Fri.Apr 01, 2022

article thumbnail

Bypassing Two-Factor Authentication

Schneier on Security

These techniques are not new, but they’re increasingly popular : …some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a hurdle for some hackers to clear. In the past few months, suspected script kiddies like the Lapsus$ data extortion gang and elite Russian-state threat actors (like Cozy Bear, the group behind the SolarWinds hack) have both successfully defeated the protection. […].

article thumbnail

Weekly Update 289

Troy Hunt

Everyone just came for the Ubiquiti discussion, right? This is such a tricky one; if their products sucked we could all just forget about them and go on with our day. But they don't suck - they're awesome - and that makes it hard to fathom how a company that makes such great gear is responding this way to such a well-respected journo. I spend most of this week's video talking about this and perhaps what surprised me most, is even after that discussion there's a bunch of peopl

Passwords 331
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware attacks are on the rise, who is being affected?

Tech Republic Security

A report from NCC Group profiles the industries plagued by ransomware as well as the most active hacking groups in February. The post Ransomware attacks are on the rise, who is being affected? appeared first on TechRepublic.

article thumbnail

How Much Does a Data Breach Cost?

Security Boulevard

According to IBM's Annual Cost of a Data Breach Report 2021 , the average cost of a data breach is around $4.24 million. In the United States and Canada, it's even higher. So what makes data breaches so costly, are business leaders aware of the risks, and what can be done to prevent breaches? . The post How Much Does a Data Breach Cost? appeared first on Security Boulevard.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

“Browser in the Browser” attacks: A devastating new phishing technique arises

Tech Republic Security

A phishing technique called Browser in the Browser (BITB) has emerged, and it’s already aiming at government entities, including Ukraine. Find out how to protect against this new threat. The post “Browser in the Browser” attacks: A devastating new phishing technique arises appeared first on TechRepublic.

Phishing 215
article thumbnail

Critical GitLab vulnerability lets attackers take over accounts

Bleeping Computer

GitLab has addressed a critical severity vulnerability that could allow remote attackers to take over user accounts using hardcoded passwords. [.].

LifeWorks

More Trending

article thumbnail

New UAC-0056 activity: There’s a Go Elephant in the room

Malwarebytes

This blog post was authored by Ankur Saini, Roberto Santos and Hossein Jazi. UAC-0056 also known as SaintBear, UNC2589 and TA471 is a cyber espionage actor that has been active since early 2021 and has mainly targeted Ukraine and Georgia. The group is known to have performed a wiper attack in January 2022 on multiple Ukrainian government computers and websites.

article thumbnail

Phishing attacks exploit free calendar app to steal account credentials

Tech Republic Security

A credential harvesting campaign spotted by INKY at the end of February tried to lure its victims to Calendly, a legitimate and free online calendar app. The post Phishing attacks exploit free calendar app to steal account credentials appeared first on TechRepublic.

Phishing 179
article thumbnail

Anonymous targets oligarchs’ Russian businesses: Marathon Group hacked

Security Affairs

Anonymous continues its operations against Russia, the group announced the hack of the Russian investment firm Marathon Group. Anonymous continues to target Russian firms owned by oligarchs, yesterday the collective announced the hack of the Thozis Corp , while today the group claimed the hack of Marathon Group. The Marathon Group is a Russian investment firm owned by oligarch Alexander Vinokuro, who was sanctioned by the EU.

Hacking 140
article thumbnail

Get a CompTIA cybersecurity education online for an in-demand career

Tech Republic Security

Have you been considering a change of careers? Or would you just like to learn more about cybersecurity? Here's your chance while it's on sale for $49. The post Get a CompTIA cybersecurity education online for an in-demand career appeared first on TechRepublic.

Education 148
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

AcidRain, a wiper that crippled routers and modems in Europe

Security Affairs

Researchers spotted a new destructive wiper, tracked as AcidRain , that is likely linked to the recent attack against Viasat. Security researchers at SentinelLabs have spotted a previously undetected destructive wiper, tracked as AcidRain, that hit routers and modems and that was suspected to be linked to the Viasat KA-SAT attack that took place on February 24th, 2022.

Malware 138
article thumbnail

Chinese Hackers Target VMware Horizon Servers with Log4Shell to Deploy Rootkit

The Hacker News

A Chinese advanced persistent threat tracked as Deep Panda has been observed exploiting the Log4Shell vulnerability in VMware Horizon servers to deploy a backdoor and a novel rootkit on infected machines with the goal of stealing sensitive data.

137
137
article thumbnail

DDoS Protection Tips

CyberSecurity Insiders

As CIOs and CTOs are getting extremely worried about distributed denial of service attacks (DDoS), here’s a brief article that can help to enlighten their mind on protecting their corporate networks, without the need of any professional help. Running a DDoS Testing- It is essential, although it is a 3 hour effort to conduct. It can be done in two ways- hire a company to do it on your behalf or rent a cloud platform for three hours to test controlled attacks.

DDOS 135
article thumbnail

CISA Cautions of Attacks on UPS Devices

Hacker Combat

The Energy Department and the US Cybersecurity and Infrastructure Security Agency (CISA) published guidelines this week on preventing attacks on UPS units. Threat actors are targeting UPS units that are linked to the net, typically using the original login authorizations, and the two government agencies advise disabling the access to the net by the information system of these units immediately.

Passwords 130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Privilege Elevation and Delegation Management Explained: Definition, Benefits and More

Heimadal Security

A game-changer in the PAM market, PEDM is now on everybody’s lips when talking about more efficient methods to mitigate cybersec risk by properly controlling privileged permissions. Featuring three essential elements: appropriate privileges for appropriate users just at the appropriate time, PEDM dramatically improves your cybersec posture. Read on to gain more knowledge surrounding this […].

Marketing 130
article thumbnail

Trend Micro fixed high severity flaw in Apex Central product management console

Security Affairs

Trend Micro has fixed a high severity arbitrary file upload flaw, tracked as CVE-2022-26871 , in the Apex Central product management console. Cybersecurity firm Trend Micro has addressed a high severity security flaw, tracked as CVE-2022-26871 , in the Apex Central product management console. The CVE-2022-26871 vulnerability is an arbitrary file upload issue, its exploitation could lead to remote code execution.

Antivirus 128
article thumbnail

Deep Panda Hacking Group Is Targeting VMware Horizon Servers

Heimadal Security

In addition to the government, military, banking, and telecommunications sectors, Deep Panda is a suspected Chinese threat organization that has been known to target a wide range of businesses. Deep Panda is being held responsible for the infiltration into Anthem, a healthcare corporation. Shell Crew, WebMasters, KungFu Kittens, and PinkPanther are some of the other […].

Hacking 124
article thumbnail

Spring4Shell: Spring Remote Code Execution Vulnerability

Security Boulevard

Spring unauthenticated RCE via classLoader manipulation. Photo by Emile Perron on Unsplash. A critical zero-day vulnerability in the Spring framework was recently reported to Spring’s maintainer, VMWare. The vulnerability is an unauthenticated remote code execution vulnerability that affects Spring MVC and Spring WebFlux applications. You can find the CVE here: [link].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Cybersecurity survival tips for small businesses: 2022 edition

We Live Security

How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals? The post Cybersecurity survival tips for small businesses: 2022 edition appeared first on WeLiveSecurity.

article thumbnail

Two teenagers charged in relation to LAPSUS$ hacking group investigation

Graham Cluley

City of London Police have charged two teenagers in relation to the ongoing investigation into the LAPSUS$ hacking group.

Hacking 122
article thumbnail

Viasat’s Satellite Modems Wiped

Heimadal Security

In the field of computer security, a wiper is a kind of malware that is designed to erase (wipe) the hard drive of the computer that it infects, therefore intentionally erasing data and applications on the infected machine. What Happened? A newly found data wiper virus that wipes routers and modems was used in the […]. The post Viasat’s Satellite Modems Wiped appeared first on Heimdal Security Blog.

Malware 122
article thumbnail

Trend Micro fixes actively exploited remote code execution bug

Bleeping Computer

Japanese cybersecurity software firm Trend Micro has patched a high severity security flaw in the Apex Central product management console that can let attackers execute arbitrary code remotely. [.].

Software 120
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Globant suffers network breach due to LAPSUS$ compromise

Malwarebytes

Globant, an IT and software development firm with offices all around the globe, recently admitted in a press statement Wednesday that it has suffered a breach in their network. Affected data includes (but may not be limited to) some source code and certain project documentations of clients. “We have recently detected that a limited section of our company’s code repository has been subject to unauthorized access.

Hacking 119
article thumbnail

What are the Implications of the SEC Regulating Your Cyber Risk Reporting?

Security Boulevard

What’s the news? Last month, the Securities and Exchange Commission proposed rules and amendments to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies (The SEC has opened a comment period until May 9th, 2022 before it moves towards a final decision). The potential change is a great ….

article thumbnail

BlackGuard, a New Info-Stealer, for Sale on Russian Hacking Forums

Heimadal Security

A new info-stealer malware dubbed BlackGuard has been identified by security analysts. It seems that it’s put up for sale on Russian hacking forums, according to the researchers who discovered it. BlackGuard Advertised for Sale The malware has been described by the ZScaler experts, who published a report on this topic, as “sophisticated”, its monthly […].

Hacking 114
article thumbnail

Exiger launches data-agnostic supply chain risk platform

CSO Magazine

New York-based risk management company Exiger this week launched a new supply chain risk monitoring service, designed to incorporate a wide and customizeable array of data sources into its calcluations. The company’s Supply Chain Explorer is a fully as-a-service offering – users don’t have to host it in their data centers or run it on a dedicated appliance.

Risk 114
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Update now! Apple patches two zero-day vulnerabilities that may have been actively exploited

Malwarebytes

Apple has released security updates for macOS Monterey 12.3.1, iOS 15.4.1, iPadOS 15.4.1, tvOS 15.4.1, and watchOS 8.5.1. The update patches two vulnerabilities about which the advisory states that Apple is aware of a report that this issue may have been actively exploited for both vulnerabilities. Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database.

112
112
article thumbnail

JupyterLab’s Web Notebooks Hit Clipped Emergent Python-based Ransomware Strain

Heimadal Security

Aqua’s security assessment team has recently announced the discovery of a new type of ransomware. The yet-to-be-named malware uses Python-based scripting for malicious file encryption and subsequent obfuscation. Telemetry indicates that the emergent Python-based ransomware strain may have originated in Russia and that it was specifically engineered to target and ransom out JupyterLab Web notebooks. […].

article thumbnail

Don’t Be Confused By the Acronyms: CWPP, CSPM & CIEM

Security Boulevard

Speedy innovation and disruptions to traditional business has created the potential for extraordinary value in the tech world. However, moving too […]. The post Don’t Be Confused By the Acronyms: CWPP, CSPM & CIEM appeared first on Sonrai Security. The post Don’t Be Confused By the Acronyms: CWPP, CSPM & CIEM appeared first on Security Boulevard.

CISO 111
article thumbnail

What Is S/MIME?

Heimadal Security

As we all know, an email’s journey across the internet includes stops at numerous servers and routers. Sometimes, at any of these stops, malicious actors may come across the email message and read its contents or insert a bogus answer, impersonating the two parties who are communicating. For instance, this could lead to the theft […]. The post What Is S/MIME?

Internet 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!