Mon.Jul 04, 2022

article thumbnail

Welcoming the Polish Government to Have I Been Pwned

Troy Hunt

Continuing the rollout of Have I Been Pwned (HIBP) to national governments around the world, today I'm very happy to welcome Poland to the service! The Polish CSIRT GOV is now the 34th onboard the service and has free and open access to APIs allowing them to query their government domains. Seeing the ongoing uptake of governments using HIBP to do useful things in the wake of data breaches is enormously fulfilling and I look forward to welcoming many more national CSIRTs in the future.

article thumbnail

L33t H4cking vs. M0st H4acking

Daniel Miessler

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

11 top cloud security threats

CSO Magazine

Identity and access issues topped the list of concerns of IT pros in the Cloud Security Alliance's annual Top Threats to Cloud Computing: The Pandemic 11 report released earlier this month. "Data breaches and data loss were the top concerns last year," says CSA Global Vice President of Research John Yeoh. "This year, they weren't even in the top 11.

article thumbnail

Data of a billion Chinese residents available for sale on a cybercrime forum

Security Affairs

Threat actors claim to have breached a database belonging to Shanghai police and stole the data of a billion Chinese residents. Unknown threat actors claimed to have obtained data of a billion Chinese residents after breaching a database of the Shanghai police. If the incident will be confirmed, this data breach is the largest one in the country’s history. “Shangai authorities have not publicly responded to the purported hack.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

The Top 10 SMB cyber security mistakes. Find out how to fix these security risks.

Security Boulevard

Find out top 10 risks answering why SMB's are doing cyber security wrong. We have also included fixes to help you understand the cybersecurity for SMB. The post The Top 10 SMB cyber security mistakes. Find out how to fix these security risks. appeared first on Cyphere | Securing Your Cyber Sphere. The post The Top 10 SMB cyber security mistakes.

Risk 145
article thumbnail

Cyberattacks: A very real existential threat to organizations

We Live Security

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay? The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity.

LifeWorks

More Trending

article thumbnail

Asia could be placing all the wrong cybersecurity bets

CSO Magazine

Over two-thirds (69%) of security leaders in Asia are confident about their organization’s cybersecurity resilience, even as 48% also admit that there is still room for improvement, a new joint study by Microsoft and risk advisory firm Marsh has found. The Asian edition of The State of Cyber Resilience report, which had over 660 participants, including CEOs, CISOs, and risk managers, revealed that companies in Asia have experienced a far higher number of privacy breaches (28%) and denial of serv

article thumbnail

Canadian cybercriminal pleads guilty to “NetWalker” attacks in US

Naked Security

Bust in Canada, now bust in the USA as well.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

In the digital era, freedom is inextricably linked to privacy. After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. We have already lost a lot of control over who and what has access to our data, and there are further threats to our freedom on the horizon. It doesn’t have to be that way though, and it is not inevitable that the trend will continue.

Internet 121
article thumbnail

Cricket Betting Sites In Bangladesh

SecureBlitz

Cricket is a fairly popular sport in India as well as in Bangladesh. In Bangladesh, the popularity of this discipline. Read more. The post Cricket Betting Sites In Bangladesh appeared first on SecureBlitz Cybersecurity.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

“Free UK visa” offers on WhatsApp are fakes

Malwarebytes

A student friend recently shared a WhatsApp message, unsure if it was scam. The message claims to offer an easy to route to free visas, housing, accommodation, and medicine access. Here’s how we know it was a scam, and where it lead. It read as follows: UK GOVERNMENT JOB RECRUITMENT 2022 : This is open to all Individuals who wants to work in UK, Here is a great chance for you all to work conveniently in the UK.

Scams 116
article thumbnail

AstraLocker ransomware shuts down and releases decryptors

Bleeping Computer

The threat actor behind the lesser-known AstraLocker ransomware told BleepingComputer they're shutting down the operation and plan to switch to cryptojacking. [.].

article thumbnail

Google fixes the fourth Chrome zero-day in 2022

Security Affairs

Google addressed a high-severity zero-day Chrome vulnerability actively exploited in the wild, it is the fourth zero-day patched in 2022. Google has released Chrome 103.0.5060.114 for Windows to fix a high-severity zero-day Chrome vulnerability, tracked as CVE-2022-2294, which is actively exploited in the wild. The flaw is a heap buffer overflow that resides in the Web Real-Time Communications (WebRTC) component, it is the fourth zero-day patched by the IT giant in 2022. “Google is aware t

article thumbnail

Privacy Protection Agency Seizes Hacked Travel Company’s Servers

Heimadal Security

The Privacy Protection Body is the Israeli regulatory and enforcement authority for personal digital information. This authority is responsible for ensuring compliance with the law. The authority is in charge of ensuring the safety of any personally identifiable information that is stored in digital databases. This rule applies to all organizations in Israel, whether they […].

Hacking 110
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Popular Django web framework affected by a SQL Injection flaw. Upgrade it now!

Security Affairs

The development team behind the Django Project has addressed a high-severity SQL Injection flaw in its framework. Django is a free and open-source, Python-based web framework that follows the model–template–views (MTV) architectural pattern. Django is maintained by the independent organization Django Software Foundation. The latest releases of the framework, Django 4.0.6 and 3.2.14 , addressed a high-severity SQL Injection vulnerability tracked as CVE-2022-34265.

article thumbnail

AstraLocker Ransomware shuts down operations and shifts to Cryptojacking

CyberSecurity Insiders

AstraLocker Ransomware is all set to shut down its operations as it has shifted its operations towards Cryptojacking. The hackers behind the malware have issued an official statement on this note and added that they were ready to provide a free decryption tool to their victims, if any. Already, the hackers’ group released an informal statement in February this year about their intention to shut down their malware distribution operations.

article thumbnail

Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the Wild

The Hacker News

Google on Monday shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild.

107
107
article thumbnail

The Worst Hacks and Breaches of 2022 So Far

WIRED Threat Level

From cryptocurrency thefts to intrusions into telecom giants, state-backed attackers have had a field day in the year’s first half.

Hacking 106
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

A week in security (June 27 – July 3)

Malwarebytes

Last week on Malwarebytes Labs: Ransomware review: June 2022 AstraLocker 2.0 ransomware isn’t going to give you your files back YTStealer targets YouTube content creators ZuoRAT is a sophisticated malware that mainly targets SOHO routers Amazon Photos vulnerability could have given attackers access to user files and data Criminals are applying for remote work using deepfake and stolen identities, says FBI Immigration organisations targeted by APT group Evilnum Update now!

Spyware 105
article thumbnail

Surveillance data of Chinese citizens put online by hackers

CyberSecurity Insiders

. All these days, we have seen countries and governments screeching about cyber attacks and data thefts conducted by Chinese hackers. But now, a hacker online has claimed that he/she is ready to sell about 23 terabytes of data for 10 bitcoins or $246,000 appx. The hacker named ‘ChinaDan’ also notified those interested that the information was related to 1 billion Chinese populace and was stolen from a police database of Shanghai National Police during the recent covid pandemic propelled lockdow

article thumbnail

Hacker claims to have stolen data on 1 billion Chinese citizens

Bleeping Computer

An anonymous threat actor is selling several databases they claim to contain more than 22 terabytes of stolen information on roughly 1 billion Chinese citizens for 10 bitcoins (approximately $195,000). [.].

105
105
article thumbnail

Some Worms Use Their Powers for Good

The Hacker News

Gardeners know that worms are good. Cybersecurity professionals know that worms are bad. Very bad. In fact, worms are literally the most devasting force for evil known to the computing world. The MyDoom worm holds the dubious position of most costly computer malware ever – responsible for some $52 billion in damage. In second place… Sobig, another worm.

Malware 101
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA orders federal agencies to patch CVE-2022-26925 by July 22

Security Affairs

US Critical Infrastructure Security Agency (CISA) adds CVE-2022-26925 Windows LSA flaw to its Known Exploited Vulnerabilities Catalog. In May the US CISA removed the CVE-2022-26925 Windows LSA vulnerability from its Known Exploited Vulnerabilities Catalog due to Active Directory (AD) certificate authentication problems observed after the installation of Microsoft’s May 2022 Patch Tuesday security updates. “CISA is temporarily removing CVE-2022-26925 from its Known Exploited Vulnerab

article thumbnail

Django fixes SQL Injection vulnerability in new releases

Bleeping Computer

Django, an open source Python-based web framework has patched a high severity vulnerability in its latest releases. Tracked as CVE-2022-34265, the potential SQL Injection vulnerability impacts Django's main branch, and versions 4.1 (currently in beta), 4.0, and 3.2, with patches and new releases issued fixing the vulnerability. [.].

98
article thumbnail

Unfaithful HackerOne employee steals bug reports to claim additional bounties

Security Affairs

Bug bounty platform HackerOne disclosed that a former employee improperly accessed security reports submitted to claim additional bounties. The vulnerability coordination and bug bounty platform HackerOne disclosed that a former employee improperly accessed security reports submitted by white-hat hackers to claim additional bounties. The investigation started on June 22nd, 2022, when a customer asked the company to investigate a suspicious vulnerability disclosure made outside of the HackerOne p

article thumbnail

Medical scams: Educate yourself and your loved ones

Security Boulevard

We’ve covered the dangers and necessary defenses against various scams, including romance scams , supply chain scams , financial scams , lottery scams , and vishing scams , but now we turn our attention to what could be the most personal and invasive of scams – the medical scam. The post Medical scams: Educate yourself and your loved ones appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Google fixes the fourth Chrome zero-day in 2022

Security Affairs

Google addressed a high-severity zero-day Chrome vulnerability actively exploited in the wild, it is the fourth zero-day patched in 2022. Google has released Chrome 103.0.5060.114 for Windows to fix a high-severity zero-day Chrome vulnerability, tracked as CVE-2022-2294, which is actively exploited in the wild. The flaw is a heap buffer overflow that resides in the Web Real-Time Communications (WebRTC) component, it is the fourth zero-day patched by the IT giant in 2022. “Google is aware t

article thumbnail

Ukrainian Authorities Arrested Phishing Gang That Stole 100 Million UAH

The Hacker News

The Cyber Police of Ukraine last week disclosed that it apprehended nine members of a criminal gang that embezzled 100 million hryvnias via hundreds of phishing sites that claimed to offer financial assistance to Ukrainian citizens as part of a campaign aimed at capitalizing on the ongoing conflict.

article thumbnail

Data of a billion Chinese residents available for sale on the dark web

Security Affairs

Threat actors claim to have breached a database belonging to Shanghai police and stole the data of a billion Chinese residents. Unknown threat actors claimed to have obtained data of a billion Chinese residents after breaching a database of the Shanghai police. If the incident will be confirmed, this data breach is the largest one in the country’s history. “Shangai authorities have not publicly responded to the purported hack.

article thumbnail

Google patches new Chrome zero-day flaw exploited in attacks

Bleeping Computer

Google has released Chrome 103.0.5060.114 for Windows users to address a high-severity zero-day vulnerability exploited by attackers in the wild, the fourth Chrome zero-day patched in 2022. [.].

97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!