Fri.Feb 18, 2022

article thumbnail

Cyberattack threat: Corporate users infected via Microsoft Teams

Tech Republic Security

Corporate users are more aware of phishing attacks in their mailboxes. Yet they are not used to being targeted via other systems like Microsoft Teams. Learn how to protect yourself. The post Cyberattack threat: Corporate users infected via Microsoft Teams appeared first on TechRepublic.

Phishing 217
article thumbnail

Poor Offboarding Leaves Organizations Open to Threats

Security Boulevard

A lot of talk these days centers around companies leaving money on the table by not maximizing cost savings, but more egregious in today’s risk-filled environment is leaving security on the table. That’s just what organizations are doing by not properly offboarding former employees; giving them plenty of opportunities to breach defenses and conduct malicious.

Risk 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber threat intelligence is a great way for a company to improve its security

Tech Republic Security

Get to know the ins and outs of cyber threat intelligence and how your company's security can be can be strengthened by putting threat intelligence into place. The post Cyber threat intelligence is a great way for a company to improve its security appeared first on TechRepublic.

article thumbnail

Why IT Admins are Joining the Security Team

Security Boulevard

Today’s decentralized, global workplace has broadened IT’s role within the enterprise. The role of the IT admin now includes direct responsibility for bolstering a company’s security posture. IT admins have become a core part of the security organization, with 34% of Fortune 500 companies rolling the IT department into the CISO’s purview in 2021. In startups.

CISO 131
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to add notes to iCloud passwords in macOS 12.3 and iOS 15.4

Tech Republic Security

Learn how to securely store notes along with your account credentials with iCloud Keychain and sync them to all of your Apple devices. The post How to add notes to iCloud passwords in macOS 12.3 and iOS 15.4 appeared first on TechRepublic.

Passwords 155
article thumbnail

Revenue for Cybersecurity firms in UK increased by 14 percent

CyberSecurity Insiders

Cybersecurity firms in UK have witnessed an increase in revenue by 14% says a survey that involved respondents from the tech sector of Britain. And stats are in that the year 2021 witnessed a 14% increase in the annual revenue earned by the security firms operating in and around United Kingdom taking the tally to £10 Billion. The Department for Digital, Culture, Media & Sport (DCMS) report released recently for the cyber security says the year 2018 witnessed revenue generation of £4 billion

More Trending

article thumbnail

WordPress force installs UpdraftPlus patch on 3 million sites

Bleeping Computer

WordPress has taken the rare step of force-updating the UpdraftPlus plugin on all sites to fix a high-severity vulnerability allowing website subscribers to download the latest database backups, which often contain credentials and PII. [.].

Backups 120
article thumbnail

How to generate secure passwords for your accounts

Tech Republic Security

A password generator can help when you need a strong and complex password to protect an account. The post How to generate secure passwords for your accounts appeared first on TechRepublic.

Passwords 141
article thumbnail

Security asset management should be buttoned down. It isn’t.

CSO Magazine

I’ve been writing recently about security hygiene and posture management. In January, I declared that security hygiene and posture management would become a priority in 2022. Earlier this month, I wrote about attack surface management challenges. Why focus on security hygiene and posture management? Because every IT widget represents a potential entry point for cyber-adversaries.

article thumbnail

Wicked Good Development – Episode 2

Security Boulevard

Wicked Good Development is dedicated to the future of open source. This space is to learn about the latest in the developer community and talk shop with open source software innovators and experts in the industry. The post Wicked Good Development – Episode 2 appeared first on Security Boulevard.

Software 117
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Iranian hackers target VMware Horizon servers with Log4j exploits

Bleeping Computer

An Iranian-aligned hacking group tracked as TunnelVision was spotted exploiting Log4j on VMware Horizon servers to breach corporate networks in the Middle East and the United States. [.].

Hacking 116
article thumbnail

CVE-2021-44731 Linux privilege escalation bug affects Canonical’s Snap Package Manager

Security Affairs

Qualys experts found a new Linux privilege escalation vulnerability, tracked as CVE-2021-44731, in Canonical’s Snap Package Manager. Canonical’s Snap software packaging and deployment system are affected by multiple vulnerabilities, including a privilege escalation flaw tracked as CVE-2021-44731 (CVSS score 7.8). Snap is a software packaging and deployment system developed by Canonical for operating systems that use the Linux kernel.

Software 110
article thumbnail

Dangerous privilege escalation bugs found in Linux package manager Snap

CSO Magazine

Researchers found an easy-to-exploit vulnerability in Snap, a universal application packaging and distribution system developed for Ubuntu but available on multiple Linux distributions. The flaw allows a low-privileged user to execute malicious code as root, the highest administrative account on Linux. The vulnerability, tracked as CVE-2021-44731, is part of a series of flaws that researchers from security firm Qualys found in various Linux components while investigating the security of Snap.

article thumbnail

Do We Need a Chief Identity Officer?

Security Boulevard

Do we need a "Chief Identity Officer"? What might drive the need for this and can existing business operating models satisfy the need for identity centric metrics? The post Do We Need a Chief Identity Officer? appeared first on The Cyber Hut. The post Do We Need a Chief Identity Officer? appeared first on Security Boulevard.

109
109
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Network Security Automation using Cisco Secure Firewall and Hashicorp’s Consul

Cisco Security

More and more organizations today are moving towards dynamic infrastructure deployments in cloud environments or using microservices. In such environments, instances and services are created and decommissioned as per need and that can be very frequent. Keeping track of updates to such components in a fast-changing environment is becoming a challenge for SecOps teams and an agile, scalable, automated solution has become a vital requirement.

Firewall 107
article thumbnail

Put your trust in the stack

Security Boulevard

Breaches, infiltration, exfiltration, compromised privileges, and interrupted access to critical systems are all parts of a well-written espionage movie, or. The post Put your trust in the stack appeared first on Entrust Blog. The post Put your trust in the stack appeared first on Security Boulevard.

article thumbnail

Russia steals information from US Defense Contractors

CyberSecurity Insiders

A high alert raised by FBI, NSA and CISA on a joint note says that some government backed hackers are busy stealing confidential information from defense contractors and the campaign to steal intelligence is going from January 2020. Surprisingly, the stolen information also includes details about weaponry, sophistication in missile development, Warcraft designs, logistics, data analytics received from simulation centers, and also details related to the new communication infrastructure and inform

article thumbnail

Cybersecurity News Round-Up: Week of February 14, 2022

Security Boulevard

An FBI warning about BEC attacks, Russian-backed hackers have been targeting and compromising U.S.-cleared defense contractors for two years, hackers strike Europe's largest car dealer, and phishing attacks impersonating emails from LinkedIn have grown 232% since February 1. The post Cybersecurity News Round-Up: Week of February 14, 2022 appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Iran-linked TunnelVision APT is actively exploiting the Log4j vulnerability

Security Affairs

Iran-linked TunnelVision APT group is actively exploiting the Log4j vulnerability to deploy ransomware on unpatched VMware Horizon servers. Researchers from SentinelOne have observed the potentially destructive Iran-linked APT group TunnelVision is actively exploiting the Log4j vulnerability to deploy ransomware on unpatched VMware Horizon servers. TunnelVision’s TTPs overlap with the ones associated with Iran-linked nation-state actors Phosphorus , Charming Kitten and Nemesis Kitten.

article thumbnail

When everything is urgent, use the value exchange to find the true priority

Security Boulevard

We exchange value every day without thinking about it. The key to unlocking the power of the value exchange is understanding the value of your time and engaging with intention. For many, value is elusive and they use it as an excuse to avoid exploring if they are giving or receiving value. At the core, […]. The post When everything is urgent, use the value exchange to find the true priority appeared first on Security Boulevard.

109
109
article thumbnail

Conti ransomware gang takes over TrickBot malware operation

Bleeping Computer

After four years of activity and numerous takedown attempts, the death knell of TrickBot has sounded as its top members move under new management, the Conti ransomware syndicate, who plan to replace it with the stealthier BazarBackdoor malware. [.].

Malware 103
article thumbnail

Avast Anti-Phishing Products Outperform Others | Avast

Security Boulevard

Avast One Essential and Avast Free Antivirus both achieved the top spot in a phishing detection comparison test. Avast One Essential is our comprehensive protection service that includes antivirus, VPN, data breach monitoring, and device cleanup tools that help users stay private and safe. To make sure we’re offering the best protection on the market, we asked independent third-party AV-Comparatives to conduct an impartial test pitting our anti-phishing security against the other leading brands.

Phishing 104
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Warning: Popular e-cigarette store hacked to steal credit cards

Bleeping Computer

BleepingComputer has confirmed Element Vape, a prominent online seller of e-cigarettes and vaping kits is serving a credit card skimmer on its live site, likely after getting hacked. Element Vape has a presence across the U.S. and Canada and sells products in both retail outlets and on their online store. [.].

Hacking 99
article thumbnail

Lisa Plaggemier Discusses Cybersecurity at the Winter Olympics

Security Boulevard

TechSpective Podcast Episode 085 The Winter Olympics are taking place right now in Beijing, China. It puts the teams and athletes in a sensitive and precarious situation because China is an economic and geopolitical adversary to most of the participating nations, and expectations are high that China will do everything it can to intercept communications [.].

article thumbnail

Google Drive flags macOS '.DS_Store' files for copyright violation

Bleeping Computer

Google Drive was seen flagging '.DS_Store' files generated by macOS file systems as a violation of its copyright infringement policy. '.DS_Store' is a metadata file commonly seen by Apple users when they transfer their folders and archives from a macOS to a non-Apple operating system, like Windows. [.].

article thumbnail

XKCD ‘Data Trap’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Data Trap’ appeared first on Security Boulevard.

108
108
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Hackers targeting aviation industry with sophisticated malware from years

CyberSecurity Insiders

According to a research conducted by Proofpoint, cybersecurity researchers have been targeting the servers operating in aerospace and defense sector with a Trojan malware and the hacking group behind the incident has been dubbed as TA2541. Interestingly, the malware campaign has been active since 2017 and compromised over 1100 organizations operating across North America, Europe and the Middle East.

Malware 98
article thumbnail

Stop vaping: Major e-cigarette store hacked to steal credit cards

Bleeping Computer

BleepingComputer has confirmed Element Vape, a prominent online seller of e-cigarettes and vaping kits is serving a credit card skimmer on its live site, likely after getting hacked. Element Vape has a presence across the U.S. and Canada and sells products in both retail outlets and on their online store. [.].

Hacking 98
article thumbnail

How to Create a Digital Workplace Governance Program

Security Boulevard

In a recent discussion with a client concerning a digital workplace initiative, they related that some of the data they were migrating to SharePoint Online hadn’t been edited since the early 1990s. I wrote this off as a fluke until another client recounted the same story just a few weeks later. No one who collaborated. The post How to Create a Digital Workplace Governance Program appeared first on Security Boulevard.

article thumbnail

New Golang botnet empties Windows users’ cryptocurrency wallets

Bleeping Computer

A new Golang-based botnet under active development has been ensnaring hundreds of Windows devices each time its operators deploy a new command and control (C2) server. [.].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.