Wed.Dec 02, 2020

article thumbnail

Impressive iPhone Exploit

Schneier on Security

This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device­ — over Wi-Fi, with no user interaction required at all. Oh, and exploits were wormable­ — meaning radio-proximity exploits could spread from one nearby device to another, once again, with no user interaction needed. […].

Passwords 283
article thumbnail

Account Hijacking Site OGUsers Hacked, Again

Krebs on Security

For at least the third time in its existence, OGUsers — a forum overrun with people looking to buy, sell and trade access to compromised social media accounts — has been hacked. An offer by the apparent hackers of OGUsers, offering to remove account information from the eventual database leak in exchange for payment. Roughly a week ago, the OGUsers homepage was defaced with a message stating the forum’s user database had been compromised.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware, Adware Disguised As Minecraft Mods Infect Over 1 Million Android Devices

Adam Levin

Android users trying to install mods for the wildly popular game title Minecraft may be unintentionally installing adware and malware to their devices. According to new research from cybersecurity and anti-virus company Kaspersky Lab , over twenty apps available to download on Google’s Play store claiming to add additional content to the game were “malvertising,” which launches unwanted popup ads on a user’s device.

Adware 173
article thumbnail

Russia-linked APT Turla used a new malware toolset named Crutch

Security Affairs

Russian-linked cyberespionage group Turla employed a new malware toolset, named Crutch, in targeted attacks aimed at high-profile targets. Russian-linked APT group Turla has used a previously undocumented malware toolset, named Crutch, in cyberespionage campaigns aimed at high-profile targets, including the Ministry of Foreign Affairs of a European Union country.

Malware 121
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Sales of CEO email accounts may give cyber criminals access to the "crown jewels" of a company

Tech Republic Security

Multiple security professionals said stolen credentials on Exploit.in were part of a tidal wave of business email compromise attacks.

article thumbnail

K12 education giant paid the ransom to the Ryuk gang

Security Affairs

Online education giant K12 Inc. was hit by Ryuk ransomware in the middle of November and now has paid a ransom to avoid data leak. The education company Online education giant K12 Inc. has paid a ransom to the ransomware operators after the gang infected its systems in November. K12 Inc. is a for-profit education company that sells online schooling and curricula.

Education 119

More Trending

article thumbnail

iPhone Bug Allowed for Complete Device Takeover Over the Air

Threatpost

Researcher Ian Beer from Google Project Zero took six months to figure out the radio-proximity exploit of a memory corruption bug that was patched in May.

Wireless 122
article thumbnail

Multi-Vector Miner+Tsunami Botnet with SSH Lateral Movement

Security Affairs

Security researcher Tolijan Trajanovski ( @tolisec ) analyzed the multi-vector Miner+Tsunami Botnet that implements SSH lateral movement. A fellow security researcher, 0xrb , shared with me samples of a botnet that propagates using weblogic exploit. The botnet was also discovered by @ BadPackets 5 days ago and it is still active as of now, December 1, 2020.

IoT 99
article thumbnail

Scammers Use Home Addresses of Targets in France

Trend Micro

A recent phishing scam uses the name of a retail company to target users from France. The scheme employs a more targeted social engineering technique as it features each target's actual home address and phone number.

article thumbnail

Turla Crutch: Keeping the “back door” open

We Live Security

ESET researchers discover a new backdoor used by Turla to exfiltrate stolen documents to Dropbox. The post Turla Crutch: Keeping the “back door” open appeared first on WeLiveSecurity.

Malware 98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Productivity Score: Microsoft limits features of new tool following 'workplace surveillance' concerns

Tech Republic Security

Productivity Score will no longer identify how individual users interact with Microsoft 365 apps.

article thumbnail

This Company Uses AI to Outwit Malicious AI

WIRED Threat Level

Robust Intelligence is among a crop of companies that offer to protect clients from efforts at deception.

article thumbnail

DNS Filtering: A Top Battle Front Against Malware and Phishing

Threatpost

Peter Lowe with DNSFilter discusses the science behind domain name system (DNS) filtering and how this method is effective in blocking out phishing and malware.

DNS 94
article thumbnail

APT groups targets US Think Tanks, CISA, FBI warn

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) and FBI are warning of attacks carried out by threat actors against United States think tanks. APT groups continue to target United States think tanks, the Cyber Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warn. The work of US think tanks has a great relevance for nation-state attackers that focus on the U.S. policy.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Turla’s ‘Crutch’ Backdoor Leverages Dropbox in Espionage Attacks

Threatpost

In a recent cyberattack against an E.U. country's Ministry of Foreign Affairs, the Crutch backdoor leveraged Dropbox to exfiltrate sensitive documents.

article thumbnail

From Geost to Locker: Monitoring the Evolution of Android Malware Obfuscation

Trend Micro

We looked into the evolution of an Android malware's obfuscation methods through samples nearly a year apart, Geost and Locker. Adding context to this discussion is the discovery that the authors of the malware used an external obfuscation service.

Malware 77
article thumbnail

Healthcare 2021: Cyberattacks to Center on COVID-19 Spying, Patient Data

Threatpost

The post-COVID-19 surge in the criticality level of medical infrastructure, coupled with across-the-board digitalization, will be big drivers for medical-sector cyberattacks next year.

article thumbnail

The Business Impact: Benefits of a Secure Website

SiteLock

The benefits of a secure website are critical. SiteLock explains some of the benefits of having a secure website. To learn about our services contact us today. The post The Business Impact: Benefits of a Secure Website appeared first on The SiteLock Blog.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Microsoft Revamps ‘Invasive’ M365 Feature After Privacy Backlash

Threatpost

The Microsoft 365 tool that tracked employee usage of applications like Outlook, Skype and Teams was widely condemned by privacy experts.

article thumbnail

How Appknox Helps In Dealing With SonarQube Weak Points

Appknox

When it comes to security, it’s not always the advanced and complex techniques that matter. At times, even the simplest of the practices can do wonders for the security of your applications. Using tools like SonarQube and Appknox in the DevOps pipeline for a thorough code analysis is one such practice.

81
article thumbnail

Think-Tanks Under Attack by Foreign APTs, CISA Warns

Threatpost

The feds have seen ongoing cyberattacks on think-tanks (bent on espionage, malware delivery and more), using phishing and VPN exploits as primary attack vectors.

VPN 79
article thumbnail

Why I'd Take Good IT Hygiene Over Security's Latest Silver Bullet

Dark Reading

Bells and whistles are great, but you can stay safer by focusing on correct configurations, posture management, visibility, and patching.

118
118
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

How to Protect Your Business From Multi-Platform Malware Systems

The State of Security

The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.” However, some believe that their connections to North Korea might be a false flag intending to […]… Read More.

Malware 72
article thumbnail

Xerox DocuShare Bugs Allowed Data Leaks

Threatpost

CISA warns the leading enterprise document management platform is open to attack and urges companies to apply fixes.

90
article thumbnail

Loyal Employee. or Cybercriminal Accomplice?

Dark Reading

Can the bad guys' insider recruitment methods be reverse-engineered to reveal potential insider threats? Let's take a look.

article thumbnail

Online Schools Company Pays Hacker Ransom

SecureWorld News

A company that has powered online learning for more than 1 million students just disclosed it paid a ransom demand to hackers. K12 Inc., issued an unusually detailed statement to investors about the cyberattack, its decision to pay the ransom and next moves by the online education provider. What happened in this K12 ransomware attack. What happened in this ransomware attack?

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Unmanaged Devices Heighten Risks for School Networks

Dark Reading

Gaming consoles, Wi-Fi Pineapples, and building management systems are among many devices Armis says it discovered on K-12 school networks.

Risk 110
article thumbnail

The Top 3 Cybersecurity Threats In The Middle East

Digital Shadows

SECURITY CONCERNS ARE HEATING UP IN THE MIDDLE EAST Rising rates of cybercriminal activities occur as threat actors observe the. The post The Top 3 Cybersecurity Threats In The Middle East first appeared on Digital Shadows.

article thumbnail

FBI: BEC Scammers Could Abuse Email Auto-Forwarding

Dark Reading

Private Industry Notification warns of the role email auto-forwarding could be used in business email compromise attacks.

84
article thumbnail

Lawful processing after Schrems II – a practical guide for continued compliance

BH Consulting

The fallout from the European Court of Justice (CJEU)/Schrems II ruling on the validity of the US/EU Privacy Shield continues to have an impact on organisations. The ruling makes it challenging to transfer data to countries where equivalent data protection is not possible, leaving companies with the difficult task to find a defensible position for such transfers.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.