Wed.Dec 01, 2021

article thumbnail

Cybersecurity: Increase your protection by using the open-source tool YARA

Tech Republic Security

This won't replace antivirus software, but it can help you detect problems much more efficiently and allows more customization. Here's how to install it on Mac, Windows and Linux.

Antivirus 218
article thumbnail

Finland Fending Off FluBot Malware, Again

Security Boulevard

The Finnish National Cyber Security Centre (NCSC-FI) has issued a warning to citizens about the current version of the FluBot malware campaign which is affecting “tens of thousands of people in Finland.” The malware campaign leverages SMS by sending out numerous text messages, according to NCSC-FI. The messages, all of which are written in Finnish, The post Finland Fending Off FluBot Malware, Again appeared first on Security Boulevard.

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deloitte: How sensitive AI data may become more private and secure in 2022

Tech Republic Security

Technologies are available to better protect the data used in artificial intelligence, but they're not quite ready for prime time, says Deloitte.

article thumbnail

Jumping the air gap: 15 years of nation?state effort

We Live Security

ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs. The post Jumping the air gap: 15 years of nation‑state effort appeared first on WeLiveSecurity.

Malware 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

State-backed hackers increasingly use RTF injection for phishing

Bleeping Computer

Three APT hacking groups from India, Russia, and China, were observed using a novel RTF (rich text format) template injection technique in their recent phishing campaigns. [.].

Phishing 145
article thumbnail

How to Proactively Remove File-Based Malware

Security Boulevard

There’s no question that the past 18 months have been challenging for technology and cybersecurity leaders. Cyberthreats have skyrocketed at a time when companies have been enabling hybrid workforce models and transforming their businesses. In fact, 2020 was one for the record books in terms of security incidents. Broadvoice, Facebook and Microsoft reported breaches involving.

Malware 142

More Trending

article thumbnail

Deepfake technology and its implications for the future of cyber-attacks

CyberSecurity Insiders

Introduction. Recently I received a call on my personal cellphone. The call started out as many do; with a slight pause after I answered. Initially I assumed this pause was caused by whatever auto-dialer software the spammer was using to initiate the call before their text-to-speech software starts talking about my car’s extended warranty. Once the pause was over, however, I was surprised by a very human voice.

article thumbnail

The Ying Yang of Your Engine

Javvad Malik

I recently argued that I don’t really care about an aeroplane’s engine and that I only cared about the experience I have travelling on it. Some people argued with me that the engine is very important and without an engine the aeroplane won’t fly. Allow me to elaborate my thinking with the example of a road. When you’re building a road, engineering is of utmost importance.

article thumbnail

Researchers Warn Iranian Users of Widespread SMS Phishing Campaigns

The Hacker News

Socially engineered SMS messages are being used to install malware on Android devices as part of a widespread phishing campaign that impersonates the Iranian government and social security services to make away with credit card details and steal funds from victims' bank accounts.

Phishing 136
article thumbnail

Planned Parenthood LA discloses data breach after ransomware attack

Bleeping Computer

?Planned Parenthood Los Angeles has disclosed a data breach after suffering a ransomware attack in October that exposed the personal information of approximately 400,000 patients. [.].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

New EwDoor Botnet Targeting Unpatched AT&T Network Edge Devices

The Hacker News

A newly discovered botnet capable of staging distributed denial-of-service (DDoS) attacks targeted unpatched Ribbon Communications (formerly Edgewater Networks) EdgeMarc appliances belonging to telecom service provider AT&T by exploiting a four-year-old flaw in the network appliances.

DDOS 133
article thumbnail

Cyber insurance explained: What it covers and why prices continue to rise

CSO Magazine

Cyber insurance definition. Cyber insurance, also referred to as cyber risk insurance or cyber liability insurance coverage (CLIC), is a policy with an insurance carrier to mitigate risk exposure by offsetting costs involved with damages and recovery after a cyber-related security breach or similar event. What does a cyber insurance policy cover? Cyber insurance policies are becoming more diverse as the market matures, and the finer details regarding what one policy may cover can be somewhat dif

article thumbnail

Emotet now spreads via fake Adobe Windows App Installer packages

Bleeping Computer

The notorious Emotet malware is now distributed through malicious Windows App Installer packages that pretend to be Adobe PDF software. [.].

Malware 144
article thumbnail

Cyber insurance explained and why you need it

CSO Magazine

Cyber insurance definition. Cyber insurance, also referred to as cyber risk insurance or cyber liability insurance coverage (CLIC), is a policy with an insurance carrier to mitigate risk exposure by offsetting costs involved with damages and recovery after a cyber-related security breach or similar event. What does a cyber insurance policy cover? Cyber insurance policies are becoming more diverse as the market matures, and the finer details regarding what one policy may cover can be somewhat dif

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Have you downloaded that Android malware from the Play Store lately?

Malwarebytes

Security researchers have discovered banking Trojan apps on the Google Play Store, and say they have been downloaded by more than 300,000 Android users. As you may know, banking Trojans are kitted for stealing banking data like your username and password, and two-factor authentication (2FA) codes that you use to login to your bank account. They also capable of stealing phone keystrokes, and taking screenshots of what you’re seeing on your phone as you use it.

Malware 124
article thumbnail

Russian Man Gets 60 Months Jail for Providing Bulletproof Hosting to Cyber Criminals

The Hacker News

A Russian national charged with providing bulletproof hosting services for cybercriminals, who used the platform to spread malware and attack U.S. organizations and financial institutions between 2009 to 2015, has received a 60-month prison sentence.

Malware 123
article thumbnail

China’s Data Privacy Law Poses Challenge for International Companies

eSecurity Planet

Businesses that have spent the past three-plus years adapting to the European Union’s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been criticized as being more vague in its wording and harsher in its penalties. China’s Personal Information and Privacy Law (PIPL), enacted early last month, is designed to give more than 1.4 billion people greater control over the data collected by private companies and what those companies can do with t

article thumbnail

When acting turns criminal: Deepfakes and voice impersonators in the cybercriminal underground

Digital Shadows

You’ve probably heard the old adage: “Fool me once, shame on you. Fool me twice, shame on me.” Falling for. The post When acting turns criminal: Deepfakes and voice impersonators in the cybercriminal underground first appeared on Digital Shadows.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The ROI of Moving Away from a State-by-State Privacy Law Approach

TrustArc

Consumer data and privacy laws vary state-by-state and are constantly changing. It’s difficult for organizations to make sense of all the varied rules and regulations — which leaves many businesses unknowingly vulnerable to heavy regulatory fines. Our whitepaper So Many States, So Many Privacy Laws offers practical tips to keep all of this information straight […].

119
119
article thumbnail

Most people aren’t upgrading to Windows 11: Not the end of the world

Malwarebytes

Windows 11 is experiencing an apparent lack of uptake among Windows users. If this survey is accurate, less than 1% of 10 million PCs surveyed are running the new operating system. In fact, more machines are using Windows XP. That may surprise you. It might even seem like a bit of an embarrassing failure for Microsoft. However, the low numbers could well be a very good thing overall.

117
117
article thumbnail

Improving Cybersecurity With MITRE ATT&CK Framework

Security Boulevard

In my previous blog posts, I’ve talked about the NIST CSF and another framework from the nonprofit Center for Internet Security (CIS), which has a smaller set of controls to help companies and organizations secure their environments. Now, I want to talk about the MITRE ATT&CK framework. But let’s start at the beginning: First, who. The post Improving Cybersecurity With MITRE ATT&CK Framework appeared first on Security Boulevard.

article thumbnail

Microsoft announces new security, privacy features at Ignite

CSO Magazine

The recent Microsoft Ignite event had a strong security theme that featured a rebranding of its Defender products and tools to help comply with privacy regulations. The pandemic has pushed all organizations to be more flexible and introduce technology that would otherwise have taken years to deploy. We are all pushing our IT teams to do more and protect more.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Europol: 18k money mules caught laundering money from online fraud

Bleeping Computer

Europol has announced the arrest of 1,803 money mules out of 18,351 identified following an international money-laundering crackdown operation codenamed "EMMA 7." [.].

117
117
article thumbnail

Dell Allies with AWS to Protect Data

Security Boulevard

Dell Technologies and Amazon Web Services (AWS) announced today at the AWS re:Invent conference that Dell EMC PowerProtect Cyber Recovery for AWS is available to enable organizations to create a pristine copy of their data that can be accessed in the event of a cyberattack. Previously available on hypervisors from VMware, Dell is now making. The post Dell Allies with AWS to Protect Data appeared first on Security Boulevard.

article thumbnail

Hackers Increasingly Using RTF Template Injection Technique in Phishing Attacks

The Hacker News

Three different state-sponsored threat actors aligned with China, India, and Russia have been observed adopting a new method called RTF (aka Rich Text Format) template injection as part of their phishing campaigns to deliver malware to targeted systems.

Phishing 113
article thumbnail

80K Retail WooCommerce Sites Exposed by Plugin XSS Bug

Threatpost

The Variation Swatches plugin security flaw lets attackers with low-level permissions tweak important settings on e-commerce sites to inject malicious scripts.

Retail 119
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Mozilla fixes critical flaw in Network Security Services (NSS) cryptography library

Security Affairs

Mozilla fixed a critical memory corruption issue affecting its cross-platform Network Security Services (NSS) set of cryptography libraries. Mozilla has addressed a heap-based buffer overflow vulnerability (CVE-2021-43527) in its cross-platform Network Security Services (NSS) set of cryptography libraries. Network Security Services ( NSS ) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.

article thumbnail

Critical Bug in Mozilla’s NSS Crypto Library Potentially Affects Several Other Software

The Hacker News

Mozilla has rolled out fixes to address a critical security weakness in its cross-platform Network Security Services (NSS) cryptographic library that could be potentially exploited by an adversary to crash a vulnerable application and even execute arbitrary code. Tracked as CVE-2021-43527, the flaw affects NSS versions prior to 3.73 or 3.68.

Software 109
article thumbnail

Healthcare Ransomware Attacks Persist

Security Boulevard

Ransomware attacks launched against healthcare providers are on the rise as 2021 draws to a close. The HHS Office for Civil Rights’ HIPAA Breach Reporting Tool points to several high-impact ransomware attacks related to the healthcare industry. The post Healthcare Ransomware Attacks Persist appeared first on Security Boulevard.

article thumbnail

New RTF Template Inject technique used by APT groups in recent attacks

Security Affairs

Nation-state actors from China, India, and Russia, were spotted using a novel RTF template injection technique in recent attacks. APT groups from China, India, and Russia have used a new RTF (rich text format) template injection technique in recent phishing attacks. The technique was first reported by the security firm Proofpoint spotted which observed phishing campaigns using the weaponized RTF template injection since March 2021.

Phishing 109
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.