US consumers that cybercriminals are placing ads in search engine results that impersonate well-known brands, in an attempt to spread ransomware and steal financial information. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Threat Modeling in the Age of OpenAI's Chatbot

Dark Reading

New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting work.

106
106
article thumbnail

The Week in Security: Okta says source code stolen. Also: SentinelSneak: PyPi moduel poses as security SDK

Security Boulevard

Welcome to the latest edition of The Week in Security, which brings you the latest headlines across the full stack of security: application security; cybersecurity; and beyond. This week: Okta is hit with a supply chain attack incident involving its private GitHub repositories. Also: ReversingLabs researchers discover a malicious PyPI package posing as a SentinelOne SDK client. .

article thumbnail

Black Hat Europe 2022 NOC: The SOC Inside the NOC

Cisco Security

Our core mission in the NOC is network resilience. We also provide integrated security, visibility and automation, a SOC inside the NOC. In part one , we covered: Designing the Black Hat Network, by Evan Basta. AP Placement Planning, by Sandro Fasser. Wi-Fi Air Marshal, by Jérémy Couture, Head of SOC, Paris 2024 Olympic Games. Meraki Dashboards, by Rossi Rosario Burgos.

DNS 104
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Okta’s GitHub Breach: Insights and Recommendations

Security Boulevard

As recently reported, Okta recently experienced a security breach where the source code for its workforce identity cloud was stolen. As Silverfort partners with Okta, to protect our joint customers’ workforce identities we want to share with you our insights regarding this attack and subsequent precautionary steps organizations should take to strengthen their protection from.

104
104
article thumbnail

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

Trend Micro

We analyze the latest changes in IcedID botnet from a campaign that abuses Google pay per click (PPC) ads to distribute IcedID via malvertising attacks.

Malware 104
article thumbnail

Mike Fong on Chambers Talks

Security Boulevard

Privoro founder and CEO Mike Fong recently participated in a cybersecurity-focused discussion with fellow CEOs Vijay Balasubramaniyan (Pindrop) and Bipul Sinha (Rubrik), hosted by John Chambers of JC2 Ventures. You can listen to this episode of the Chambers Talks podcast through the link below. The post Mike Fong on Chambers Talks appeared first on Security Boulevard.

article thumbnail

Comcast Xfinity accounts hacked in widespread 2FA bypass attacks

Bleeping Computer

​Comcast Xfinity customers report their accounts being hacked in widespread attacks that bypass two-factor authentication. These compromised accounts are then used to reset passwords for other services, such as the Coinbase and Gemini crypto exchanges. [.].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

The Hacker News

The August 2022 security breach of LastPass may have been more severe than previously disclosed by the company. The popular password management service on Thursday revealed that malicious actors obtained a trove of personal information belonging to its customers that include their encrypted password vaults by using data siphoned from the earlier break-in.

Passwords 101
article thumbnail

What Is Flipper Zero? The Hacker Tool Going Viral on TikTok, Explained

WIRED Threat Level

Don’t be fooled by its fun name and Tamagotchi-like interface—this do-everything gadget is trouble waiting to happen and a whole lot more.

Hacking 99
article thumbnail

France Fines Microsoft €60 Million for Using Advertising Cookies Without User Consent

The Hacker News

France's privacy watchdog has imposed a €60 million ($63.88 million) fine against Microsoft's Ireland subsidiary for dropping advertising cookies in users' computers without their explicit consent in violation of data protection laws in the European Union.

article thumbnail

Threat Actors Use Search Engine Ads for Ransomware and Phishing Attacks

Heimadal Security

Threat actors use search engines to advertise websites that spread ransomware or steal login credentials. The ads for various impersonated businesses and services appear at the top of search results and guide the victim to websites that spoof almost perfectly the real ones. The announcement was made by the FBI, which warns that: When a […]. The post Threat Actors Use Search Engine Ads for Ransomware and Phishing Attacks appeared first on Heimdal Security Blog.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!