Mon.Apr 03, 2023

article thumbnail

UK Runs Fake DDoS-for-Hire Sites

Schneier on Security

Brian Krebs is reporting that the UK’s National Crime Agency is setting up fake DDoS-for-hire sites as part of a sting operation: The NCA says all of its fake so-called “booter” or “stresser” sites -­ which have so far been accessed by several thousand people—have been created to look like they offer the tools and services that enable cyber criminals to execute these attacks. “However, after users register, rather than being given access to cyber crime t

DDOS 269
article thumbnail

GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

The Last Watchdog

Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. Related: Taking a risk-assessment approach to VM Unlike a typical cyber attack that exploits a software vulnerability, recent cyber attacks exploit other security risks, such as misconfigurations, security deviations, and posture anomalies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BYOD and personal apps: A recipe for data breaches

Tech Republic Security

Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. The post BYOD and personal apps: A recipe for data breaches appeared first on TechRepublic.

article thumbnail

Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack

SecureList

On March 29, Crowdstrike published a report about a supply chain attack conducted via 3CXDesktopApp, a popular VoIP program. Since then, the security community has started analyzing the attack and sharing their findings. The following has been discovered so far: The infection is spread via 3CXDesktopApp MSI installers. An installer for macOS has also been trojanized.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cybersecurity unaligned with business goals is reactive … and flawed: Study

Tech Republic Security

A new report for cybersecurity firm WithSecure suggests that most companies are investing in security solutions that are tactical and reactive, but not in line with strategic aims of an organization. The post Cybersecurity unaligned with business goals is reactive … and flawed: Study appeared first on TechRepublic.

article thumbnail

Western Digital discloses network breach, My Cloud service down

Bleeping Computer

Western Digital announced today that its network has been breached and an unauthorized party gained access to multiple company systems. [.

143
143

LifeWorks

More Trending

article thumbnail

WinRAR SFX archives can run PowerShell without being detected

Bleeping Computer

Hackers are adding malicious functionality to WinRAR self-extracting archives that contain harmless decoy files, allowing them to plant backdoors without triggering the security agent on the target system. [.

141
141
article thumbnail

10 Reasons why businesses need mobile device management (MDM)

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Mobile device management (MDM) refers to a type of software that allows businesses to manage, configure and secure mobile devices used by their employees. Companies use MDM solutions to maintain a secure environment across all the mobile devices they own or have access to, as well as provide features such as re

Mobile 127
article thumbnail

Show Me the Coverage: Ransomware Actors Demand Cyberinsurance Policies

Security Boulevard

The landscape of cybersecurity threats is continuously evolving, and ransomware attacks have emerged as a significant concern for organizations of all sizes. In a ransomware attack, cybercriminals encrypt the victim’s files, rendering them inaccessible and demand a ransom in exchange for the decryption key. This extortion method has proven lucrative for cybercriminals, resulting in an.

article thumbnail

5 strategies to manage cybersecurity risks in mergers and acquisitions

CSO Magazine

Mergers and acquisitions (M&A) have the potential to introduce significant cybersecurity risks for organizations. M&A teams are generally limited in size and focused on financials and business operations, with IT and cybersecurity taking a back seat early in the process, according to Doug Saylors, partner and co-lead of cybersecurity with global technology research and advisory firm ISG.

Risk 125
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

After Brief Exposure in Public Repo, GitHub Rotated Private SSH Key

Security Boulevard

In an attempt to get ahead of fallout from the exposure of its private SSH key in a public repository, the software development platform GitHub proactively rotated its host key last week. “Out of an abundance of caution, we replaced our RSA SSH host key used to secure Git operations for GitHub.com,” GitHub CSO and SVP. The post After Brief Exposure in Public Repo, GitHub Rotated Private SSH Key appeared first on Security Boulevard.

CSO 124
article thumbnail

Western Digital shuts systems due to Cyber Attack

CyberSecurity Insiders

A cyber attack launched and identified on March 26th of this year has triggered the incident response teams of Western Digital (WD) to take appropriate steps to mitigate the cyber risks of the incident. And the data storage company admitted that its firm’s IT infrastructure might feel the repercussions related to the incident in the coming weeks. Revealing the incident details on April 3rd, 2023, the network attached storage appliance producer stayed that it will cooperate with the law enforceme

article thumbnail

Passkeys and Biometrics Can Thwart Bad Actors

Security Boulevard

Cybersecurity breaches are a constant threat, and it’s only getting worse. In 2021, 45% of US companies suffered data breaches related to compromised credentials, 42 million individuals suffered losses greater than $50 billion in aggregate value due to identity theft and associated fraud, and over the last five years, more than 500 million credentials and.

article thumbnail

After Italy, Germany to issue ban on the ChatGPT use

CyberSecurity Insiders

ChatGPT, released by the Microsoft-owned OpenAI, has been temporarily banned by Italian government agencies due to data security concerns. Following the same, on Monday, that is April 3rd, 2023, the German Commissioner for Data Protection told Handelsblatt that Germany may follow in Italy’s footsteps and impose a ban on the usage of the AI-driven conversational chatbot until a thorough investigation is launched in-to how the AI application uses information for analysis to produce results.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Prepare for the Security Resilience Onslaught

Security Boulevard

As we get ready for the upcoming RSA Conference, I gave some thought to what the industry marketing machinery will be hyping, and in looking at my inbox for clues, I saw a clear trend. ‘Security resilience’ bubbled to the top as another buzzword in the increasingly jargon-riddled world of cybersecurity. I’m pretty sure it. The post Prepare for the Security Resilience Onslaught appeared first on Security Boulevard.

Marketing 118
article thumbnail

'Proxyjacking' Cybercriminals Exploit Log4J in Emerging, Lucrative Cloud Attacks

Dark Reading

Proxyjacking is an emerging, low-effort and high-reward attack for threat actors, with the potential for far-reaching implications.

118
118
article thumbnail

What are the Mobile App Security Best Practices

CyberSecurity Insiders

Mobile applications have become an essential part of our daily lives, and they are used for a variety of purposes such as communication, banking, shopping, and entertainment. However, with the increasing use of mobile applications, the risk of security breaches has also increased. In this article, we will discuss the best practices for mobile app security that developers should follow to ensure the safety of their users. 1.

Mobile 117
article thumbnail

Survey: Reactionary Cybersecurity is Misaligned With Business Goals

Security Boulevard

A global survey of 409 cybersecurity and IT decision-makers from companies with at least 250 employees suggested that while there is a lot more attention being paid to aligning cybersecurity strategy with business goals, most organizations are still spending most of their time reacting to events rather than achieving specific outcomes. Conducted by Forrester Consulting.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Data Breach Strikes Western Digital

Dark Reading

The company behind digital storage brand SanDisk says its systems were compromised on March 26.

article thumbnail

China to probe Micron over cybersecurity, in chip war’s latest battle

CSO Magazine

The Chinese government is instituting a cybersecurity review of US-based memory chip maker Micron’s products being sold in the country, in the latest move in the ongoing semiconductor trade dispute that pits China against the US and its allies. The rupture between China and the West over semiconductors is causing chip supply chain disruptions that threaten many of the fastest-growing parts of the technology sector – mainly AI and cloud technology.

article thumbnail

NTT Taps Microsoft to Provide MDR Service

Security Boulevard

NTT Ltd has launched a managed detection and response (MDR) security service based on Microsoft Sentinel, a security information event management (SIEM) platform hosted in the Azure cloud service. The NTT MDR service collects data from any user, device, application and infrastructure platform from any on-premises or cloud computing environment. That approach then makes it.

article thumbnail

Romance Scams and Relationship Scams: What’s the Difference?

Identity IQ

Romance Scams and Relationship Scams: What’s the Difference? IdentityIQ Romance Scams Romance scams are a type of fraud that involves criminals using deception to take advantage of victims looking for companionship. These scams typically involve criminals posing as potential partners on dating websites or social media platforms. They can often use fake profiles and photos.

Scams 105
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

3CX Breach Widens as Cyberattackers Drop Second-Stage Backdoor

Dark Reading

"Gopuram" is a backdoor that North Korea's Lazarus Group has used in some campaigns dating back to 2020, some researchers say.

103
103
article thumbnail

Western Digital Hit by Network Security Breach - Critical Services Disrupted!

The Hacker News

Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access to its systems. The breach is said to have occurred on March 26, 2023, enabling an unnamed third party to gain access to a "number of the company's systems.

article thumbnail

Money Message: The Newest Ransomware Gang that Threatens Organizations

Heimadal Security

A new online threat actor has emerged: the Money Message ransomware gang. These cybercriminals are attacking companies all over the world, demanding millions of dollars in ransom for the decryption key and not leaking the stolen data. When Did Money Message Appear? Victims signaled the new ransomware gang on March 28, 2023. Soon after, ThreatLabz […] The post Money Message: The Newest Ransomware Gang that Threatens Organizations appeared first on Heimdal Security Blog.

article thumbnail

Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions

The Hacker News

Microsoft has announced plans to automatically block embedded files with "dangerous extensions" in OneNote following reports that the note-taking service is being increasingly abused for malware delivery. Up until now, users were shown a dialog warning them that opening such attachments could harm their computer and data, but it was possible to dismiss the prompt and open the files.

Malware 101
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cryptocurrency companies backdoored in 3CX supply chain attack

Bleeping Computer

Some of the victims affected by the 3CX supply chain attack have also had their systems backdoored with Gopuram malware, with the threat actors specifically targeting cryptocurrency companies with this additional malicious payload. [.

article thumbnail

Crypto-Stealing OpcJacker Malware Targets Users with Fake VPN Service

The Hacker News

A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of 2022 as part of a malvertising campaign.

Malware 100
article thumbnail

New macOS malware steals sensitive info, including a user's entire Keychain database

Malwarebytes

A new macOS malware—called MacStealer—that is capable of stealing various files, cryptocurrency wallets, and details stored in specific browsers like Firefox, Chrome, and Brave, was discovered by security researchers from Uptycs, a cybersecurity company specializing in cloud security. It can also extract the base64-encoded form of the database of Keychain, Apple's password manager.

Malware 98
article thumbnail

Western Digital took its services offline due to a security breach

Security Affairs

Western Digital disclosed a security breach, according to the company an unauthorized party gained access to multiple systems. Western Digital has shut down several of its services after discovering a security breach, the company disclosed that an unauthorized party gained access to multiple systems. “Western Digital is currently experiencing a service outage impacting the following products: My Cloud, My Cloud Home, My Cloud Home Duo, My Cloud OS5, SanDisk ibi, SanDisk Ixpand Wireless Cha

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!