Thu.Mar 03, 2022

article thumbnail

Details of an NSA Hacking Operation

Schneier on Security

Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to map it with Equation Group tools published by the Shadow Brokers (aka some Russian group). …the scope of victims exceeded 287 targets in 45 countries, including Russia, Japan, Spain, Germany, Italy, etc.

Hacking 233
article thumbnail

Anton’s Security Blog Quarterly Q1 2022

Anton on Security

Great old blog posts are sometimes hard to find (especially on Medium) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. Here is the next one. The posts below are ranked by lifetime views. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Log4Shell: Still out there, still dangerous, and how to protect your systems

Tech Republic Security

Barracuda researchers have noticed a steady stream of attacks attempting to exploit the Log4j vulnerability since it was found. What’s interesting is where most attacks originate. The post Log4Shell: Still out there, still dangerous, and how to protect your systems appeared first on TechRepublic.

138
138
article thumbnail

Monitoring Cyber Threats Tied to the Russia-Ukraine Conflict

Security Boulevard

Beyond the disturbing images of the invasion of Ukraine that began February 24 are the invisible cyberattacks that preceded it and continue to be waged on Ukraine by Russian state-sponsored and other threat actors, which also threaten the West. Vedere Labs, Forescout’s threat intelligence and research team, is closely monitoring the evolution of cyber activities […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How the Senate’s new cybersecurity legislation could affect your business

Tech Republic Security

A new piece of legislation could mean more transparent reporting of cyberattacks as well as increased security measures to keep organizations safe. The post How the Senate’s new cybersecurity legislation could affect your business appeared first on TechRepublic.

article thumbnail

Cyber Attack on Bridgestone leads to shut down of facilities in North America

CyberSecurity Insiders

Bridgestone America, a company that has its headquarters in Japan, was hit by a cyber attack recently leading to shut down of its tyre manufacturing facilities operating in Illinois, Iowa, North Carolina, South Carolina and Tennessee, along with a facility from Canada. Highly placed sources state that the company was hit by the incident on Sunday and since then no worker was being allowed into the facility as the management has seized all operations for forensic investigation.

More Trending

article thumbnail

Are Privacy Spreadsheets Enough to Stay Compliant?

TrustArc

Your Privacy Spreadsheets Might be Putting Your Organization at Risk Years ago, it was possible to manage a privacy program using spreadsheets. However, with the massive increase in data collection and new privacy regulations, those privacy spreadsheets are starting to add up. If you’ve been around privacy for a while, you know the drill. A […].

article thumbnail

ISO 26262: The ISO Standard for Functional Safety

Security Boulevard

ISO 26262 is a standard for functional safety and automotive safety integrity level (ASIL). and an important measure for automakers and suppliers to stay on top of. In this post, you'll receive an overview of ISO 26262, steps you can take to comply with the standard, as well as the benefits of 26262. The post ISO 26262: The ISO Standard for Functional Safety appeared first on Security Boulevard.

104
104
article thumbnail

Don’t fall for the “Donate to help children in Ukraine” scam

Malwarebytes

Earlier this week, we spotted a Microsoft sign-in phish that appeared to be taking advantage of the Ukraine crisis in order to scam people. The email warned of unauthorized log in attempts to the recipient’s account, and the location of those attempts was listed as “Russia/Moscow” We probably won’t ever know whether this campaign is definitely inspired by current events, but one thing is for sure, the latest spam campaign we’ve seen recently is.

Scams 104
article thumbnail

Hackers targeting Multi Factor Authentication sophisticatedly

CyberSecurity Insiders

Cybersecurity researchers from Proofpoint have found that cyber crooks are easily see foxing users of Multifactor Authentication (MFA) these days by buying phishing kits that have the ability to bypass MFA. Technically, MFA Phishing Kits rely on transparent reverse proxy, such as the open source Squid Transparent Proxy Server. The tech is generally used to filter content or keep a tab on employee activities on corporate networks.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

XKCD ‘For The Sake Of Simplicity’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘For The Sake Of Simplicity’ appeared first on Security Boulevard.

98
article thumbnail

Russia Releases List of IPs, Domains Attacking Its Infrastructure with DDoS Attacks

The Hacker News

As the ongoing Russia-Ukraine conflict continues to escalate, the Russian government on Thursday released a massive list containing 17,576 IP addresses and 166 domains that it said are behind a series of distributed denial-of-service (DDoS) attacks aimed at its domestic infrastructure.

DDOS 99
article thumbnail

7 Steps to Mitigate Salesforce Supply Chain Risk

Security Boulevard

Your Salesforce development supply chain can either be an asset to your DevOps efforts or a liability. Data security was a major focus throughout the last year, and this trend will continue into 2022. Salesforce developers need to keep three factors in mind when managing risk: Toolchain: The SolarWinds breach brought into focus the risk. The post 7 Steps to Mitigate Salesforce Supply Chain Risk appeared first on Security Boulevard.

Risk 98
article thumbnail

Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online

The Hacker News

American chipmaking company NVIDIA on Tuesday confirmed that its network was breached as a result of a cyber attack, enabling the perpetrators to gain access to sensitive data, including source code purportedly associated with its Deep Learning Super Sampling (DLSS) technology.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Epic PsyOp—Ukrainians Leak 120,000 Russian Troops’ Info

Security Boulevard

Personal data on 120,000 of Putin’s invaders has been leaked—echoing an old Soviet psychological tactic: To traumatize the troops and their families back home. The post Epic PsyOp—Ukrainians Leak 120,000 Russian Troops’ Info appeared first on Security Boulevard.

article thumbnail

How to Bring the Power of No-Code Security Automation to Your Team in 2022

The Security Ledger

Seven in 10 SOC analysts say they are “burned out.” Six in 10 plan to leave their job “in the next year.” Tines CEO Eoin Hinchy says no-code automation may be a way to reduce the burnout and retain top talent. The post How to Bring the Power of No-Code Security Automation to Your Team in 2022 appeared first on The Security Ledger with. Read the whole entry. » Related Stories Why Security Practitioners Are Unhappy With Their Current SIEM State of Modern Application Security: 6 Key Takeaways

article thumbnail

New Security Vulnerability Affects Thousands of GitLab Instances

The Hacker News

Researchers have disclosed details of a now-patched security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to recover user-related information. Tracked as CVE-2021-4191 (CVSS score: 5.3), the medium-severity flaw affects all versions of GitLab Community Edition and Enterprise Edition starting from 13.

article thumbnail

Channel Partners Evolve to Enable Hybrid Work and Combat Rising Cyberattacks

Security Boulevard

As the industry looks toward 2022, it must also acknowledge the recent turbulent past. Through two unprecedented years of a pandemic and record breaking cyberattacks, Channel Partners across the globe have provided network security solutions to small and midsize businesses (SMBs) in a variety of industries. And throughout 2021, they continued to face challenges in […].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Free decryptor released for HermeticRansom victims in Ukraine

Bleeping Computer

Avast Threat Labs has released a decryptor for the HermeticRansom ransomware strain used predominately in targeted attacks against Ukrainian systems in the past ten days. [.].

article thumbnail

Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams

Security Boulevard

If you haven't yet received phishing emails pretending to be from Amazon, you will soon. Luckily, there are a few steps that can help protect your account and data. The post Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams appeared first on Cyphere | Securing Your Cyber Sphere. The post Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams appeared first on Security Boulevard.

Scams 98
article thumbnail

NY OAG warns T-Mobile data breach victims of identity theft risks

Bleeping Computer

The New York State Office of the Attorney General (NY OAG) warned victims of the August 2021 T-Mobile data breach that they faced identity theft risks after some of the stolen information ended up for sale on the dark web. [.].

article thumbnail

Introducing improved risk detail display and management workflows

Security Boulevard

Today we’re introducing improved risk details display and workflows in BluBracket Code Security. Our early testers have described these as a huge improvement in their ability to quickly and efficiently review and act on risks. We developed these improvements in collaboration with our design partners, with feedback from our enterprise customers representing over $100 billion […].

Risk 98
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption

The Hacker News

A group of academics from the North Carolina State University and Dokuz Eylul University have demonstrated what they say is the "first side-channel attack" on homomorphic encryption that could be exploited to leak data as the encryption process is underway.

article thumbnail

Preparing for Heightened Attacks in the Current Geopolitical Environment

Security Boulevard

The current geopolitical environment has raised many concerns about security postures and readiness to respond to a cyberattack. Today, Imperva customers are protected by our world-class network, application, and data security products. Alongside that, Imperva Threat Research is closely monitoring the attack landscape for new emerging threats, vulnerabilities, attacks, and incidents.

98
article thumbnail

Why smart buildings need clever cybersecurity

BH Consulting

Smart technologies that manage and self-regulate the built environment and its operations help businesses to enhance occupants’ convenience, reduce costs, and drive sustainability. As we’ll explore in this blog, it’s essential that cybersecurity isn’t just a coat of paint on top but is part of the design and embedded into the foundations. There are lots of sound business reasons why an organisation would want to use more operational technology (OT) around its buildings.

article thumbnail

Anton’s Security Blog Quarterly Q1 2022

Security Boulevard

Great old blog posts are sometimes hard to find (especially on Medium) , so I decided to do a periodic list blog with my favorite posts of the past quarter or so. Here is the next one. The posts below are ranked by lifetime views. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ).

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Countries Assisting Ukraine Refugees Targeted in Phishing Cyberattacks

Heimadal Security

European government personnel involved in helping Ukraine refugees with logistics support has been the target of a spear-phishing campaign, a new report underlines. Spear-Phishing Campaign Against Countries Helping Ukraine Refugees A recent analysis belonging to Proofpoint researchers unveils a spear-phishing campaign where threat actors make use of email accounts that are “possibly compromised” belonging to […].

article thumbnail

Insider Risk vs. Insider Threat—What Makes One and Not the Other?

Security Boulevard

Last month we published our 2022 Insider Risk Report and took care to explain the ‘very’ real differences between Insider Risk and Insider Threat. Why? Because 2021 was a game-changer for enterprise cyber security and the rules will never be the same again. It was the year ‘insider risk’ went from a nice to have … Continued. The post Insider Risk vs.

Risk 98
article thumbnail

U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security

The Hacker News

The U.S. Senate unanimously passed the "Strengthening American Cybersecurity Act" on Tuesday in an attempt to bolster the cybersecurity of critical infrastructure owners in the country. The new bipartisan legislation, among other things, stipulates entities that experience a cyber incident to report the attacks within 72 hours to the U.S.

article thumbnail

reCAPTCHA Pricing Has Changed. What Are Your Alternatives?

Security Boulevard

Google’s web security service, reCAPTCHA, has been a staple of the internet for many years. Nearly everyone who has ever gone to any website has had to click on images of crosswalks or lampposts or check an “I’m not a robot” box. One reason for reCAPTCHA’s initial widespread use was that it was free; any […]. The post reCAPTCHA Pricing Has Changed.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.