Wed.Jul 27, 2022

article thumbnail

Securing Open-Source Software

Schneier on Security

Good essay arguing that open-source software is a critical national-security asset and needs to be treated as such: Open source is at least as important to the economy, public services, and national security as proprietary code, but it lacks the same standards and safeguards. It bears the qualities of a public good and is as indispensable as national highways.

Software 333
article thumbnail

A Retrospective on the 2015 Ashley Madison Breach

Krebs on Security

It’s been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and extortion of many Ashley Madison users, and to at least two suicides. To date, little is publicly known about the perpetrators or the true motivation for the attack. But a recent review of Ashley Madison mentions across Russian cybercrime forums and far-right websites in the months leading up to the hack revealed s

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity

The Last Watchdog

Post Covid 19, attack surface management has become the focal point of defending company networks. Related: The importance of ‘SaaS posture management’ As digital transformation continues to intensify, organizations are relying more and more on hosted cloud processing power and data storage, i.e. Platform as a Service ( PaaS ,) as well as business tools of every stripe, i.e.

article thumbnail

Infostealer malware targets Facebook business accounts to capture sensitive data

Tech Republic Security

Ducktail malware tries to hijack the accounts of individuals who use Facebook’s Business and Ads platforms, says WithSecure Intelligence. The post Infostealer malware targets Facebook business accounts to capture sensitive data appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

More than a VPN: Announcing Cisco Secure Client (formerly AnyConnect)

Cisco Security

We’re excited to announce Cisco Secure Client, formerly AnyConnect, as the new version of one of the most widely deployed security agents. As the unified security agent for Cisco Secure , it addresses common operational use cases applicable to Cisco Secure endpoint agents. Those who install Secure Client’s next-generation software will benefit from a shared user interface for tighter and simplified management of Cisco agents for endpoint security.

VPN 145
article thumbnail

How to quickly deploy the Odoo ERP solution with Docker

Tech Republic Security

If you're looking to get a powerful ERP solution up and running, Jack Wallen has the solution by way of Odoo and Docker. The post How to quickly deploy the Odoo ERP solution with Docker appeared first on TechRepublic.

Software 168

LifeWorks

More Trending

article thumbnail

Average cost of data breach surpasses $4 million for many organizations

Tech Republic Security

Beyond the immediate costs of a data breach, almost half of the total costs occur more than a year after the incident, says IBM Security. The post Average cost of data breach surpasses $4 million for many organizations appeared first on TechRepublic.

article thumbnail

5 trends making cybersecurity threats riskier and more expensive

CSO Magazine

Since the pandemic the cyber world has become a far riskier place. According to the Hiscox Cyber Readiness Report 2022 , almost half (48%) of organizations across the U.S. and Europe experienced a cyberattack in the past 12 months. Even more alarming is that these attacks are happening despite businesses doubling down on their cybersecurity spend. Cybersecurity is at a critical inflection point where five megatrends are making the threat landscape riskier, more complicated, and costlier to manag

article thumbnail

Cash App fraud: 10 common scams to watch out for

We Live Security

It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash. The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity.

Scams 135
article thumbnail

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike

Trend Micro

Gootkit has been known to use fileless techniques to drop Cobalt Strike and other malicious payloads. Insights from a recent attack reveal updates in its tactics.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware

Dark Reading

Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.

Spyware 130
article thumbnail

DUCKTAIL operation targets Facebook’s Business and Ad accounts

Security Affairs

Researchers uncovered an ongoing operation, codenamed DUCKTAIL that targets Facebook Business and Ad Accounts. Researchers from WithSecure (formerly F-Secure Business) have discovered an ongoing operation, named DUCKTAIL, that targets individuals and organizations that operate on Facebook’s Business and Ads platform. Experts attribute the campaign to a Vietnamese financially motivated threat actor which is suspected to be active since 2018. “Our investigation reveals that the threat actor

article thumbnail

Handling Criticism & The Cost of Call Out Culture in Cyber

Jane Frankland

This week, I’m writing to you about call-out culture. I want to ensure you know how to respond to criticism online. I want to make sure that I’m not losing more voices when communicating. I’ve taken inspiration from a post on this topic by Andrea Gibson from Button Poetry who wrote recently about this and community behaviour. . Given the nature of what is considered a highly emotive topic, I want to keep a dialogue going, remove as much fear as possible when posting comments so we ca

Education 130
article thumbnail

CosmicStrand malware targets old Asus and Gigabyte motherboards

CyberSecurity Insiders

A novel malware named CosmicStrand is said to be targeting the old motherboards offered by Asus and Gigabyte and the crux is that it can survive operating system re-installs and it survives in Unified Extensible Firmware Interface (UEFIs) unlike just the storage drive. Russia-based cybersecurity firm Kaspersky confirmed this news as its researchers have discovered the malware propelling on old Microsoft machines since Dec’16.

Malware 129
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

NIST’s Expanding International Engagement on Cybersecurity

NSTIC

In providing a foundation for cybersecurity advancements over the years, NIST has taken the global context into account when determining priorities and approaches. Our participation in Standards Developing Organizations (SDOs) has expanded steadily, and we encourage international participation in the development of our own programs and resources. As we celebrate the 50th anniversary of cybersecurity at NIST, it is more important than ever that we work with our partners around the world.

article thumbnail

Microsoft: Windows, Adobe zero-days used to deploy Subzero malware

Bleeping Computer

Microsoft has linked a threat group it tracks as Knotweed to a cyber mercenary outfit (aka private-sector offensive actor) named DSIRF, targeting European and Central American entities using a malware toolset dubbed Subzero. [.].

Malware 127
article thumbnail

Uber’s Latest Shenanigans

Security Boulevard

The International Consortium of Investigative Journalists (ICIJ), in conjunction with a number of worldwide publications, jointly released an ICIJ investigation, “The Uber Files” which detailed the back room deals and access enjoyed by the company as it went about its “chaotic global expansion.” The source of the Uber Files has been identified as Mark MacGann, The post Uber’s Latest Shenanigans appeared first on Security Boulevard.

article thumbnail

These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware

The Hacker News

As many as 30 malicious Android apps with cumulative downloads of nearly 10 million have been found on the Google Play Store distributing adware. "All of them were built into various programs, including image-editing software, virtual keyboards, system tools and utilities, calling apps, wallpaper collection apps, and others," Dr.Web said in a Tuesday write-up.

Adware 120
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Attackers increasingly abusing IIS extensions to establish covert backdoors

Security Affairs

Threat actors are increasingly abusing Internet Information Services (IIS) extensions to maintain persistence on target servers. Microsoft warns of threat actors that are increasingly abusing Internet Information Services (IIS) extensions to establish covert backdoors into servers and maintain persistence in the target networks. IIS backdoors are also hard to detect because they follow the same code structure as legitimate and harmless modules. “Malicious IIS extensions are less frequently

Antivirus 119
article thumbnail

Teleport features passwordless access with new access plane update

CSO Magazine

Teleport, an open source platform designed to provide zero trust access management applications, has announced the latest version of its unified access plane, Teleport 10, which features passwordless access as a single sign-on (SSO) infrastructure access solution. Teleport's unified access plane is an open source identity-based infrastructure access platform that unifies secure access to servers, Kubernetes clusters, applications and databases.

116
116
article thumbnail

PrestaShop warns of vulnerability: Update your stores now!

Malwarebytes

A vulnerability affecting open source e-commerce platform PrestaShop could spell trouble for servers running PrestaShop websites. The 15-year-old organisation’s platform is currently used by around 300,000 shops worldwide. The exploit is very dependent on specific versions in use, so one PrestaShop customer may see different results to another.

Hacking 109
article thumbnail

Spain arrests suspected hackers who sabotaged radiation alert system

Bleeping Computer

The Spanish police have announced the arrest of two hackers believed to be responsible for cyberattacks on the country's radioactivity alert network (RAR), which took place between March and June 2021. [.].

108
108
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

IIS extensions are on the rise as backdoors to servers

Malwarebytes

The Microsoft 365 Defender Research Team has warned that attackers are increasingly leveraging Internet Information Services (IIS) extensions as covert backdoors into servers. IIS extensions are able to stay hidden in target environments and as such provide a long-term persistence mechanism for attackers. IIS. IIS is webserver software created by Microsoft that runs on Windows systems.

Backups 108
article thumbnail

Build SBOMs with Microsoft’s SPDX SBOM generator

InfoWorld on Security

The compromise of SolarWinds’ system management tool raised a lot of interesting issues for anyone using a CI/CD (continuous integration and continuous delivery) build process for their software. How can we ensure that the software we distribute to our users is the software we intend to build? Are all the dependencies for our code the ones we intended to have?

Software 107
article thumbnail

T-Mobile agrees to pay customers $350 million in settlement over data breach

Malwarebytes

T-Mobile has agreed to pay $350 million to settle class action claims related to a 2021 cyberattack which impacted around 80 million US residents. Under the proposed settlement, T-Mobile would also commit to an aggregate incremental spend of $150 million for data security and related technology in 2022 and 2023. According to The New York Times , the filing in the US District Court for the Western District of Missouri states that the payment to each customer can’t exceed $2,500.

article thumbnail

Beth Cheeseman Kearney Named General Counsel and Chief Compliance Officer of IDIQ

Identity IQ

Beth Cheeseman Kearney Named General Counsel and Chief Compliance Officer of IDIQ. IdentityIQ. . —New role continues company strategic growth plans —. Temecula, California, July 27, 2022 – IDIQ , an industry leader in identity theft protection and credit report monitoring, has named Beth Cheeseman Kearney to the role of general counsel and chief compliance officer.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

IBM Report Reveals Economic Impact of Data Breaches

Security Boulevard

IBM published a report today that suggested data breaches are starting to have a material impact on the cost of goods and services. An IBM analysis of data breaches that occurred in 550 organizations found the average cost of a data breach has now reached an all-time high of $4.35 million for the organizations IBM. The post IBM Report Reveals Economic Impact of Data Breaches appeared first on Security Boulevard.

article thumbnail

Arts Organizations’ Email Lists Compromised by Ransomware Attack

Heimadal Security

The Smithsonian Institution in the US, the Toronto Symphony Orchestra in Canada, the Courtauld Institute of Art in London, and WordFly, a mailing list supplier for prominent arts organizations, all had their data stolen by a ransomware group. Other impacted institutions include Southbank Centre, Royal Shakespeare Company, Royal Opera House, and The Old Vic.

article thumbnail

The History Of Online Gambling And How It Has Developed Over The Past 20 Years

SecureBlitz

In this post, I will talk about the history of online gambling and how it has developed over the past. Read more. The post The History Of Online Gambling And How It Has Developed Over The Past 20 Years appeared first on SecureBlitz Cybersecurity.

article thumbnail

Heimdal™ Threat Hunting Journal July 2022 Edition

Heimadal Security

Heimdal™ returns with another incisive, mind-bending edition of our celebrated threat hunting journal. What does the month of July have in stock for us? As one would expect, even more trojans, PUAs, and a couple of worms and viruses just to keep things interesting. Wonder no more because our trojan king reigns unchallenged – 15 […]. The post Heimdal™ Threat Hunting Journal July 2022 Edition appeared first on Heimdal Security Blog.

105
105
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!