Tue.Mar 21, 2023

article thumbnail

US Citizen Hacked by Spyware

Schneier on Security

The New York Times is reporting that a US citizen’s phone was hacked by the Predator spyware. A U.S. and Greek national who worked on Meta’s security and trust team while based in Greece was placed under a yearlong wiretap by the Greek national intelligence service and hacked with a powerful cyberespionage tool, according to documents obtained by The New York Times and officials with knowledge of the case.

Spyware 192
article thumbnail

Ransomware gangs’ harassment of victims is increasing

Tech Republic Security

The harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward employees, C-suite executives and even customers. The post Ransomware gangs’ harassment of victims is increasing appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe

The Last Watchdog

The cybersecurity landscape is constantly changing. While it might seem like throwing more money into the IT fund or paying to hire cybersecurity professionals are good ideas, they might not pay off in the long run. Related : Security no longer just a ‘cost center’ Do large cybersecurity budgets always guarantee a company is safe from ongoing cybersecurity threats?

article thumbnail

Learn cybersecurity skills by participating in real projects

Tech Republic Security

These live sessions are on sale for a limited time. The post Learn cybersecurity skills by participating in real projects appeared first on TechRepublic.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Ferrari Announces Data Breach. Customers Risk Data Leakage

Heimadal Security

On March 20th, Ferrari announced they were victims of a cyberattack that could result in customers` data leakage. Threat actors claimed to have breached some of the Ferrari IT systems and sent a ransom demand. Ferrari N.V. announces that Ferrari S.p.A., its wholly-owned Italian subsidiary, was recently contacted by a threat actor with a ransom […] The post Ferrari Announces Data Breach.

article thumbnail

Observability will transform cloud security

InfoWorld on Security

Security observability is the ability to gain visibility into an organization’s security posture, including its ability to detect and respond to security threats and vulnerabilities. It involves collecting, analyzing, and visualizing security data to identify potential hazards and take proactive measures to mitigate them. Security observability involves collecting data from various security tools and systems, including network logs, endpoint security solutions, and security information and event

More Trending

article thumbnail

Windows 11 Snipping Tool privacy bug exposes cropped image content

Bleeping Computer

A severe privacy flaw named 'acropalypse' has also been found to affect the Windows Snipping Tool, allowing people to partially recover content that was edited out of an image. [.

113
113
article thumbnail

9 attack surface discovery and management tools

CSO Magazine

Cyber asset attack surface management (CAASM) or external attack surface management (EASM) solutions are designed to quantify the attack surface and minimize and harden it. The goal with CAASM tools is to give the adversary as little information about the security posture of the business as possible while still maintaining critical business services.

article thumbnail

How to Add Utility Bills to Your Credit Report

Identity IQ

How to Add Utility Bills to Your Credit Report IdentityIQ The traditional way to build credit requires getting a credit card and/or loan and making monthly payments on time. But that activity doesn’t include all the other utility bills you pay. So, it only represents a small portion of your financial behavior. Most utility providers don’t report payment activity to the credit bureaus, which means your utility bills aren’t doing anything to help your credit history or build your credit scores.

article thumbnail

New ShellBot bot targets poorly managed Linux SSH Servers

Security Affairs

New ShellBot DDoS bot malware, aka PerlBot, is targeting poorly managed Linux SSH servers, ASEC researchers warn. AhnLab Security Emergency response Center (ASEC) discovered a new variant of the ShellBot malware that was employed in a campaign that targets poorly managed Linux SSH servers. The ShellBot , also known as PerlBot, is a Perl-based DDoS bot that uses IRC protocol for C2 communications.

DDOS 98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cybersecurity Leaders Stressed Over Email Security

Security Boulevard

Email is the most relied-on means of communication for businesses, but it also poses a significant risk due to the combined threats of inbound phishing attacks, human error and data exfiltration leading to outbound security incidents. A report from Egress found 92% of organizations fell victim to successful phishing attacks in the last 12 months, The post Cybersecurity Leaders Stressed Over Email Security appeared first on Security Boulevard.

article thumbnail

Google Pixel: Cropped or edited images can be recovered

Malwarebytes

Most of us have a camera on us at all times, and so photo taking and image sharing has become almost ubiquitous. But when sharing an image, you want to have control over what you share. And that might lead you to crop images, or redact parts of them. Maybe you cropped out a person that didn't want their photo online, maybe you put a black mark across your address, or credit card number, or other personal information.

Backups 98
article thumbnail

New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers

The Hacker News

Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called ShellBot. "ShellBot, also known as PerlBot, is a DDoS Bot malware developed in Perl and characteristically uses IRC protocol to communicate with the C&C server," AhnLab Security Emergency response Center (ASEC) said in a report.

DDOS 98
article thumbnail

Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution

Security Boulevard

Cyral is excited to announce that version 4.5 of the Cyral Platform is now generally available. The latest release of the platform combines the capabilities … The post <strong>Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution</strong> appeared first on Cyral. The post Cyral 4.5 Release: Converges DAM, PAM, DLP, and DSPM into Single Solution appeared first on Security Boulevard.

98
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft: Defender update behind Windows LSA protection warnings

Bleeping Computer

Microsoft says the KB5007651 Microsoft Defender Antivirus update triggers Windows Security warnings on Windows 11 systems saying that Local Security Authority (LSA) Protection is off. [.

article thumbnail

Financial Services Firms: Address FFIEC’s Stringent API Security Regulations with Noname Security

Security Boulevard

Financial services companies are a favorite target for threat actors. Most of us are familiar with the Equifax and Capital One breaches that exposed hundreds of millions of customer records. But there are other attacks that don’t make the headlines. Over the years, the Carnegie Endowment’s FinCyber project has documented hundreds of separate cyber incidents impacting financial institutions around the world.

article thumbnail

Bad magic: new APT found in the area of Russo-Ukrainian conflict

SecureList

Since the start of the Russo-Ukrainian conflict, Kaspersky researchers and the international community at large have identified a significant number of cyberattacks executed in a political and geopolitical context. We previously published an overview of cyber activities and the threat landscape related to the conflict between Russia and Ukraine and continue to monitor new threats in these regions.

article thumbnail

Custom 'Naplistener' Malware a Nightmare for Network-Based Detection

Dark Reading

Threat actors are using legitimate network assets and open source code to fly under the radar in data-stealing attacks using a set of custom malware bent on evasion.

Malware 101
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cybersecurity Risk Quantification: A New Way to Understand Risks

Security Boulevard

Digital fraud and cybersecurity risks are always with us, and they’re constantly changing as businesses open new channels and adopt new technologies that criminals work to exploit. Data breaches are an especially thorny problem, with millions of customer records breached every year, and even password managers becoming vulnerable targets. Fraud continues to increase year over.

Risk 97
article thumbnail

Malware creator who compromised 10,000 computers arrested

Malwarebytes

The creator of a Remote Access Trojan (RAT), responsible for compromising more than 10,000 computers, has been arrested by law enforcement in Ukraine. At the time of the arrest, the developer still had real-time access to 600 PCs. According to the announcement , the RAT could tell infected devices to: Download and upload files Install and uninstall programs Take screenshots Capture sound from microphones Capture video from cameras Once data was harvested by the RAT, some of it was put to further

Malware 93
article thumbnail

Windows 10 KB5023773 preview update released with 10 fixes

Bleeping Computer

Microsoft has released the optional KB5023773 Preview cumulative update for Windows 10 20H2, Windows 10 21H2, and Windows 10 22H2, with ten fixes for various issues. [.

96
article thumbnail

Tesla Owner Unlocks and Drives Off with the Wrong Vehicle by Mistake

ZoneAlarm

On a typical day in Vancouver, Canada, Rajesh Randev, an immigration consultant, found himself in an unusual situation when he realized he had driven away in the wrong Tesla. Randev believed he was getting into his Tesla, having opened the door with his app, but after driving for a few minutes, he noticed a crack … The post Tesla Owner Unlocks and Drives Off with the Wrong Vehicle by Mistake appeared first on ZoneAlarm Security Blog.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

As critical Microsoft vulnerabilities drop, attackers may adopt new techniques

CSO Magazine

While the total number of recorded Microsoft vulnerabilities was higher in 2022 than ever before, the number of critical vulnerabilities declined to its lowest point, according to the latest Microsoft Vulnerability Report by BeyondTrust, released Tuesday. In 2022, only 6.9% of Microsoft’s vulnerabilities were rated as critical — less than half the number of critical vulnerabilities recorded in 2020.

Risk 91
article thumbnail

Ferrari confirms data breach after receiving a ransom demand from an unnamed extortion group

Security Affairs

Ferrari disclosed a data breach after receiving a ransom demand from an unnamed extortion group that gained access to some of its IT systems. Ferrari disclosed a data breach after it received a ransom demand from an unnamed extortion group that breached its IT systems. The threat actor claims to have stolen certain client details. The company immediately launched an investigation into the incident with the support of a third-party cybersecurity firm and informed relevant authorities. “Ferr

article thumbnail

BreachForums Administrator Baphomet Shuts Down Infamous Hacking Forum

The Hacker News

In a sudden turn of events, Baphomet, the current administrator of BreachForums, said in an update on March 21, 2023, that the hacking forum has been officially taken down but emphasized that "it's not the end.

Hacking 90
article thumbnail

Breached hacking forum shuts down, fears it's not 'safe' from FBI

Bleeping Computer

The notorious Breached hacking forum has shut down after the remaining administrator, Baphomet, disclosed that they believe law enforcement has access to the site's servers. [.

Hacking 90
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Google Pixel phones had a serious data leakage bug – here’s what to do!

Naked Security

What if the "safe" images you shared after carefully cropping them. had some or all of the "unsafe" pixels left behind anyway?

105
105
article thumbnail

Coinbase Wallet 'Red Pill' flaw allowed attacks to evade detection

Bleeping Computer

Coinbase wallet and other decentralized crypto apps (dapps) were found to be vulnerable to "red pill attacks," a method that can be used to hide malicious smart contract behavior from security features. [.

89
article thumbnail

Data Leak Strategy Fueling the Ransomware Economy

SecureWorld News

Ransomware has gone through several game-changing milestones over the course of its decade-long evolution. In 2013, extortionists added encryption to their genre and started locking down victims' files instead of screens or web browsers. Two years later, a sketchy affiliate model called Ransomware-as-a-Service (RaaS) made its debut, thereby lowering the entry bar for wannabe threat actors.

article thumbnail

Hackers use new PowerMagic and CommonMagic malware to steal data

Bleeping Computer

Security researchers have discovered attacks from an advanced threat actor that used "a previously unseen malicious framework" called CommonMagic and a new backdoor called PowerMagic. [.

Malware 86
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.