Tue.Jan 18, 2022

article thumbnail

UK Government to Launch PR Campaign Undermining End-to-End Encryption

Schneier on Security

Rolling Stone is reporting that the UK government has hired the M&C Saatchi advertising agency to launch an anti-encryption advertising campaign. Presumably they’ll lean heavily on the “think of the children!” rhetoric we’re seeing in this current wave of the crypto wars. The technical eavesdropping mechanisms have shifted to client-side scanning, which won’t actually help — but since that’s not really the point, it’s not argued on its merits.

article thumbnail

GUEST ESSAY: Data breaches across the globe slowed significantly in Q4 2021 versus Q1-Q3

The Last Watchdog

After a gloomy start with its first three breach intensive quarters, 2021 has finally ended, and on a positive note. Related: Cybersecurity experts reflect on 2021. This conclusion is derived from an analysis of data taken from our data breach detection tool, Surfshark Alert , which comprises publicly available breached data sets to inform our users of potential threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 tools helping companies more effectively manage cybersecurity in 2022

Tech Republic Security

As more companies focus on digital adoption goals in 2022, finding security tools to detect malicious activity is top-of-mind for executives.

article thumbnail

DoNot Go! Do not respawn!

We Live Security

ESET researchers take a deep look into recent attacks carried out by Donot Team throughout 2020 and 2021, targeting government and military entities in several South Asian countries. The post DoNot Go! Do not respawn! appeared first on WeLiveSecurity.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

DHL takes top spot as most imitated brand in phishing attacks

Tech Republic Security

For the final quarter of 2021, DHL surpassed Microsoft as the brand most spoofed in phishing campaigns, says Check Point Research.

Phishing 190
article thumbnail

Fashion giant Moncler confirms data breach after ransomware attack

Bleeping Computer

Italian luxury fashion giant Moncler confirmed that they suffered a data breach after files were stolen by the AlphV/BlackCat ransomware operation in December and published today on the dark web. [.].

More Trending

article thumbnail

What is Cybersecurity and Why It’s Important 

Security Boulevard

A good security strategy helps businesses reduce the chance of falling victim to data theft while also ensuring shared data is kept secure. The post What is Cybersecurity and Why It’s Important appeared first on Radware Blog. The post What is Cybersecurity and Why It’s Important appeared first on Security Boulevard.

article thumbnail

Beijing Winter Olympics MY2022 mobile app filled with security vulnerabilities

CyberSecurity Insiders

Winter Olympics 2022 that are scheduled to be held in Beijing from next month i.e. in between February 4th to February 22nd, 2022 is in news for wrong reasons. The MY2022 app that needs to be installed by all the participants attending the event is reported to be filled with several security vulnerabilities, allowing hackers to intercept the data loaded and stored on the app any time.

Mobile 133
article thumbnail

Cybersecurity Outlook for 2022: Emerging Threats

Security Boulevard

As we move into 2022, we’re finding that many of the cybersecurity challenges that emerged with the pandemic still remain. Some have been directly related to the ongoing pandemic while others have evolved independently. The good news is that today’s organizations are increasingly focused on building a strong cybersecurity culture. With a strong commitment from.

article thumbnail

New White Rabbit ransomware linked to FIN8 hacking group

Bleeping Computer

A new ransomware family called 'White Rabbit' appeared in the wild recently, and according to recent research findings, could be a side-operation of the FIN8 hacking group. [.].

Hacking 132
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

A Cyber Attack Can Ruin Your Business – Are You Really Prepared?

Security Boulevard

The post A Cyber Attack Can Ruin Your Business – Are You Really Prepared? appeared first on PeoplActive. The post A Cyber Attack Can Ruin Your Business – Are You Really Prepared? appeared first on Security Boulevard.

article thumbnail

Three recent events prove the need for an insider risk playbook

CSO Magazine

Every company, regardless of size, should have an insider risk management playbook in place to address the insider threat. The human factor is always in play, mistakes will happen that inadvertently place the company at risk. The other side of the human factor are the malevolent individuals who opt to break trust and willingly push aside their NDAs and in-place IT data handling processes and procedures to knowingly abscond with sensitive data.

Risk 130
article thumbnail

Europol shuts down VPN service used by ransomware groups

Bleeping Computer

Law enforcement authorities from 10 countries took down VPNLab.net, a VPN service provider used by ransomware operators and malware actors. [.].

VPN 145
article thumbnail

Which Sector Is Most Vulnerable to Cyber Attacks?

Security Boulevard

The post Which Sector Is Most Vulnerable to Cyber Attacks? appeared first on PeoplActive. The post Which Sector Is Most Vulnerable to Cyber Attacks? appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Researchers Explore Hacking VirusTotal to Find Stolen Credentials

Dark Reading

VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.

Hacking 141
article thumbnail

Cyberattacks 2021: Phishing, Ransomware & Data Breach Statistics From the Last Year

Security Boulevard

A close look at cyberattack statistics in 2021 and how to better protect your business against phishing, ransomware & data breaches moving forward. The post Cyberattacks 2021: Phishing, Ransomware & Data Breach Statistics From the Last Year appeared first on Security Boulevard.

article thumbnail

Collective resilience: Why CISOs are embracing a new culture of openness

CSO Magazine

Security exec Chad Kliewer had heard the initial reports of the SolarWinds attack as news about it broke in December 2020, sympathetic to those companies first named as victims of the hack.

CISO 123
article thumbnail

WEF Report: Cyber Risks Pose Global Threats

Security Boulevard

The World Economic Forum’s (WEF) Global Risks Report 2022 outlined what they believe are the greatest worldwide threats and risks to economic development. In some ways, it reads like an Exodusian litany of plagues and threats—COVID-19, climate change, migration, international crime, nuclear war and weapons of mass destruction. Fun bedtime reading for the insomniacs.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

FireEye and McAfee Enterprise merger leads to Trellix

CyberSecurity Insiders

In March 2021, Symphony Technology Group (STG) announced that it is purchasing security firm McAfee Enterprise for $4 billion. And in June last year, the investment firm declared it will merge the company with FireEye acquired for $1.2 billion, leading to a bigger company in assets, customer count and market value. Now, in January 2022, STG made it official that the acquisition and merger of the two companies was concluded at the end of last year and both will now be termed as a single entity ho

article thumbnail

Tech sector embraces public-private collaboration on open-source software security

CSO Magazine

Hoping to foster improved security of open-source software, the White House hosted a meeting last week with some of the largest public and private users and maintainers of open-source software. Widely used open-source software “brings unique value, and has unique security challenges, because of its breadth of use and the number of volunteers responsible for its ongoing security maintenance,” the White House said.

Software 120
article thumbnail

Why Cloud is The Booster Shot For Fintech?

Security Boulevard

The post Why Cloud is The Booster Shot For Fintech? appeared first on PeoplActive. The post Why Cloud is The Booster Shot For Fintech? appeared first on Security Boulevard.

article thumbnail

Serious Security: Apple Safari leaks private data via database API – what you need to know

Naked Security

There's a tiny data leakage bug in the WebKit browser engine. but it could act as a "supercookie" identifier for your browsing.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Stolen Credit Cards Biggest Dark Web Marketplace Closes Down

Heimadal Security

The greatest dark web marketplace for stolen credit cards known under the name of UniCC has made an announcement that its team is retiring. UniCC Shuts Down Its Business According to a report published by Elliptic analysts, UniCC is retiring from business after they earned $358 million since 2013 in purchases. They used cryptos such […]. The post Stolen Credit Cards Biggest Dark Web Marketplace Closes Down appeared first on Heimdal Security Blog.

article thumbnail

Your guide to hiring an AWS cloud engineer in 2022

Security Boulevard

The post Your guide to hiring an AWS cloud engineer in 2022 appeared first on PeoplActive. The post Your guide to hiring an AWS cloud engineer in 2022 appeared first on Security Boulevard.

article thumbnail

DHL Becomes the Most Imitated Brand in Phishing Attacks

Heimadal Security

Phishing is a harmful technique based on deception that is used to steal sensitive information from consumers (credit card information, usernames and passwords, and so on). The attackers pose as a trustworthy entity (typically by imitating the look and feel of a well-known brand) in order to deceive the victims into disclosing sensitive information.

Phishing 117
article thumbnail

Windows Server 2019 OOB update fixes reboots, Hyper-V, ReFS bugs

Bleeping Computer

Microsoft has released an emergency out-of-band (OOB) update for Windows Server 2019 that fixes numerous critical bugs introduced during the January 2022 Patch Tuesday. [.].

116
116
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors

Security Boulevard

Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of acronyms representing government agencies and technologies. As such, it’s not uncommon to be confused. As the great Austin Powers said, “Whoopty do, what does it all mean Basil?” What it all means is that at … Continued. The post Understanding the Insider Risk Solution Landscape—An Alphabet Soup of Agencies, Technologies, and Vendors appeared first on DTEX Systems Inc.

article thumbnail

Don't Use Public Wi-Fi Without DNS Filtering

The Hacker News

Providing public Wi-Fi is a great service to offer your customers as it becomes more and more standard in today's society. I like the fact that I do not have to worry about accessing the Internet while I am away, or spending a lot of money on an international connection, or just staying offline while I am away.

DNS 113
article thumbnail

Suse open sources NeuVector container security platform

InfoWorld on Security

Suse has open sourced the code for the NeuVector container runtime security platform under an Apache 2.0 license on GitHub , less than three months after acquiring the company. Container runtime security is an emerging model where developers aim to secure their ephemeral cloud-native workloads continuously, from hardening a Kubernetes cluster to constantly scanning for unexpected behaviors within a container after it goes into production.

112
112
article thumbnail

Infamous dark net carding site UniCC to close

Malwarebytes

UniCC, the largest site on the dark web that sells credit card and debit card information, will close up shop for good, taking its affiliate site, LuxSocks, with it, too. According to Elliptic , a company that offers risk solutions for cryptoassets, the unknown UniCC administrators have made an estimated $358M USD in cryptocurrency for selling stolen credit card details.

Marketing 111
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.