Wed.Jul 06, 2022

article thumbnail

What Is a Firewall and Do you Need One?

Adam Levin

A firewall is a network security device or program designed to prevent unauthorized and malicious internet traffic from entering a private network or device. It is a digital safety barrier between public and private internet connections, allowing non-threatening traffic in and keeping malicious traffic out, which in theory includes malware and hackers.

Firewall 298
article thumbnail

MVP Award 12

Troy Hunt

11 years now, wow 😲 It's actually 11 and a bit because it was April Fool's Day in 2011 that my first MVP award came through. At the time, I referred to myself as "The Accidental MVP" as I'd no expectation of an award, it just came from me being me. It's the same again today, and the last year has been full of just doing the stuff I love; loads of talks (which, like the one above at AusCERT, are actually starting to happen in front of real live humans again), l

Passwords 273
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Announces First Four Quantum-Resistant Cryptographic Algorithms

Schneier on Security

NIST’s post-quantum computing cryptography standard process is entering its final phases. It announced the first four algorithms: For general encryption, used when we access secure websites, NIST has selected the CRYSTALS-Kyber algorithm. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation.

article thumbnail

Cyberattacks interrupt unemployment benefits in multiple states

Tech Republic Security

Geographic Solutions Inc., the company handling the unemployment websites of several states, took the websites offline due to the attack. The post Cyberattacks interrupt unemployment benefits in multiple states appeared first on TechRepublic.

177
177
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

8 common Facebook Marketplace scams and how to avoid them

We Live Security

Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed. The post 8 common Facebook Marketplace scams and how to avoid them appeared first on WeLiveSecurity.

Scams 137
article thumbnail

NIST selects four encryption algorithms to thwart future quantum computer attacks

Tech Republic Security

The announcement follows a six-year effort to devise and then vet encryption methods to significantly increase the security of digital information, the agency said. The post NIST selects four encryption algorithms to thwart future quantum computer attacks appeared first on TechRepublic.

More Trending

article thumbnail

Unsecured and unencrypted South Korean loyalty platform exposes data of more than 1 million customers

Tech Republic Security

Dodo Point records exposed more than a million customers' records online. The data was stored in an unencrypted bucket that could be accessed without any kind of authentication. The post Unsecured and unencrypted South Korean loyalty platform exposes data of more than 1 million customers appeared first on TechRepublic.

article thumbnail

Smart factories unprepared for cyberattacks

CSO Magazine

Organizations operating smart factories largely agree that cybersecurity is a critical component to their operations. Many, however, are unprepared to deal with the growing number of cyberthreats against them, according to a report released last week by Capgemini , a provider of technology and digital transformation consulting services. The report, based on a survey of 950 organizations globally, finds that 80% agreed that cybersecurity is a critical component of a smart factory's operations and

article thumbnail

Cyberattacks against law enforcement are on the rise

Security Affairs

Experts observed an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022. Resecurity, a Los Angeles-based cybersecurity company protecting Fortune 500 companies worldwide, has registered an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022. Threat actors are hacking email and other accounts which belong to police officers and their internal systems.

Hacking 113
article thumbnail

BrandPost: Advancing Cybersecurity Skillsets Helps Organizations Against Threats

CSO Magazine

Worldwide, 80% of organizations suffered one or more breaches that they could attribute to a lack of cybersecurity skills and/or awareness according to Fortinet’s recently published 2022 Cybersecurity Skills Gap research report. The lack of qualified cybersecurity professionals is a massive global problem affecting all types of organizations. Because the cybersecurity workforce is not growing fast enough to keep up with new threats, Fortinet has pledged to do something about it.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Security Resilience in the Americas

Cisco Security

The past couple of years have brought security resilience to the forefront. How can organizations around the world build resilience when uncertainty is the new normal? How can we be better prepared for whatever is next on the threat horizon? When threats are unpredictable, resilient security strategies are crucial to endure change when we least expect it. .

article thumbnail

Attacker groups adopt new penetration testing tool Brute Ratel

CSO Magazine

Security researchers have recently identified several attack campaigns that use APT-like targeting techniques and deploy Brute Ratel C4 (BRc4), a relatively new adversary simulation framework. While hackers abusing penetration testing tools is not a new development -- Cobalt Strike and Metasploit's Meterpreter have been used by threat groups for years -- Brute Ratel is focused on detection evasion techniques, so it might pose a real challenge to defense teams.

article thumbnail

Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method

The Hacker News

The operators of the Hive ransomware-as-a-service (RaaS) scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more sophisticated encryption method.

article thumbnail

Discord Shame channel goes phishing

Malwarebytes

A variant of a popular piece of social media fraud has made its way onto Discord servers. Multiple people are reporting messages of an “Is this you” nature, tied to a specific Discord channel. is this a new discord scam or something? someone I haven’t spoken to in years randomly sent me this and when I go to join the server I have verify by scanning the qr code (not happening) pic.twitter.com/b2DR4Bhk4R — puppygoose !

Phishing 108
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

New Hive ransomware variant is written in Rust and use improved encryption method

Security Affairs

Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method. The operators of the Hive ransomware upgraded their malware by migrating the malware to the Rust language and implementing a more sophisticated encryption method, Microsoft researchers warn. “The upgrades in the latest variant are effectively an overhaul: the most notable changes include a full code migration to another programming language

article thumbnail

IT services giant SHI hit by "professional malware attack"

Bleeping Computer

SHI International Corp, a New Jersey-based provider of Information Technology (IT) products and services, has confirmed that its network was hit by a malware attack over the weekend. [.].

Malware 105
article thumbnail

Bangladesh Military targeted by ‘Bitter’ hacking organization

CyberSecurity Insiders

Security experts from SecuInfra have issued an advisory on an Advanced Persistent Threat group named ‘Bitter’. The advisory states that the said hacking group has launched consistent hacking campaigns belonging to Bangladesh Military to conduct espionage and steal classical info. SecuInfras findings were based on another report of Cisco Talos that was released in May 2022 and it confirmed digital attacks on several Bangladesh government organizations to take control of their networks.

Hacking 105
article thumbnail

25 Most Dangerous Software Flaws Identified by MITRE

eSecurity Planet

MITRE has released its latest list of the top 25 most exploited vulnerabilities and exposures found in software. The MITRE CWE list is different from the product-specific CVE lists from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and other agencies and instead focuses on more generic software development weaknesses, similar to the OWASP list for web applications.

Software 105
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Google to delete location data of trips to abortion clinics

Malwarebytes

The historical overturning of Roe v. Wade in June prompted lawmakers and technology companies to respond with deep concern over the future of data. Google is one of those companies. In a post to “The Keyword” blog last week, Google said it will act further in protecting its users’ privacy by automatically deleting historical records of visits to sensitive locations.

article thumbnail

EBI Files Patent for Blockchain Drive to Thwart Ransomware Attacks

Security Boulevard

Everything Blockchain Inc. (EBI) has filed a patent application for an approach to data protection based on a blockchain platform. Cedric Harris, chief research officer for EBI, said the EBI Blockchain Drive (EB Drive) will provide IT teams with a means to thwart ransomware attacks. A pristine copy of data will also be made available. The post EBI Files Patent for Blockchain Drive to Thwart Ransomware Attacks appeared first on Security Boulevard.

article thumbnail

The Effect Of STEM Education On Learning

SecureBlitz

STEM education is a topic of high interest in the educational domain. Everyone is talking about it and its positive. Read more. The post The Effect Of STEM Education On Learning appeared first on SecureBlitz Cybersecurity.

Education 101
article thumbnail

Defense Vs. Control: The Optimal Approach to Cloud Security

Security Boulevard

A cloud environment is not a replica of an on-premises network or a data center. Unlike traditional data centers which have a rigid IT architecture blueprint, the cloud comes with flexibility that allows users to architect their infrastructure and resources. Within this dynamic space, users can change their infrastructure or decide to go with a. The post Defense Vs.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

NIST Announces First Four Quantum-Resistant Cryptographic Algorithms

The Hacker News

The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has chosen the first set of quantum-resistant encryption algorithms that are designed to "withstand the assault of a future quantum computer.

article thumbnail

4 Ways to Engage Employees in Your Cybersecurity Defense

Security Boulevard

Humans make mistakes. But when it comes to cybersecurity, their unintentional actions can translate to big costs for your company. In fact, according to the World Economic Forum’s Global Risk Report 2022, 95% of cybersecurity issues are traced to human error. Here are a few ways to strengthen this weak link in your security chain. . It is well-known that the weakest link in most companies’ cybersecurity programs is their employees.

article thumbnail

OpenSSL Releases Patch for High-Severity Bug that Could Lead to RCE Attacks

The Hacker News

The maintainers of the OpenSSL project have released patches to address a high-severity bug in the cryptographic library that could potentially lead to remote code execution under certain scenarios. The issue, now assigned the identifier CVE-2022-2274, has been described as a case of heap memory corruption with RSA private key operation that was introduced in OpenSSL version 3.0.

98
article thumbnail

Palo Alto Networks Issues BRc4 Attack Simulation Tool Warning

Security Boulevard

The Unit 42 research arm of Palo Alto Networks this week reported a Brute Ratel C4 (BRc4) adversarial attack simulation tool is being used by cyberattackers to evade detection. Peter Renals, principal threat researcher for Unit 42, said BRc4 is being used as an alternative to the Cobalt Strike penetration testing tool that many cybercriminals. The post Palo Alto Networks Issues BRc4 Attack Simulation Tool Warning appeared first on Security Boulevard.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Apple's New "Lockdown Mode" Protects iPhone, iPad, and Mac Against Spyware

The Hacker News

Apple on Wednesday announced it plans to introduce an enhanced security setting called Lockdown Mode in iOS 16, iPadOS 16, and macOS Ventura to safeguard high-risk users against "highly targeted cyberattacks.

Spyware 97
article thumbnail

AMD Latest Victim of RansomHouse Gang

Security Boulevard

It’s been a challenging couple of years for AMD. After the last few years of disruption and amid the global chip shortage, the company has been attacked by the RansomHouse Extortion Group, which claims to have exfiltrated more than 450 GB of data. “In an ironic twist of fate, AMD survived the global chip supply. The post AMD Latest Victim of RansomHouse Gang appeared first on Security Boulevard.

article thumbnail

Ransomware, hacking groups move from Cobalt Strike to Brute Ratel

Bleeping Computer

Hacking groups and ransomware operations are moving away from Cobalt Strike to the newer Brute Ratel post-exploitation toolkit to evade detection by EDR and antivirus solutions. [.].

Hacking 96
article thumbnail

FUD vs Facts: What to Look for When Evaluating Cybersecurity Tools

Security Boulevard

The psychology of fear plays a central role in the success rate of social engineering cyber-attacks. These hackers rely on eliciting an emotional response from their victims, creating a sense of urgency towards action, which often works. This tactic is commonly referred to as “Fear, Uncertainty, and Doubt,” or “FUD,” and it’s not relegated to. Read article > The post FUD vs Facts: What to Look for When Evaluating Cybersecurity Tools appeared first on Axio.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.