Thu.May 19, 2022

article thumbnail

Websites that Collect Your Data as You Type

Schneier on Security

A surprising number of websites include JavaScript keyloggers that collect everything you type as you type it, not just when you submit a form. Researchers from KU Leuven, Radboud University, and University of Lausanne crawled and analyzed the top 100,000 websites, looking at scenarios in which a user is visiting a site while in the European Union and visiting a site from the United States.

Passwords 359
article thumbnail

Downloading Pwned Passwords Hashes with the HIBP Downloader

Troy Hunt

Just before Christmas, the promise to launch a fully open source Pwned Passwords fed with a firehose of fresh data from the FBI and NCA finally came true. We pushed out the code, published the blog post, dusted ourselves off and that was that. Kind of - there was just one thing remaining. The k-anonymity API is lovely and that's not just me saying that, that's people voting with their feet: That's already 58% by volume from my December blog post, only 5 months ago to the day.

Passwords 348
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: A primer on content management systems (CMS) — and how to secure them

The Last Watchdog

You very likely will interact with a content management system (CMS) multiple times today. Related: How ‘business logic’ hackers steal from companies. For instance, the The Last Watchdog article you are reading uses a CMS to store posts, display them in an attractive manner, and provide search capabilities. Wikipedia uses a CMS for textual entries, blog posts, images, photographs, videos, charts, graphics, and “ talk pages ” that help its many contributors collaborate.

article thumbnail

Threat actors compromising US business online checkout pages to steal credit card information

Tech Republic Security

A threat actor has successfully compromised and modified a US business website's checkout page in order to collect all the credit card data from unsuspecting customers. Read more about how to protect from this threat. The post Threat actors compromising US business online checkout pages to steal credit card information appeared first on TechRepublic.

187
187
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

10 ways attackers gain access to networks

Malwarebytes

A joint multi-national cybersecurity advisory has revealed the top ten attack vectors most exploited by cybercriminals in order to gain access to organisation networks, as well as the techniques they use to gain access. The advisory cites five techniques used to gain leverage: Public facing applications. Anything internet-facing can be a threat if not properly patched and updated.

Phishing 145
article thumbnail

CrowdStrike vs Sophos: EDR software comparison

Tech Republic Security

CrowdStrike Falcon XDR and Sophos Endpoint Intercept X are best-in-class EDR solutions, taking endpoint detection and response to the next level. Compare the features of these EDR tools. The post CrowdStrike vs Sophos: EDR software comparison appeared first on TechRepublic.

Software 174

LifeWorks

More Trending

article thumbnail

Fortinet vs Palo Alto: Comparing EDR software

Tech Republic Security

Fortinet and Palo Alto Networks help organizations secure their endpoints and improve their cybersecurity posture by providing sophisticated endpoint detection and response software. But which software is best for you? The post Fortinet vs Palo Alto: Comparing EDR software appeared first on TechRepublic.

Software 167
article thumbnail

China-linked Space Pirates APT targets the Russian aerospace industry

Security Affairs

A new China-linked cyberespionage group known as ‘Space Pirates’ is targeting enterprises in the Russian aerospace industry. A previously unknown Chinese cyberespionage group, tracked as ‘Space Pirates’, targets enterprises in the Russian aerospace industry with spear-phishing attacks. The group has been active since at least 2017, researchers believe it is linked with other China-linked APT groups, including APT41 (Winnti), Mustang Panda , and APT27.

Malware 144
article thumbnail

High-Severity Bug Reported in Google's OAuth Client Library for Java

The Hacker News

Google last month addressed a high-severity flaw in its OAuth client library for Java that could be abused by a malicious actor with a compromised token to deploy arbitrary payloads. Tracked as CVE-2021-22573, the vulnerability is rated 8.7 out of 10 for severity and relates to an authentication bypass in the library that stems from an improper verification of the cryptographic signature.

article thumbnail

U.S. DOJ will no longer prosecute ethical hackers under CFAA

Bleeping Computer

The U.S. Department of Justice (DOJ) has announced a revision of its policy on how federal prosecutors should charge violations of the Computer Fraud and Abuse Act (CFAA), carving out "good-fath" security research from being prosecuted. [.].

142
142
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Pwn2Own Vancouver 2022 D1: MS Teams exploits received $450,000

Security Affairs

White hat hackers earned a total of $800,000 on the first day of the Pwn2Own Vancouver 2022, $450,000 for exploits targeting Microsoft Teams. Pwn2Own Vancouver 2022 hacking contest has begun, it is the 15th edition of this important event organized by Trend Micro’s Zero Day Initiative (ZDI). This year, 17 contestants are attempting to exploit 21 targets across multiple categories.

Hacking 142
article thumbnail

7 Key Findings from the 2022 SaaS Security Survey Report

The Hacker News

The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security professionals in today's enterprises. The report gathers anonymous responses from 340 CSA members to examine not only the growing risks in SaaS security but also how different organizations are currently working to secure themselves.

CISO 142
article thumbnail

Google OAuth client library flaw allowed to deploy of malicious payloads

Security Affairs

Google addressed a high-severity flaw in its OAuth client library for Java that could allow attackers with a compromised token to deploy malicious payloads. Google addressed a high-severity authentication bypass flaw in Google OAuth Client Library for Java, tracked as CVE-2021-22573 (CVS Score 8.7), that could be exploited by an attacker with a compromised token to deploy malicious payloads.

article thumbnail

Surge in Malware Downloads Driven by SEO-Based Techniques 

Security Boulevard

Attackers are using search engine optimization (SEO) techniques to improve the ranking of malicious PDF files on search engines including Google and Microsoft’s Bing, according to a Netskope report. The findings indicated that cybercriminals are leveraging various social engineering techniques—including SEO—and different Trojan families, including those delivered via PDF, to target victims more effectively.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

6 Scary Tactics Used in Mobile App Attacks

Dark Reading

Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene.

Mobile 138
article thumbnail

‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

Security Boulevard

Tesla cars can be unlocked and stolen via a simple relay attack. The company shrugged and said it’s “a known limitation.”. The post ‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth appeared first on Security Boulevard.

article thumbnail

Majority of Kubernetes API Servers Exposed to the Public Internet

Dark Reading

Shadowserver Foundation researchers find 380,000 open Kubernetes API servers.

Internet 135
article thumbnail

Enterprises report rise in risk events, yet risk management lags

CSO Magazine

Enterprises around the world are being barraged by risk events, according to a report released Wednesday by Forrester. The State of Risk Management 2022 report, which is based on a survey of 360 enterprise risk management decision makers in North America and Europe, found that 41% of organizations have experienced three or more critical risk events in the last 12 months.

Risk 131
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The flip side of the coin: Why crypto is catnip for criminals

We Live Security

Cybercriminals continue to mine for opportunities in the crypto space – here's what you should know about coin-mining hacks and crypto theft. The post The flip side of the coin: Why crypto is catnip for criminals appeared first on WeLiveSecurity.

Hacking 129
article thumbnail

Jupiter Plugin Vulnerabilities Enable Hackers to Hijack Websites

Heimadal Security

Privilege escalation is a malicious tactic to misuse an app or OS issue or configuration problem to get unauthorized access to sensitive information by taking over a user’s account that would ordinarily be inaccessible to the current user. By getting these permissions, a hostile actor may undertake a number of operations on the operating system or […].

article thumbnail

Phishing gang that stole over 400,000 Euros busted in Spain

The State of Security

Spanish police say that they have dismantled a phishing gang operating across the country, following the arrest of 13 people and the announcement that they are investigating a further seven suspects. According to police, the phishing ring defrauded some 146 victims, stealing at least 443,600 Euros from online bank accounts. Victims were tricked into handing […]… Read More.

Phishing 127
article thumbnail

Steganography in Cybersecurity: A Growing Attack Vector

Security Boulevard

Fully aware of increasing investments made by companies in cybersecurity tools, threat actors constantly tweak, diversify and refine their cyberattack strategies in order to evade detection. One recent trend is an increase in steganography as an attack vector to achieve different objectives, such as masking communications or installing malware. This article explains what steganography in….

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The quantum menace: Quantum computing and cryptography

InfoWorld on Security

Quantum computing continues to inhabit the nebulous space between practical application and theoretical speculation, but it is edging closer toward real-world use. One of the more interesting use cases for quantum computers is modern internet cryptography. Quantum computing and qubits. Quantum computing 's name comes from the fact that it relies on the properties of subatomic particles, governed by laws that seem strange to those of us rooted in the macro world.

Internet 126
article thumbnail

Lazarus hackers target VMware servers with Log4Shell exploits

Bleeping Computer

The North Korean hacking group known as Lazarus is exploiting the Log4J remote code execution vulnerability to inject backdoors that fetch information-stealing payloads on VMware Horizon servers. [.].

Hacking 126
article thumbnail

Malicious hackers are finding it too easy to achieve their initial access

The State of Security

It should be hard for malicious hackers to break into systems, but all too often it isn’t. That’s a takeaway from a joint cybersecurity advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA), the NSA and FBI, and their counterparts in Canada, New Zealand, the Netherlands, and United Kingdom. The advisory, which is titled […]… Read More.

article thumbnail

VMWare vulnerabilities are actively being exploited, CISA warns

Malwarebytes

The Cybersecurity & Infrastructure Security Agency has issued an Emergency Directive ED 22-03 and released a Cybersecurity Advisory (CSA) about ongoing, and expected exploitation of multiple vulnerabilities in several VMware products. Chaining unpatched VMware vulnerabilities. The title of the advisory is “Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control”.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

IT and Security leaders are sharing passwords in shared documents folders

CyberSecurity Insiders

A recent survey conducted on IT leaders by Hitachi ID discovered that half of them are found storing passwords on shared document files, triggering security and privacy concerns. Hitachi, which recently strolled into the Identity Management, conducted a poll to take the feedback from over 100 IT leaders such as CIOs and CTOs working in companies operating in EMEA and North American regions.

Passwords 122
article thumbnail

Improved functionality and new features to help enhance the user experience

Webroot

Webroot Console 6.5 is here. To help get us closer to retiring the Endpoint Protection Console, we’ve introduced three new functionality features with Webroot Console 6.5. Friendly name support. To help get us closer to retiring the Endpoint Protection Console, we’ve introduced three new functionality features with Webroot Console 6.5. Friendly name support.

122
122
article thumbnail

Reachability and Risk: Tools for Security Leaders

Security Boulevard

By Malcolm Harkins, Bryan Smith, Rob Lundy. Attacker Reachability (or “Attackability”), is a concept in open source software vulnerability management. It’s a way to understand if, 1) a vulnerability is present, and 2) Can an attacker actually get to it. It is impossible to manage security posture without considering two key factors in any potential vulnerability or security flaw: reachability and risk.

Risk 122
article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

The development of software-defined wide area networking ( SD-WAN ) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally. Wide area networks have come a long way over the decades, and the introduction of cloud , edge , and virtual workloads only adds to the complexity of managing modern networks.

Firewall 120
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!