Sat.Apr 03, 2021

article thumbnail

Microsoft outage caused by overloaded Azure DNS servers

Bleeping Computer

Microsoft has revealed that Thursday's worldwide outage was caused by a code defect that allowed the Azure DNS service to become overwhelmed and not respond to DNS queries. [.].

DNS 145
article thumbnail

Data of 533 million Facebook users leaked in a hacking forum for free

Security Affairs

On April 3, a user has leaked the phone numbers and personal data of 533 million Facebook users in a hacking forum for free online. Bad news for Facebook, a user in a hacking forum has published the phone numbers and personal data of 533 million Facebook users. The availability of the data was first reported by Alon Gal, CTO of cyber intelligence firm Hudson Rock.

Hacking 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware attack is preventing car inspections in eight US states

Bleeping Computer

A malware cyberattack on emissions testing company Applus Technologies is preventing vehicle inspections in eight states, including Connecticut, Georgia, Idaho, Illinois, Massachusetts, Utah, and Wisconsin. [.].

Malware 143
article thumbnail

Google limits which apps can access the list of installed apps on your device

The Hacker News

Apps on Android have been able to infer the presence of specific apps, or even collect the full list of installed apps on the device. What's more, an app can also set to be notified when a new app is installed.

109
109
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

533 million Facebook users’ phone numbers leaked on hacker forum

Bleeping Computer

The mobile phone numbers and other personal information for approximately 533 million Facebook users worldwide has been leaked on a popular hacker forum for free. [.].

Mobile 145
article thumbnail

Facebookery: 533 million Facebook PII Leaked

Security Boulevard

Superb reportage-in-action: "The exposed data includes personal information of over 533 million Facebook users from 106 countries, including over 32 million records on users in the US, 11 million on users in the UK, and 6 million on users in India. It includes their phone numbers, Facebook IDs, full names, locations, birthdates, bios, and — in some cases — email addresses.".

Scams 99

More Trending

article thumbnail

Evolution and rise of the Avaddon Ransomware-as-a-Service

Security Affairs

The Avaddon ransomware operators updated their malware after security researchers released a public decryptor in February 2021. The Avaddon ransomware family first appeared in the threat landscape in February 2020, and its authors started offering it with a Ransomware-as-a-Service (RaaS) model in June, 2020. In August 2020, cybersecurity intelligence firm Kela was the first to report that the Avaddon ransomware operators announced on a Russian-speaking hacker forum their new data leak site.

article thumbnail

GitHub Actions being actively abused to mine cryptocurrency on GitHub servers

Bleeping Computer

GitHub Actions has been abused by attackers to mine cryptocurrency using GitHub's servers, automatically.The particular attack adds malicious GitHub Actions code to repositories forked from legitimate ones, and further creates a Pull Request for the original repository maintainers to merge the code back, to alter the original code. [.].

article thumbnail

Security News in Review: Google’s Project Zero Shuts Down Counterterrorist Hacking Team; Enterprises See Rise in Firmware Attacks

Security Boulevard

This weekend on security news in review, we have some new data on firmware attacks against global enterprises, insights into how much damage ransomware has caused the healthcare industry, and the Department of Homeland Security laying out a new cybersecurity strategy. . The post Security News in Review: Google’s Project Zero Shuts Down Counterterrorist Hacking Team; Enterprises See Rise in Firmware Attacks appeared first on Security Boulevard.

article thumbnail

Ransomware gang leaks data from Stanford, Maryland universities

Bleeping Computer

Stolen personal and financial information of students at Stanford Medicine, University of Maryland Baltimore (UMB), and the University of California was leaked online by the Clop ransomware group earlier this week. [.].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Cyrebro Can Unify Multiple Cybersecurity Defenses to Optimize Protection

The Hacker News

Many enterprises rely on more than one security tool to protect their technology assets, devices, and networks. This is particularly true for organizations that use hybrid systems or a combination of cloud and local applications. Likewise, companies whose networks include a multitude of smartphones and IoT devices are likely to deploy multiple security solutions suitable for different scenarios.

IoT 79
article thumbnail

Patch and Vulnerability Management

Security Boulevard

At Fortinet, we are on a constant journey with our customers to best protect and secure their organizations. Read to learn more about the importance of patching and vulnerability management. The post Patch and Vulnerability Management appeared first on Security Boulevard.

78
article thumbnail

Automated attack abuses GitHub Actions to mine cryptocurrency

Bleeping Computer

GitHub Actions has been abused by attackers to mine cryptocurrency using GitHub's servers, automatically.The particular attack adds malicious GitHub Actions code to repositories forked from legitimate ones, and further creates a Pull Request for the original repository maintainers to merge the code back, to alter the original code. [.].

article thumbnail

Capital One discovered more customers’ SSNs exposed in 2019 hack

Security Affairs

More clients of Capital One have been impacted in the 2019 data breach, the US bank is notifying them of their SSNs exposure. US bank Capital One notified a number of additional customers that their Social Security numbers were exposed in the data breach that took place in July 2019. A hacker that was going online with the handle “erratic” breached the systems at Capital One and gained access to personal information from 106 million Capital One credit applications.

Hacking 71
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CERIAS – Scott Shackelford’s ‘The Internet of Things: What Everyone Needs To Know’

Security Boulevard

Many thanks to CERIAS Purdue University for publishing their outstanding videos on the organization's YouTube channel. Enjoy and Be Educated Simultaneously! Permalink. The post CERIAS – Scott Shackelford’s ‘The Internet of Things: What Everyone Needs To Know’ appeared first on Security Boulevard.

article thumbnail

Activision warns of Call of Duty Cheat tool used to deliver RAT

Security Affairs

The popular video game publisher Activision is warning gamers that threat actors are actively disguising a remote-access trojan (RAT) in Duty Cheat cheat tool. Activision, the company behind Call of Duty: Warzone and Guitar Hero series, is warning gamers that a threat actor is advertising cheat tools that deliver remote-access trojan (RAT). The company reported that in March of 2020 a threat actor posted on multiple hacking forums advertising a free, “newbie friendly” and effective method for sp

article thumbnail

XKCD ‘Checkbox’

Security Boulevard

via the comic delivery system monikered Randall Munroe resident at XKCD ! Permalink. The post XKCD ‘Checkbox’ appeared first on Security Boulevard.

69
article thumbnail

Cops Take Down the ‘World’s Biggest' Video Game Cheat Ring

WIRED Threat Level

Plus: North Korean hackers, a rogue tweet, and more of the week's top security news.

93
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CERIAS – Adwait Nadkarni’s ‘Building Practical Security Systems For The Post-App Smart Home’

Security Boulevard

Many thanks to CERIAS Purdue University for publishing their outstanding videos on the organization's YouTube channel. Enjoy and Be Educated Simultaneously! Permalink. The post CERIAS – Adwait Nadkarni’s ‘Building Practical Security Systems For The Post-App Smart Home’ appeared first on Security Boulevard.

article thumbnail

gotestwaf v0.4.8 releases: test different web application firewalls (WAF) for detection logic and bypasses

Penetration Testing

Go Test WAF GoTestWAF is a tool for API and OWASP attack simulation, that supports a wide range of API protocols including REST, GraphQL, gRPC, WebSockets, SOAP, XMLRPC, and others. It was designed to... The post gotestwaf v0.4.8 releases: test different web application firewalls (WAF) for detection logic and bypasses appeared first on Penetration Testing.

article thumbnail

Attackers are abusing GitHub infrastructure to mine cryptocurrency

Security Affairs

The popular code repository hosting service GitHub is investigating a crypto-mining campaign abusing its infrastructure. Code repository hosting service GitHub launched an investigation in a series of attacks aimed at abusing its infrastructure to illicitly mine cryptocurrency. Such kind of attacks was reported at least since the end of 2020, when some software developers reported the malicious activity on their repositories. “I was attacked by a github user that crafted a malicious github