Tue.Mar 21, 2023

article thumbnail

US Citizen Hacked by Spyware

Schneier on Security

The New York Times is reporting that a US citizen’s phone was hacked by the Predator spyware. A U.S. and Greek national who worked on Meta’s security and trust team while based in Greece was placed under a yearlong wiretap by the Greek national intelligence service and hacked with a powerful cyberespionage tool, according to documents obtained by The New York Times and officials with knowledge of the case.

Spyware 262
article thumbnail

Ransomware gangs’ harassment of victims is increasing

Tech Republic Security

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. The post Ransomware gangs’ harassment of victims is increasing appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Emerging Trends in Virtual Reality Impact Cybersecurity

IT Security Guru

As information technology continues to evolve, more and more people are penetrating cyberspace. Most organizations, companies, individuals, and even governments are now doing their activities in the digital world. This allows them to enjoy great benefits such as instant access from anywhere, less usage costs, and worldwide reach. A lot of internet users cannot imagine having a life without technology or access to e-ticket booking, e-commerce, online banking, the latest news, or getting in touch

article thumbnail

Learn cybersecurity skills by participating in real projects

Tech Republic Security

These live sessions are on sale for a limited time. The post Learn cybersecurity skills by participating in real projects appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Bad magic: new APT found in the area of Russo-Ukrainian conflict

SecureList

Since the start of the Russo-Ukrainian conflict, Kaspersky researchers and the international community at large have identified a significant number of cyberattacks executed in a political and geopolitical context. We previously published an overview of cyber activities and the threat landscape related to the conflict between Russia and Ukraine and continue to monitor new threats in these regions.

article thumbnail

Ferrari Announces Data Breach. Customers Risk Data Leakage

Heimadal Security

On March 20th, Ferrari announced they were victims of a cyberattack that could result in customers` data leakage. Threat actors claimed to have breached some of the Ferrari IT systems and sent a ransom demand. Ferrari N.V. announces that Ferrari S.p.A., its wholly-owned Italian subsidiary, was recently contacted by a threat actor with a ransom […] The post Ferrari Announces Data Breach.

LifeWorks

More Trending

article thumbnail

Secure Your Online Privacy: How to Choose the Best VPN in 2023

CyberSecurity Insiders

With the increasing need for online privacy and security, Virtual Private Networks (VPNs) have become a popular solution for internet users. VPNs allow users to access the internet securely and privately by encrypting their internet traffic and hiding their IP addresses. However, with so many VPN providers available, it can be challenging to choose the best VPN for your needs.

VPN 116
article thumbnail

GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe

The Last Watchdog

The cybersecurity landscape is constantly changing. While it might seem like throwing more money into the IT fund or paying to hire cybersecurity professionals are good ideas, they might not pay off in the long run. Related : Security no longer just a ‘cost center’ Do large cybersecurity budgets always guarantee a company is safe from ongoing cybersecurity threats?

article thumbnail

What Is Observability, And Why Is It Crucial To Your Business?

IT Security Guru

The software of your business – and its protection – is crucial if you want to succeed in the business landscape. Around the world, as many as 30,000 businesses are hacked every day, with 64% of companies also experiencing a form of cyber attack. When it comes to small companies, too, 60% go out of business within six months of being targeted by a hacker.

article thumbnail

Windows 11 Snipping Tool privacy bug exposes cropped image content

Bleeping Computer

A severe privacy flaw named 'acropalypse' has also been found to affect the Windows Snipping Tool, allowing people to partially recover content that was edited out of an image. [.

111
111
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

9 attack surface discovery and management tools

CSO Magazine

Cyber asset attack surface management (CAASM) or external attack surface management (EASM) solutions are designed to quantify the attack surface and minimize and harden it. The goal with CAASM tools is to give the adversary as little information about the security posture of the business as possible while still maintaining critical business services.

article thumbnail

How to Add Utility Bills to Your Credit Report

Identity IQ

How to Add Utility Bills to Your Credit Report IdentityIQ The traditional way to build credit requires getting a credit card and/or loan and making monthly payments on time. But that activity doesn’t include all the other utility bills you pay. So, it only represents a small portion of your financial behavior. Most utility providers don’t report payment activity to the credit bureaus, which means your utility bills aren’t doing anything to help your credit history or build your credit scores.

article thumbnail

Google Pixel phones had a serious data leakage bug – here’s what to do!

Naked Security

What if the "safe" images you shared after carefully cropping them. had some or all of the "unsafe" pixels left behind anyway?

105
105
article thumbnail

Data Leak Strategy Fueling the Ransomware Economy

SecureWorld News

Ransomware has gone through several game-changing milestones over the course of its decade-long evolution. In 2013, extortionists added encryption to their genre and started locking down victims' files instead of screens or web browsers. Two years later, a sketchy affiliate model called Ransomware-as-a-Service (RaaS) made its debut, thereby lowering the entry bar for wannabe threat actors.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

A look at a Magecart skimmer using the Hunter obfuscator

Malwarebytes

Threat actors are notorious for trying to hide their code in various ways, from binary packers to obfuscators. On their own, these tools are not always malicious as they can also be be used by companies or individuals who wish to keep their work safe from piracy, but overall they tend to be largely abused. In the case of credit card skimmers in client-side attacks, obfuscators are a common occurrence as they can make code identification more difficult.

Malware 103
article thumbnail

Custom 'Naplistener' Malware a Nightmare for Network-Based Detection

Dark Reading

Threat actors are using legitimate network assets and open source code to fly under the radar in data-stealing attacks using a set of custom malware bent on evasion.

Malware 101
article thumbnail

New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers

The Hacker News

Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called ShellBot. "ShellBot, also known as PerlBot, is a DDoS Bot malware developed in Perl and characteristically uses IRC protocol to communicate with the C&C server," AhnLab Security Emergency response Center (ASEC) said in a report.

DDOS 99
article thumbnail

New ShellBot bot targets poorly managed Linux SSH Servers

Security Affairs

New ShellBot DDoS bot malware, aka PerlBot, is targeting poorly managed Linux SSH servers, ASEC researchers warn. AhnLab Security Emergency response Center (ASEC) discovered a new variant of the ShellBot malware that was employed in a campaign that targets poorly managed Linux SSH servers. The ShellBot , also known as PerlBot, is a Perl-based DDoS bot that uses IRC protocol for C2 communications.

DDOS 98
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Google Pixel: Cropped or edited images can be recovered

Malwarebytes

Most of us have a camera on us at all times, and so photo taking and image sharing has become almost ubiquitous. But when sharing an image, you want to have control over what you share. And that might lead you to crop images, or redact parts of them. Maybe you cropped out a person that didn't want their photo online, maybe you put a black mark across your address, or credit card number, or other personal information.

Backups 98
article thumbnail

Ferrari confirms data breach after receiving a ransom demand from an unnamed extortion group

Security Affairs

Ferrari disclosed a data breach after receiving a ransom demand from an unnamed extortion group that gained access to some of its IT systems. Ferrari disclosed a data breach after it received a ransom demand from an unnamed extortion group that breached its IT systems. The threat actor claims to have stolen certain client details. The company immediately launched an investigation into the incident with the support of a third-party cybersecurity firm and informed relevant authorities. “Ferr

article thumbnail

Malware creator who compromised 10,000 computers arrested

Malwarebytes

The creator of a Remote Access Trojan (RAT), responsible for compromising more than 10,000 computers, has been arrested by law enforcement in Ukraine. At the time of the arrest, the developer still had real-time access to 600 PCs. According to the announcement , the RAT could tell infected devices to: Download and upload files Install and uninstall programs Take screenshots Capture sound from microphones Capture video from cameras Once data was harvested by the RAT, some of it was put to further

Malware 98
article thumbnail

New Bad Magic APT used CommonMagic framework in the area of Russo-Ukrainian conflict

Security Affairs

Threat actors are targeting organizations located in Donetsk, Lugansk, and Crimea with a previously undetected framework dubbed CommonMagic. In October 2022, Kaspersky researchers uncovered a malware campaign aimed at infecting government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions with a previously undetected framework dubbed CommonMagic.

Malware 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity Leaders Stressed Over Email Security

Security Boulevard

Email is the most relied-on means of communication for businesses, but it also poses a significant risk due to the combined threats of inbound phishing attacks, human error and data exfiltration leading to outbound security incidents. A report from Egress found 92% of organizations fell victim to successful phishing attacks in the last 12 months, The post Cybersecurity Leaders Stressed Over Email Security appeared first on Security Boulevard.

article thumbnail

2022 Zero-Day exploitation continues at a worrisome pace

Security Affairs

Experts warn that 55 zero-day vulnerabilities were exploited in attacks carried out by ransomware and cyberespionage groups in 2022. Cybersecurity firm Mandiant reported that ransomware and cyberespionage groups exploited 55 zero-day flaws in attacks in the wild. Most of the zero-day vulnerabilities were in software from Microsoft, Google, and Apple.

article thumbnail

Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution

Security Boulevard

Cyral is excited to announce that version 4.5 of the Cyral Platform is now generally available. The latest release of the platform combines the capabilities … The post <strong>Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution</strong> appeared first on Cyral. The post Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution appeared first on Security Boulevard.

98
article thumbnail

Crooks stole more than $1.5M worth of Bitcoin from General Bytes ATMs

Security Affairs

Cryptocurrency ATM maker General Bytes suffered a security breach over the weekend, the hackers stole $1.5M worth of cryptocurrency. Cryptocurrency ATM manufacturers General Bytes suffered a security incident that resulted in the theft of $1.5M worth of cryptocurrency. GENERAL BYTES is the world’s largest Bitcoin, Blockchain, and Cryptocurrency ATM manufacturer.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Spotlight on Cybersecurity Leaders: Bryan Bechard

SecureWorld News

In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Bryan Bechard is CISO for Flagship Credit Acceptance. He has been working in cybersecurity for the last 20 years and teaching the next generation of InfoSec pros.

article thumbnail

Financial Services Firms: Address FFIEC’s Stringent API Security Regulations with Noname Security

Security Boulevard

Financial services companies are a favorite target for threat actors. Most of us are familiar with the Equifax and Capital One breaches that exposed hundreds of millions of customer records. But there are other attacks that don’t make the headlines. Over the years, the Carnegie Endowment’s FinCyber project has documented hundreds of separate cyber incidents impacting financial institutions around the world.

article thumbnail

Enhancing Security in Your DevOps Pipelines with HashiCorp Vault-Atlas Plugin

GlobalSign

In this blog, we explore how HashiCorp Vault can help enhance security in your DevOps pipelines.

97
article thumbnail

Researchers Reveal Insights into CatB Ransomware’s Advanced Evasion Methods

Heimadal Security

To avoid detection and launch of the payload, threat actors behind CatB ransomware used a technique called DLL search order hijacking. Based on code-level similarities, CatB, also known as CatB99 and Baxtoy, emerged late last year and is said to be an “evolution or direct rebrand” of another ransomware strain known as Pandora. The use […] The post Researchers Reveal Insights into CatB Ransomware’s Advanced Evasion Methods appeared first on Heimdal Security Blog.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!