Wed.Aug 11, 2021

article thumbnail

Cobolt Strike Vulnerability Affects Botnet Servers

Schneier on Security

Cobolt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to automate their own attacks. Researchers have found a vulnerability in the product. The main components of the security tool are the Cobalt Strike client — also known as a Beacon — and the Cobalt Strike team server, which sends commands to infected computers and receives the data they exfiltrate.

article thumbnail

Fake COVID vaccine card sales ramp up on Dark Web

Tech Republic Security

Even as the delta variant spreads, many people would rather pay money for a phony vaccine card than get the actual shot for free, according to Check Point Research.

197
197
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Only 5% of total info stored across the world is secure

CyberSecurity Insiders

Yes, what you’ve ready is absolutely right! Only 5 percent of the total data and virtual files stored across the world are secure and so the Cybersecurity business is said to reach a valuation of $170.3 billion to 2023. A survey conducted by Gartner in 2019 said that 88% of companies operating worldwide were hit by a cyber attack and out of those, 51% of them experienced the incident for password steal.

article thumbnail

Top 5 ransomware operators by income

Tech Republic Security

Tom Merritt lists the most lucrative ransomware gangs and why they're dangerous.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Is GDPR Making Ransomware Worse?

Security Boulevard

As a landmark piece of legislation, the General Data Protection Regulation (GDPR) was undoubtedly created with the safety and privacy of European consumers’ personal data in mind. However, while certainly designed with good intentions, the GDPR, which applies to every organization that deals with EU citizens’ data, could be hurting consumers in another way.

article thumbnail

Over $600m cryptocurrency stolen in Cyber Attack

CyberSecurity Insiders

Hackers have stolen more than $600m cryptocurrency through a vulnerability in the systems of Blockchain site Poly Network. And as per a tweet released by the company, the hackers are ready to negotiate and release the stolen currency, if they are offered something lucrative. Poly Network offers an interoperability protocol that helps connect different blockchain networks.

More Trending

article thumbnail

Norton acquires Avast for $8 billion

CyberSecurity Insiders

In what could be the highest acquisition bid for this year, in the field of Cybersecurity, US firm Norton has acquired Czech republic-based Cybersecurity firm Avast for $8 billion. Trade analysts state that the deal was propelled as the demand for the security software has surged because of the COVID-19 pandemic induced online activity. As per the sources reporting to cybersecurity insiders, the deal that took place was for 6.7 Billion Euros and will adhere to the vision of Norton to protect and

article thumbnail

Thief pulls off colossal, $600m crypto-robbery …and gives the money back

Malwarebytes

The largest crypto-robbery in history is rapidly turning into the most bizarre as well. Let’s start at the beginning… In an apparent scream for mercy, 21 hours ago the Poly Network Team reached out via Twitter to “hacker(s)” that had managed to transfer roughly $600 million in digital tokens out of its control and into separate cryptocurrency wallets.

article thumbnail

LockBit ransomware attack on Accenture

CyberSecurity Insiders

Accenture that offers professional services was reportedly hit by a ransomware attack launched by LockBit group. And reports are in that none of the servers were hit by the malware as proactive cybersecurity measures taken by the company paid well. What’s interesting about this incident is that the victim company has denied any damage, while those who launched the attack state that they have stolen a portion of data from the servers and will sell it on the dark web, if their ransom related deman

article thumbnail

Wave of native IIS malware hits Windows servers

CSO Magazine

Security researchers warn that multiple groups are compromising Windows web servers and are deploying malware programs that are designed to function as extensions for Internet Information Services (IIS). Such malware was deployed this year by hackers exploiting Microsoft Exchange zero-day vulnerabilities , but a total of 14 groups have been observed using native IIS backdoors and information stealers in recent years. [ How well do you know these 9 types of malware and how to recognize them. | Si

Malware 135
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How a CISO Values CCSP Training and Certification

CyberSecurity Insiders

Chief Information Security Officer (CISO) Luis Gonsalves, Head of Security for Portugal’s central bank, and founder of the Cloud Security Alliance’s Portugal Chapter, says Certified Cloud Security Professional (CCSP) stands out from other technical certifications. With CCSP, cybersecurity experts gain a strategic understanding of cloud governance, risk and data privacy.

CISO 140
article thumbnail

Recapping Cisco Secure at Black Hat USA 2021

Cisco Security

There is always excitement in the air throughout the Security community at this time of year; usually we excitedly approach “Hacker Summer Camp.” This year, like last, was a little different from what we have become used to over the last 24 years. Cisco Security was honored to be a sponsor of the 24th Black Hat USA 2021 Conference – the internationally recognized cybersecurity event series providing the security community with the latest cutting-edge research, developments and traini

Backups 132
article thumbnail

Microsoft confirms another Windows print spooler zero-day bug

Bleeping Computer

Microsoft has issued an advisory for another zero-day Windows print spooler vulnerability tracked as CVE-2021-36958 that allows local attackers to gain SYSTEM privileges on a computer. [.].

131
131
article thumbnail

7 out of 10 Indians Have Encountered Tech-Support Scams in Past 12 Months

Quick Heal Antivirus

Microsoft today released findings of its 2021 Global Tech Support Scam Research report that looks at tech support. The post 7 out of 10 Indians Have Encountered Tech-Support Scams in Past 12 Months appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Scams 131
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

AIOps for Cloud-Scale SASE

Security Boulevard

As the world shifts from a centralized application consumption model to a decentralized cloud-first model, where a large and growing number of employees are working from home or working from anywhere, enterprise IT operations and security strategies must evolve as well. Secure access service edge (SASE) has emerged as a key platform for distributed, cloud-first.

article thumbnail

6 vulnerabilities Microsoft hasn't patched (or can't)

CSO Magazine

You are fully patched. You are fully secure, right? Well, not so fast. Several Microsoft issues may or may not receive a patch. Some are configuration issues that cannot be patched. On GitHub, Christoph Falta started the “won’t fix” list of security issues that Microsoft has either not yet patched, won’t patch, or are issues that need manual adjustment to fix.

CSO 128
article thumbnail

Threat Protection: The REvil Ransomware

Cisco Security

The REvil ransomware family has been in the news due to its involvement in high-profile incidents, such as the JBS cyberattack and the Kaseya supply chain attack. Yet this threat carries a much more storied history , with varying functionality from one campaign to the next. The threat actors behind REvil attacks operate under a ransomware-as-a-service model.

article thumbnail

5 best practices for designing application logs

CSO Magazine

Veronica Schmitt started to wear an implantable cardiac device when she was 19. A few years ago, although the small defibrillator appeared to be working properly, she felt sick. "I kept passing out, and I went to a hospital, and once they had to resuscitate me," she says. "That was not supposed to happen." Her doctor pulled out the data the device was logging and said that everything was alright.

CSO 127
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ransomware operators by income: Top 5

Tech Republic Security

Ransomware gangs continue because they make a lot of money. Tom Merritt talks about the five most lucrative ones.

article thumbnail

Obsolete computers in UK are failing to meet basic cybersecurity measures

CyberSecurity Insiders

In what could be a concerning issue, a recent survey has confirmed that the usage of outdated systems in UK is fetching a loss of £2.3 billion to the country’s economy as government departments are found spending huge in keeping the legacy systems alive. Also, the survey confirms that the legacy software used in various government departments is not in a position to meet the annual cybersecurity standards that could spell a doom, if it is linked to the critical infrastructure like power plants o

article thumbnail

Use 2FA to secure your WordPress login

Tech Republic Security

Jack Wallen shows you how to keep your Wordpress account safe with two-factor authentication.

article thumbnail

Crytek Data Breach: the Company Confirmed Its Data Being Leaked

Heimadal Security

News that Egregor ransomware impacted Crytek enterprise back in October 2020 has been confirmed by the enterprise itself. The company started to notify the affected clients. The threat actors succeeded in getting access to the game developer’s network, the consequences being data theft and system encryption. Who Is Crytek? The origins of Crytek are German-based, […].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

If a QR code leads you to a Bitcoin ATM at a gas station, it’s a scam

Malwarebytes

Rogue QR code antics have been back in the news recently. They’re not exactly a mainstay of fakery, but they do tend to enjoy small waves of popularity as events shaped by the real world remind everyone they still exist. The most notable example where this is concerned is of course the pandemic. With the spread of Covid-19, people and organisations naturally wanted to move away from physical contact.

Scams 112
article thumbnail

Accenture Confirms LockBit Ransomware Attack

Threatpost

LockBit offered Accenture's purported databases and made a requisite jab at its purportedly sad security. Accenture says it recovered just fine from backups.

Backups 116
article thumbnail

Adobe fixes critical flaws in Magento, patch it immediately

Security Affairs

Adobe security updates for August 2021 have addressed critical vulnerabilities in Magento and important bugs in Adobe Connect. Adobe security updates for August 2021 address a total of 29 flaws, including critical vulnerabilities in Magento and important issues in Adobe Connect: APSB21-64 Security?updates available?for Magento APSB21-66 Security update available for Adobe Connect.

article thumbnail

About Synology NAS Servers & Brute Force Attacks – “My Story of How I’ve Almost Got Hacked”

Heimadal Security

It’s certainly no joke that literally anyone can become the target of a cyberattack, both at home and at work, and the recent brute force attack alert that I had on my home Synology NAS server a few days ago proves it. When I noticed the alert I naturally tightened the brute force rules, but […]. The post About Synology NAS Servers & Brute Force Attacks – “My Story of How I’ve Almost Got Hacked” appeared first on Heimdal Security Blog.

Hacking 105
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

IISerpent: Malware?driven SEO fraud as a service

We Live Security

The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites. The post IISerpent: Malware‑driven SEO fraud as a service appeared first on WeLiveSecurity.

Malware 110
article thumbnail

Threat actors behind the Poly Network hack are returning stolen funds

Security Affairs

The threat actor who hacked Poly Network cross-chain protocol stealing $611 million worth of cryptocurrency assets returns the stolen funds. The threat actor behind the hack of the Poly Network cross-chain protocol is now returning the stolen funds. The hackers have stolen $611 million worth of cryptocurrency assets, $273 million worth of Ethereum tokens , $253 million in tokens on Binance Smart Chain and $85 million in USDC on the Polygon network.

Hacking 103
article thumbnail

White House Presses Agencies to Protect Critical Software

Digital Guardian

The countdown is on for federal agencies to identify and safeguard critical software. A new White House memo gives entities one year to incorporate new security measures.

Software 105
article thumbnail

CEO Clar Rosso: Championing (ISC)² Members and the Cybersecurity Profession

CyberSecurity Insiders

The duties of the CEO of a member association like (ISC)² are many, and part of the job is to be a strong voice for the membership in advocating for the cybersecurity profession. Clar Rosso took on that responsibility when she was appointed in October 2020. Ever since, she’s been representing the more than 160,000 current cybersecurity practitioners who have earned (ISC)² membership.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.