Thu.Jul 14, 2022

article thumbnail

GUEST ESSAY: Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’

The Last Watchdog

Phishing itself is not a new or a particularly complicated threat. But the emergence of advanced phishing techniques – “DeepSea Phishing” – poses an entirely new challenge for enterprises. Related: Deploying human sensors. Phishing comes with a simple premise – lure someone to interact with a malicious link, file, or credentials-input, disguised as a legitimate email or website.

Phishing 277
article thumbnail

New Browser De-anonymization Technique

Schneier on Security

Researchers have a new way to de-anonymize browser users, by correlating their behavior on one account with their behavior on another: The findings, which NJIT researchers will present at the Usenix Security Symposium in Boston next month, show how an attacker who tricks someone into loading a malicious website can determine whether that visitor controls a particular public identifier, like an email address or social media account, thus linking the visitor to a piece of potentially personal data

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

State-sponsored cyberespionage campaigns continue targeting journalists and media

Tech Republic Security

Journalists have information that makes them particularly interesting for state-sponsored cyberespionage threat actors. Learn more about these threats now. The post State-sponsored cyberespionage campaigns continue targeting journalists and media appeared first on TechRepublic.

Media 218
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Security in the Context of International Security , online, on September 22, 2022. I’m speaking at IT-Security INSIDE 2022 in Zurich, Switzerland, on September 22, 2022. The list is maintained on this page.

231
231
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to remove your saved passwords in Chrome

Tech Republic Security

Given Chrome's frequent security issues, Jack Wallen strongly believes you shouldn't be saving your passwords to Google's browser. Here, Jack shows you how to delete and prevent them from re-syncing. The post How to remove your saved passwords in Chrome appeared first on TechRepublic.

Passwords 174
article thumbnail

DHS Review Board Deems Log4j an 'Endemic' Cyber Threat

Dark Reading

Vulnerability will remain a "significant" threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.

LifeWorks

More Trending

article thumbnail

10,000 organisations targeted by phishing attack that bypasses multi-factor authentication

The State of Security

Microsoft has shared details of a widespread phishing campaign that not only attempted to steal the passwords of targeted organisations, but was also capable of circumventing multi-factor authentication (MFA) defences. Read more in my article on the Tripwire State of Security blog.

article thumbnail

New variant of Android SpyJoker malware removed from Play Store after 3 million+ installs

Malwarebytes

Security researcher Maxime Ingrao has found a new variant of Android/Trojan.Spy.Joker which he’s dubbed Autolycos. Malware in this family secretly subscribes users to premium services. The researcher noted that the eight applications that contained this malware had racked up a total of over 3 million downloads. Toll fraud malware. Toll fraud malware is a subcategory of billing fraud in which malicious applications subscribe users to premium services without their knowledge or consent.

Malware 137
article thumbnail

API security moves mainstream

We Live Security

The heavyweights are now moving into API security, cementing it as “A Thing”. The post API security moves mainstream appeared first on WeLiveSecurity.

article thumbnail

New Phishing Kit Hijacks WordPress Sites for PayPal Scam

Dark Reading

Attackers use scam security checks to steal victims' government documents, photos, banking information, and email passwords, researchers warn.

Scams 131
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Endpoint security for Mac: 3 best practices

Malwarebytes

If you’re one of the 50% of small and medium-sized businesses (SMBs) that use Mac devices today, chances are your IT and security teams have a ton of Mac endpoints to monitor. Securing that many endpoints can get really complex, really fast, especially when you consider that the common wisdom that Macs don’t get malware simply isn’t true: in fact, the number of malware detections on Mac jumped 200% year-on-year in 2021.

DNS 129
article thumbnail

S3 Ep91: CodeRed, OpenSSL, Java bugs and Office macros [Podcast + Transcript]

Naked Security

Latest episode - listen now! Great discussion, technical content, solid advice. all covered in plain English.

article thumbnail

Predatory Sparrow massively disrupts steel factories while keeping workers safe

Malwarebytes

Stuxnet ‘s attack on Iran’s uranium enrichment facilities manifested fears of cyberattacks leaking into the real world. What once was theory is now upon us. Two weeks ago, multiple Iranian steel facilities experienced a cyberattack that might have been pulled off by what many cybersecurity experts in the field believe is “a professional and tightly regulated team of state-sponsored military hackers, who may even be obliged to carry out risk assessments before they launch an ope

article thumbnail

5 key considerations for your 2023 cybersecurity budget planning

CSO Magazine

As CISOs look to prepare their 2023 security budgets, some might be asking themselves, “where do I begin?” There are such varied and rapidly changing facets of defending organizations against cyber threats that the task of sorting out which risks need the most attention can seem overwhelming. Nevertheless, security leaders need to begin thinking about how much funding they will need and how they will allocate their budgets.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Elden Ring maker Bandai Namco hit by ransomware and data leaks

Malwarebytes

It’s not been a great couple of months for gaming giant Bandai Namco. The name behind smash hit titles like Elden Ring and Dark Souls has endured a long run of cheats and hacks. Hacking concerns led to Remote Code Execution issues , and multiplayer features in Souls titles were disabled for months. In March, in-game cheats in Elden Ring meant players had to turn off multiplayer to avoid new attacks.

article thumbnail

The new Retbleed speculative execution attack impacts both Intel and AMD chips?

Security Affairs

Researchers warn of a new vulnerability, dubbed Retbleed, that impacts multiple older AMD and Intel microprocessors. ETH Zurich researchers Johannes Wikner and Kaveh Razavi discovered a new vulnerability, dubbed Retbleed, that affects multiple older AMD and Intel microprocessors. An attacker can exploit the flaw to bypass current defenses and perform in Spectre -based attacks.

Hacking 116
article thumbnail

Making Biometrics Work: 3 Ways To Jumpstart the Process

Security Boulevard

As advances in technology continue to improve the efficiency of work environments, biometric technology has emerged as a crucial part of securing the workplace both logically and physically. The COVID-19 pandemic accelerated the adoption of remote work, forcing changes in the way organizations approached security. Biometric authentication provides a safe way to accommodate flexible workforces.

article thumbnail

China’s Tonto Team increases espionage activities against Russia

Malwarebytes

According to analyses of several cybersecurity firms and CERT (Computer Emergency Response Team) Ukraine (CERT-UA), the state-sponsored threat actor group Tonto Team , which has been linked to China-backed cyber operations, is ramping up its spying campaign against Russian government agencies. . The campaign, which involves an email, a Word document file in RTF (Rich Text File) format, and a backdoor payload, starts off with socially engineering recipients to convince them to open a malformed at

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Windows 8.1 displays full-screen warning as it nears its last day of support

Graham Cluley

Turn on a PC running Microsoft Windows 8.1 and you're likely to be greeted with a full-screen message warning that the operating system will no longer be supported after 10 January 2023, and - critically - will no longer be receiving any security updates.

115
115
article thumbnail

Smart thermostats, Rabbits, and TV Pickup

Javvad Malik

In a paper titled Unintended consequences of smart thermostats in the transition to electrified heating , researchers discovered that most people don’t bother changing the default heating times on these thermostats. As a result at 6am, the strain on the electricity grid peaks as every thermostat clicks on. Akin to launching an inadvertent DDoS attack.

DDOS 113
article thumbnail

Microsoft published exploit code for a macOS App sandbox escape flaw

Security Affairs

Microsoft published the exploit code for a vulnerability in macOS that can allow an attacker to escape the sandbox. Microsoft publicly disclosed technical details for an access issue vulnerability, tracked as CVE-2022-26706 , that resides in the macOS App Sandbox. “Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system.” reads the post published by Microsoft.

Hacking 112
article thumbnail

Low-income consumers preyed on by fake ISP during pandemic, FCC says

Malwarebytes

The FCC (Federal Communications Commission) has proposed a fine of $220,210 against Kyle Traxler of Ohio for allegedly establishing the bogus internet provider, Cleo Communications, to scam low-income consumers. The victims believed they were receiving government-approved discounts on internet services and devices during pandemic lockdowns in the US.

Scams 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

NATO Announces Virtual Rapid Response Cybersecurity Capability

Security Boulevard

In the months since Russia invaded Ukraine, NATO has flexed its muscles and responded swiftly and with solidarity against the country’s show of military aggression. So, it seemed logical that the expanding alliance would aim to meet cyberattacks with a virtual rapid response cybersecurity capability, announced during its recent summit in Madrid. Underscoring its promise.

article thumbnail

Lilith, A New Ransomware, Has Claimed Its First Victim

Heimadal Security

The Lilith virus is the name of a ransomware threat. The primary objective of this kind of malware is to get access to your computer so that it may begin encrypting your information. This is done so that the virus may blackmail you with a ransom letter in order to get money from you. If […]. The post Lilith, A New Ransomware, Has Claimed Its First Victim appeared first on Heimdal Security Blog.

article thumbnail

A New Attack Can Unmask Anonymous Users on Any Major Browser

WIRED Threat Level

Researchers have found a way to use the web's basic functions to identify who visits a site—without the user detecting the hack.

Hacking 110
article thumbnail

A Guide to DAC: An Overview of Discretionary Access Control

Heimadal Security

The protection of sensitive data is an extremely vital part of the field of information technology. DAC requires users to have authorization to access resources and mandates that these users must have the necessary privileges for their assigned tasks. However, DAC does not require that users be able to make changes or create new resources. […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

4 Misconceptions about SAST for Mobile

Appknox

“Static Application security testing(SAST), or static analysis is a methodology testing that examines source code to identify vulnerabilities that make the applications of your organization vulnerable to attack. SAST, also known as white-box testing, scans an application before code compilation takes place. It helps developers build efficient code without slowing them down.

Mobile 105
article thumbnail

Why Do Organizations Need an Email Security Policy?

Heimadal Security

Despite the rise and increasing popularity of instant messaging and collaboration tools, email still plays a significant and necessary role in the majority of organizations. It offers a quick way to get in touch with employees, clients, partners, and suppliers. It is undeniably the most effective and economical method for usual inter-/intra-organizational communication worldwide.

article thumbnail

China accuses India of launching Cyber Attacks on Pakistan

CyberSecurity Insiders

For the first time in history, China has openly criticized India for launching cyber attacks on Pakistan’s critical infrastructure using a Chinese code name. It also accused the Indian Subcontinent of terrorizing cyberspace by weaponizing IT for some objectives. India has counter-attacked its neighbor, saying it was falsely attempting to malign the image of the country, just to divert the attention of the world from its own malicious activities in cyberspace.

article thumbnail

Mantis Botnet Behind the Largest HTTPS DDoS Attack Targeting Cloudflare Customers

The Hacker News

The botnet behind the largest HTTPS distributed denial-of-service (DDoS) attack in June 2022 has been linked to a spate of attacks aimed at nearly 1,000 Cloudflare customers. Calling the powerful botnet Mantis, the web performance and security company attributed it to more than 3,000 HTTP DDoS attacks against its users.

DDOS 103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!