Thu.Apr 28, 2022

article thumbnail

Microsoft Issues Report of Russian Cyberattacks against Ukraine

Schneier on Security

Microsoft has a comprehensive report on the dozens of cyberattacks — and even more espionage operations — Russia has conducted against Ukraine as part of this war: At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military forces attack the country by land, air, and sea.

article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity. Q: When do you think the industry will understand what XDR entails?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

No matter who you are, what you do, or where you reside, one thing is certain. In today’s digital economy, everyone is experiencing record evolution. Customers want more, and so do their stakeholders. Today, in business, it’s all about working with digital natives – customers, partner companies, and employees – building trust and implementing advanced solutions to enhance their experience.

CISO 130
article thumbnail

Okta vs Ping: IAM software comparison

Tech Republic Security

This review compares the features of IAM software Okta and Ping. Features include multifactor authentication, threat detection and dashboards. The post Okta vs Ping: IAM software comparison appeared first on TechRepublic.

Software 134
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CISA published 2021 Top 15 most exploited software vulnerabilities

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) published a list of 2021’s top 15 most exploited software vulnerabilities. Cybersecurity and Infrastructure Security Agency (CISA) published the list of 2021’s top 15 most exploited software vulnerabilities. This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity agencies of the United States, Australia, Canada, New Zealand, and the United Kingdom: the Cybersecurity and Infrastructure Security Agency ( CISA ), Na

Software 143
article thumbnail

10 top anti-phishing tools and services

CSO Magazine

Phishing continues to be one of the primary attack mechanisms for bad actors with a variety of endgames in mind, in large part because phishing attacks are trivial to launch and difficult to fully protect against. Some phishing attacks target customers rather than employees, and others simply aim to damage your corporate reputation rather than compromise your systems.

Phishing 136

More Trending

article thumbnail

The Russia – Ukraine war: Two months in

Digital Shadows

The two-month mark of the Russia and Ukraine war has passed, with Russia almost certainly having failed to meet its. The post The Russia – Ukraine war: Two months in first appeared on Digital Shadows.

120
120
article thumbnail

Synology warns of critical Netatalk bugs in multiple products

Bleeping Computer

Synology has warned customers that some of its network-attached storage (NAS) appliances are exposed to attacks exploiting multiple critical Netatalk vulnerabilities. [.].

117
117
article thumbnail

The More You Know: Job Searching & Interviewing

Cisco Security

In the midst of global change and virtual hiring, the landscape of job searching has changed. We sat down (via WebEx) with recruiting leaders, accessibility experts and career changers at Cisco Secure and Duo Security to find out the top 10 ways to make the virtual job search, application and interview process as easeful as possible. Stay tuned for future topics in this series including advice for career changers and environmental aspects to consider for long-term fulfillment at work. 1.

article thumbnail

Artificial Intelligence induced microwave oven tries to kill its owner

CyberSecurity Insiders

Lucas Rizzotto had a vision from his childhood about a talking microwave oven that could communicate with him like a friend and act as per his commands. So, he collected a microwave from Amazon and induced it with artificial intelligence. Then, sensing it had thinking skills, he named it as Magnetron. Magnetron was fed with the childhood history of about 100 pages of data belonging to Lucas and the kitchen appliance started to soon interact with its owner through the externally fitted speaker an

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms

Heimadal Security

Cybersecurity authorities around the world have published a list of the top 15 vulnerabilities regularly exploited by malicious actors in 2021, in collaboration with the NSA and the FBI. In a joint alert, the cybersecurity authorities recommended enterprises patch these security holes as soon as possible and adopt patch management systems to decrease their attack […].

article thumbnail

Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021

eSecurity Planet

U.S. cybersecurity agencies joined their counterparts around the globe to urge organizations to address the top 15 vulnerabilities exploited in 2021. Topping the list were the Log4Shell vulnerability and Microsoft bugs ProxyShell and ProxyLogon. Microsoft occupied more than half the list, with Exchange Server accounting for eight of the vulnerabilities.

article thumbnail

Russian cyberattacks against Ukraine, other targets expected to rise

CSO Magazine

Hacking groups closely linked to the Russian government have made nearly 40 destructive attacks against hundreds of Ukrainian targets since the start of the invasion, according to a report issued by Microsoft. The attacks have been largely, but not exclusively, targeted at Ukrainian government institutions, and Microsoft's report noted that these attacks have had damaging effects on the country's economy and civilian population, in addition to Ukraine's government and military.

article thumbnail

Onyx ransomware destroys files, and also the criminal circle of trust

Malwarebytes

Some ransomware authors seem to be further whittling down their tenuous “circle of trust” style agreement with victims even further. Word has spread of a new Onyx ransomware operation which is quite a bit more destructive than those impacted would be hoping for. The ransomware in question overwrites files larger than just 2MB. Anything important is lost to the void forever, and only files smaller than this will be recovered should the victims pay up.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Twitter's New Owner Elon Musk Wants DMs to be End-to-End Encrypted like Signal

The Hacker News

Elon Musk, CEO of SpaceX and Tesla and Twitter's new owner, on Thursday called on adding support for end-to-end encryption (E2EE) to the platform's direct messages (DM) feature. "Twitter DMs should have end to end encryption like Signal, so no one can spy on or hack your messages," Musk said in a tweet.

article thumbnail

Why you should be taking security advice from your grandmother

Malwarebytes

We tend to accept that younger folks are supposed to be more tech savvy, given they’ve grown up with computers and the Internet pretty much their whole lives. If you go back about 15 or so years, a lot of security advice focused on the “warning your grandmother away from scams” routine. The default assumption was that people over a certain age simply did not know about computers and the threats that come with them.

Scams 100
article thumbnail

Ukraine Beats Russia in Cyberwarfare — at ‘Unprecedented Scale’

Security Boulevard

Russia is attacking Ukraine with cyberattacks and psyops. But the scale is pathetic and Ukraine is fighting back—hard. The post Ukraine Beats Russia in Cyberwarfare — at ‘Unprecedented Scale’ appeared first on Security Boulevard.

article thumbnail

Facebook phishers threaten users with Page Recovery Help Support

Malwarebytes

We’ve seen multiple hijacked profiles on Facebook recently claiming to be account recovery services. These bogus account recovery services aren’t here to help. They’re actually just trying to scare users into falling for phishing attempts. The people behind these scams target Facebook pages belonging to musicians, products, and businesses of all kinds.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Why we joined forces with Snyk

Security Boulevard

Yesterday we joined Snyk’s new Technical Alliance Partnership Program as a founding member and announced that we will integrate Snyk Open Source into our BluBracket Code Security Suite. As a relatively young company, this is a big commitment and one that as CEO I don’t take lightly. But the value proposition for our customers is […]. The post Why we joined forces with Snyk appeared first on Security Boulevard.

98
article thumbnail

Hackers fool major tech companies into handing over data of women and minors to abuse

Malwarebytes

Some major tech companies have unwittingly opened harassment and exploitation opportunities to the women and children who they have pledged to protect. This happened because they provided information in response to emergency data requests from legitimate law enforcement accounts that hackers had compromised. This finding came from four federal law enforcement agencies and a couple of industry investigators.

CSO 99
article thumbnail

Hands on with Microsoft Edge's new built-in VPN feature

Bleeping Computer

Edge's Secure Network is powered by Cloudflare - one of the most trusted DNS hosts in the industry - and it aims to protect your device and sensitive data as you browse. The feature is in the early stage of development available to select users in Edge Canary and it's not a full-fledged VPN service offered in browsers like Opera. [.].

VPN 98
article thumbnail

Software Supply Chain Security Terminology

Security Boulevard

In light of recent high profile software supply chain security issues such as the SolarWinds attack and the Log4j open source vulnerability, we found it important to identify and explain some key terminology. We will also state our particular definitions for these terms in the context of GrammaTech products and our approach to improving software supply chain security.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Cloudflare Thwarts Record DDoS Attack Peaking at 15 Million Requests Per Second

The Hacker News

Cloudflare on Wednesday disclosed that it acted to mitigate a 15.3 million request-per-second (RPS) distributed denial-of-service (DDoS) attack. The web infrastructure and website security company called it one of the "largest HTTPS DDoS attacks on record.

DDOS 98
article thumbnail

Why Security Must be the Focus of Modern Banking

Security Boulevard

U.S. consumers are shying away from digital banking due to security concerns. According to a PYMNTS Digital Banking report, 47% of consumers worry about their data security, despite significant interest in digitized banking services. Ransomware also poses a huge threat, with malicious attacks increasing by 1,318% in 2021. This is why modern banking practices need.

Banking 98
article thumbnail

Ukraine targeted by DDoS attacks from compromised WordPress sites

Bleeping Computer

Ukraine's computer emergency response team (CERT-UA) has published an announcement warning of ongoing DDoS (distributed denial of service) attacks targeting pro-Ukraine sites and the government web portal. [.].

DDOS 98
article thumbnail

Survey Surfaces Raft of Cloud Security Challenges

Security Boulevard

A survey of 154 North American IT and security decision-makers conducted by Forrester Consulting on behalf of Sonrai Security and Amazon Web Services (AWS) published today found 96% of respondents acknowledged their organization faced security incidents in the last 12 months; 98% of them involved identity-related security challenges. The top issues reported are an internal.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

The Package Analysis Project: Scalable detection of malicious open source packages

Google Security

Posted by Caleb Brown, Open Source Security Team Despite open source software’s essential role in all software built today, it’s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software. Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute.

article thumbnail

What is a watering hole attack?

Security Boulevard

The advance of the 21st century brought with it a significant shift in the work scene. Every industry and field relies heavily on computers and the digital world to function seamlessly. However, with it came the ever-mounting fear of cyber attack. Among the many forms of cyber attack is a watering hole attack, also known …. What is a watering hole attack?

article thumbnail

Experts Detail 3 Hacking Teams Working Under the Umbrella of TA410 Group

The Hacker News

A cyberespionage threat actor known for targeting a variety of critical infrastructure sectors in Africa, the Middle East, and the U.S. has been observed using an upgraded version of a remote access trojan with information stealing capabilities.

Hacking 95
article thumbnail

FBI Director Warns of Chinese Espionage Threats

Security Boulevard

FBI Director Christopher Wray said in an interview on CBS’s Sunday news program 60 Minutes that the current level of cybersecurity threats from China was “unprecedented in history” and highlighted the country’s attempts at cyberespionage. “The biggest threat we face as a country from a counterintelligence perspective is from the People’s Republic of China,” he.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.