Fri.Oct 23, 2020

article thumbnail

New Report on Police Decryption Capabilities

Schneier on Security

There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it. This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia.

Mobile 282
article thumbnail

75% of all 56 US states and territories show signs of vulnerable election IT infrastructure, report finds

Tech Republic Security

The report comes as officials in Georgia revealed more information about a ransomware attack that affected a digital voter database.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

COVID-19 Vaccine-Maker Hit with Cyberattack, Data Breach

Threatpost

Dr. Reddy's, the contractor for Russia’s “Sputinik V” COVID-19 vaccine and a major generics producer, has had to close plants and isolate its data centers.

article thumbnail

FBI and CISA joint alert blames Russia’s Energetic Bear APT for US government networks hack

Security Affairs

The US government declared that Russia-linked APT group Energetic Bear has breached US government networks and exfiltrated data. A joint security advisory published by The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) revealed that Russia-linked APT group Energetic Bear has breached US government networks and exfiltrated data.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

IoT Device Takeovers Surge 100 Percent in 2020

Threatpost

The COVID-19 pandemic, coupled with an explosion in the number of connected devices, have led to a swelling in IoT infections observed on wireless networks.

IoT 132
article thumbnail

US Treasury Sanctions Russian Institution Linked to Triton Malware

Dark Reading

Triton, also known as TRISIS and HatMan, was developed to target and manipulate industrial control systems, the US Treasury reports.

Malware 129

More Trending

article thumbnail

Sopra Steria hit by the Ryuk ransomware gang

Security Affairs

French IT outsourcer Sopra Steria hit by ‘cyberattack’, Ryuk ransomware suspected. French IT outsourcer Sopra Steria has been hit by a ransomware attack, while the company did not reveal the family of malware that infected its systems, local media speculate the involvement of the Ryuk ransomware. “A cyber attack was detected on the Sopra Steria computer network on the evening of October 20.

article thumbnail

What Is Network Segmentation and Why It Matters?

CompTIA on Cybersecurity

Locked doors behind locked doors discourage lazy threat actors and force them to look elsewhere. Therefore, there is no substitute for network segmentation when it comes to protecting your data.

102
102
article thumbnail

A Pause to Address 'Ethical Debt' of Facial Recognition

Dark Reading

Ethical use will require some combination of consistent reporting, regulation, corporate responsibility, and adversarial technology.

article thumbnail

Georgia Election Data Hit in Ransomware Attack

Threatpost

With Election Day approaching, local governments need to be prepared for malware attacks on election infrastructure.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cybercriminals Could be Coming After Your Coffee

Dark Reading

Researchers show no IoT device is too small to fall victim to ransomware techniques.

IoT 142
article thumbnail

How Police Can Crack Locked Phones—and Extract Information

WIRED Threat Level

A report finds 50,000 cases where law enforcement agencies turned to outside firms to bypass the encryption on a mobile device.

Mobile 105
article thumbnail

Ransomware Takes Down Network of French IT Giant

Threatpost

Sopra Steria hit with cyber attack that reportedly encrypted parts of their network on Oct. 20 but has remained mostly mum on details.

article thumbnail

Flurry of Warnings Highlight Cyber Threats to US Elections

Dark Reading

FBI and intelligence officials issue fresh warnings about election interference attempts by Iranian and Russian threat actors.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Louisiana Calls Out National Guard to Fight Ransomware Surge

Threatpost

An investigation showed a custom backdoor RAT and the Emotet trojan in the networks of municipal victims of the attacks.

article thumbnail

Ransomware Hits Voter Database in Georgia

SecureWorld News

Ransomware hit Hall County government systems earlier this month, and now it is coming out that a particular voter database system remains offline because of the cyberattack. Let's look at what we know about this attack. Election security: ransomware impacts voter database. In this case, it's the database that will call up a voter's known signature to match it to the signature on their absentee ballot, so the ballot is confirmed and counted.

article thumbnail

Election Security: Beyond Mail-In Voting

Threatpost

There are many areas of the election process that criminal hackers can target to influence election results.

InfoSec 90
article thumbnail

The US Sanctions Russians For Potentially ‘Fatal’ Malware

WIRED Threat Level

The message is meant to deter any similar attack against US infrastructure.

Malware 101
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Microsegmentation: The Core of Zero Trust Security

eSecurity Planet

Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed.

article thumbnail

Marcus Carey Joins ShadowTalk

Digital Shadows

We recently had mentor, author, founder, US Navy veteran, and Texan, Marcus Carey join ShadowTalk. For those who don’t know. The post Marcus Carey Joins ShadowTalk first appeared on Digital Shadows.

52
article thumbnail

Cybercriminals Could be Coming After Your Coffee

Dark Reading

Researchers show no IoT device is too small to fall victim to ransomware techniques.

IoT 79
article thumbnail

Friday Squid Blogging: Squid-like Nebula

Schneier on Security

Pretty astronomical photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

294
294
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

How 30 Lines of Code Blew Up a 27-Ton Generator

WIRED Threat Level

A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair—with a file no bigger than a gif.

Hacking 139
article thumbnail

Iran-Linked Seedworm APT target orgs in the Middle East

Security Affairs

The Iran-linked cyber espionage group tracked as Seedworm started using a new downloader and is conducting destructive attacks. The Iran-linked cyber-espionage group Seedworm (aka MuddyWater MERCURY , and Static Kitten) was observed using a new downloader in a new wave of attacks. Security experts pointed out that the threat actor started conducting destructive attacks.

article thumbnail

U.S. Levies Sanctions Against Russian Research Institution Linked to Triton Malware

Threatpost

The latest in a flurry of actions this week, tied to foreign threats against U.S. computer systems, includes sanctions by the Department of the Treasury.

Malware 85
article thumbnail

Weekly Update 214

Troy Hunt

It's a very tired weekly update as I struggle a little bit after only a few hours' sleep but hey, at least I've got a nice haircut! In more topical news, I'm pretty happy about the experience installing Ubiquiti's AmpliFi ALIEN gear into a neighbour's house, it's Trump on top of Trump with his password commentary and then his actual password and finally, questions from the audience on AmpliFi versus UniFi which some people might find interesting.

Passwords 174
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

US whistleblower Edward Snowden received permanent residency by Russian authorities

Security Affairs

The popular US whistleblower Edward Snowden has been granted permanent residency in Russia, the announcement was made by his lawyer. The former CIA employee and National Security Agency contractor Edward Snowden (37) has been granted permanent residency in Russia, his lawyer announced on Thursday. In 2013, Edward Snowden shed the light on the mass surveillance program operated by the US government to spy on its citizens and allies.