Mon.Jul 11, 2022

article thumbnail

Nigerian Prison Break

Schneier on Security

There was a massive prison break in Abuja, Nigeria: Armed with bombs, Rocket Propelled Grenade (RPGs) and General Purpose Machine Guns (GPMG), the attackers, who arrived at about 10:05 p.m. local time, gained access through the back of the prison, using dynamites to destroy the heavily fortified facility, freeing 600 out of the prison’s 994 inmates, according to the country’s defense minister, Bashir Magashi… What’s interesting to me is how the defenders got the threat mo

242
242
article thumbnail

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

The Last Watchdog

It is astounding that billions of online accounts have been breached over the past 18 years and that US consumer accounts are by far the most compromised. Related: VPNs vs ZTNA. Now comes hard metrics quantifying the scope of this phenomenon. It’s in findings of a deep dive data analytics study led by Surfshark , a supplier of VPN services aimed at the consumer and SMB markets.

VPN 229
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple to tackle the cybersurveillance industry with new Lockdown mode

Tech Republic Security

The optional feature will be launched next fall to protect users who are particularly at risk of being targeted by advanced cyberattacks. The post Apple to tackle the cybersurveillance industry with new Lockdown mode appeared first on TechRepublic.

Risk 167
article thumbnail

New Highly-Evasive Linux Malware Infects All Running Processes

eSecurity Planet

Intezer Labs security researchers have identified a sophisticated new malware that targets Linux devices. Dubbed OrBit , the malware can gain persistence quickly, evade detection and hide its presence in network activity by manipulating logs. The module hooks functions called in shared libraries, which is pretty common for malware, but it also implements “advanced evasion techniques” and “remote capabilities over SSH.”.

Malware 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Ransomware attacks can and will shut you down

Cisco Security

No, Ransomware attacks are not random. From extortion to data breaches, ransomware is always evolving, and is becoming very lucrative with Ransomware-as-a-service kit making it easier to target organizations. The days of just a single bad actor searching for vulnerabilities in your security stack are over. Security Operations Centers (SOCs) and the security analyst community are dealing with a sophisticated global network of adversaries who can do irreversible damage.

article thumbnail

China Mind-Reading AI Tech can detect political deflectors early

CyberSecurity Insiders

China has finally developed a mind-reading technology related to Artificial Intelligence that can detect political deflectors early. Comprehensive National Science Centre in Hefei claims it has produced software that can not only measure the political loyalty of Chinese voters towards parties like the Communist Party but can also read the mind of politicians and catch them before they deflect to other parties.

LifeWorks

More Trending

article thumbnail

RANSOMWARE IN Q2 2022: RANSOMWARE IS BACK IN BUSINESS

Digital Shadows

The second quarter of 2022 was a significant and highly active quarter for ransomware gangs. We saw a noticeable rise. The post RANSOMWARE IN Q2 2022: RANSOMWARE IS BACK IN BUSINESS first appeared on Digital Shadows.

article thumbnail

Microsoft stops Windows 10 and 11 updates in Russia

CyberSecurity Insiders

Russia might soon start facing a lot of cyber troubles as most of the computers operating in the region are not been able to grasp updates, as the technology giant from America has chosen to skip up the entire region from now on, regarding software patches. In March 2022, as soon as Russian started an invasion of Ukraine, the Satya Nadella’s company announced a business withdrawal from the Russian Federation in retaliation for the war that is killing innocent Ukrainians.

Software 121
article thumbnail

Best User and Entity Behavior Analytics (UEBA) Tools for 2022

eSecurity Planet

User and entity behavior analytics (UEBA) tools burst onto the scene a few years ago. Some vendors still call it by that term. But others use user behavior analytics (UBA), threat analytics, and security analytics. Many others have simply packaged UEBA into larger suites, such as security information and event management (SIEM) and extended detection and response (XDR).

article thumbnail

France Virtual Mobile Operator La Poste Mobile targeted by ransomware attack

CyberSecurity Insiders

France-based virtual mobile operator ‘La Poste Mobile’ has made a public announcement through its website admitting to have become a victim to ransomware attack. And preliminary inquiries state that the attack could be of LockBit variant that targeted the systems on July 4th of this year. As of now, news is out that the file encrypting malware attack only affected the systems related to administration and management and did not affect the customer-base.

Mobile 119
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How Honeypots Help IT Teams Defend against Cyber Attacks

Heimadal Security

Honeypots are designed to trick attackers into thinking they’ve found a real machine. The goal is to deceive them into committing attacks against a fake system, thereby uncovering their tactics and network behaviors. Many organizations use honeypots alongside website security software to improve their intrusion prevention and detection systems (IDPS).

article thumbnail

Ransomware news trending on Google

CyberSecurity Insiders

1. A Financial service offering company to healthcare industry has admitted that a ransomware attack on its data firm could have led to a data breach affecting over 600 healthcare establishments. The firm that is being discussed is Professional Finance Company Inc (PFC) and was founded in the year 1904 and allows customers of various government organizations, utility firms and healthcare to pay their bills on time.

article thumbnail

Popular NFT Marketplace Phished for $540M

Threatpost

In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.

Phishing 110
article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

1.) Samsung has issued a public statement that it treats the data generated by its customers as a state secret and protects it with chip-level security to safeguard sensitive information. Reacting to the news on the government spyware like NSO Group Pegasus and Android affecting Hermit malware, the Mobile Giant of Korea said that it offers a firm commitment to safeguarding the personal and sensitive information of its users.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Experts warn of the new 0mega ransomware operation

Security Affairs

BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide. 0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported. The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations.

article thumbnail

Microsoft appears to be rolling back Office Macro blocking

Malwarebytes

We’re seeing several reports indicating that Microsoft may have rolled back its decision to block Macros in Office. Currently no official statement exists—the reports rely on a post by a Microsoft employee in the replies of the original article where the plan to block macros was announced. Earlier this year, Microsoft decided to disable macros downloaded from the Internet in five Office apps, by default.

Internet 108
article thumbnail

Mangatoon Sufferes Major Data Breach

Heimadal Security

Mangatoon is a comic book, manhua, manhwa, and manga reading app that is completely free to use. The program is very well-liked on both iOS and Android, and it is used by millions of individuals in order to view manga comics online. What Happened? Following the theft of user account information from an unprotected Elasticsearch […]. The post Mangatoon Sufferes Major Data Breach appeared first on Heimdal Security Blog.

article thumbnail

Hard Skills Vs Soft Skills: How Much Does Software Affect A Developer’s Career?

SecureBlitz

Read on for the hard skills vs soft skills comparison. 100% of the team and technical leaders that provide Django. Read more. The post Hard Skills Vs Soft Skills: How Much Does Software Affect A Developer’s Career? appeared first on SecureBlitz Cybersecurity.

Software 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Companies Are Targeted in Double-Extortion Attacks Launched by 0mega Ransomware

Heimadal Security

‘0mega,’ a brand-new ransomware group, targets businesses all over the world with double-extortion attacks and asks for millions of dollars in ransom. 0mega made its debut in May 2022, and since then, the novel ransomware campaign has targeted an impressive number of victims. More on 0mega Ransomware According to BleepingComputer, no ransomware sample for the […].

article thumbnail

iTop VPN Review 2022

SecureBlitz

Can iTop VPN offer you all that and more? Find out from this iTop VPN review. A good VPN should. Read more. The post iTop VPN Review 2022 appeared first on SecureBlitz Cybersecurity.

VPN 105
article thumbnail

Anubis Networks is back with new C2 server

Security Affairs

A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign is targeting Internet-end users in Brazil and Portugal since March 2022. Anubis Network is a C2 portal developed to control fake portals and aims to steal credentials to fully access the real systems. This C2 server is controlled by a group of operators that come from the previous analysis in 2022, the various brands being divided among the operators of

Phishing 102
article thumbnail

The January 6 Insurrection Hearings Are Just Heating Up

WIRED Threat Level

The US House committee has already uncovered a more organized and sinister plot than many imagined. But history suggests the worst may be yet to come.

99
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cloud-based Cryptocurrency Miners Targeting GitHub Actions and Azure VMs

The Hacker News

GitHub Actions and Azure virtual machines (VMs) are being leveraged for cloud-based cryptocurrency mining, indicating sustained attempts on the part of malicious actors to target cloud resources for illicit purposes.

article thumbnail

Russian ‘Hacktivists’ Are Causing Trouble Far Beyond Ukraine

WIRED Threat Level

The pro-Russian group Killnet is targeting countries supporting Ukraine. It has declared "war" against 10 nations.

98
article thumbnail

'Luna Moth' Group Ransoms Data Without the Ransomware

Dark Reading

Unsophisticated campaigns use off-the-shelf RATs and other tools to exfiltrate data and demand a ransom to keep it private.

article thumbnail

Microsoft: Windows Autopatch is now generally available

Bleeping Computer

Microsoft says that Windows Autopatch, an enterprise service that automatically keeps Windows and Microsoft 365 software up to date, is generally available starting today. [.].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands

Security Affairs

BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate BlackCat competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network. Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, has detected a significant increase in the value of ransom demand requests by

article thumbnail

Upskilling IT Security Talent a Smart Bet 

Security Boulevard

With demand for cybersecurity professionals at an all-time high and companies facing acute staffing shortages, organizations should look to upskilling young cybersecurity workers as an employee retention strategy, according to a report from (ISC)². The study, which polled 1,250 hiring managers at small, mid-sized and large organizations in the United States, Canada, United Kingdom and.

article thumbnail

A fake job offer via LinkedIn allowed to steal $540M from Axie Infinity

Security Affairs

Threat actors used a f ake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft of $540 Million. In March, threat actors stole almost $625 million in Ethereum and USDC (a U.S. dollar pegged stablecoin) tokens from Axie Infinity’s Ronin network bridge. The attack took place on March 23rd, but the cyber heist was discovered after a user was unable to withdraw 5,000 ether.

article thumbnail

Safe Security Provides Free Cybersecurity Cost Benchmarking Tool

Security Boulevard

Safe Security has made available a free cybersecurity benchmarking tool for predicting cyberattack risk within vertical industry segments and can be tuned by organizations to better assess their own chances of being attacked. Saket Modi, Safe Security CEO, said the CRQ Calculator combines cybersecurity threat intelligence and telemetry data it collects to ascertain attack costs.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!