Tue.Sep 29, 2020

article thumbnail

Hacking a Coffee Maker

Schneier on Security

As expected, IoT devices are filled with vulnerabilities : As a thought experiment, Martin Hron, a researcher at security company Avast, reverse engineered one of the older coffee makers to see what kinds of hacks he could do with it. After just a week of effort, the unqualified answer was: quite a lot. Specifically, he could trigger the coffee maker to turn on the burner, dispense water, spin the bean grinder, and display a ransom message, all while beeping repeatedly.

Hacking 355
article thumbnail

Who’s Behind Monday’s 14-State 911 Outage?

Krebs on Security

Emergency 911 systems were down for more than an hour on Monday in towns and cities across 14 U.S. states. The outages led many news outlets to speculate the problem was related to Microsoft ‘s Azure web services platform, which also was struggling with a widespread outage at the time. However, multiple sources tell KrebsOnSecurity the 911 issues stemmed from some kind of technical snafu involving Intrado and Lumen , two companies that together handle 911 calls for a broad swath of the Uni

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Pearl Harbor Is Happening Right Now — It’s Ransomware

Daniel Miessler

Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. The idea was that it’d be some massive blast that would take out the country’s power grid, or disable the entire internet, along with what they used to call e-commerce.

article thumbnail

Hackers Release Student Data Following Ransomware Attack

Adam Levin

Ransomware operators have released the personal data of students in the Clark County School District in Nevada after officials refused to pay to have their files decrypted. The information leaked reportedly includes Social Security numbers, names, grades, addresses, and financial information. District officials have been thus far unable to verify the data.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Maritime transport and logistics giant CMA CGM hit with ransomware

Security Affairs

The French maritime transport and logistics giant CMA CGM S.A. revealed it was the victim of a malware attack that affecting some servers on its network. CMA CGM S.A. , a French maritime transport and logistics giant, revealed that a malware attack affected some servers on its network. The company is present in over 160 countries through 755 offices and 750 warehouses with 110,000 employees and 489 vessels.

article thumbnail

FBI says hackers want to stoke doubt about the 2020 election

Tech Republic Security

In a PSA on Monday, the FBI and CISA warned about the potential for widespread disinformation campaigns in the run-up to November.

151
151

More Trending

article thumbnail

Securing Slack: 5 Tips for Safer Messaging, Collaboration

Dark Reading

Remote workers and scattered teams are relying on Slack more and more for messaging and collaboration. Here are a few extra tips for keeping data and systems more secure when using Slack.

131
131
article thumbnail

Cisco fixes actively exploited issues in IOS XR Network OS

Security Affairs

Cisco addressed two actively exploited DoS vulnerabilities that reside in the IOS XR software that runs on multiple carrier-grade routers. Cisco addressed two high severity memory exhaustion DoS vulnerabilities that reside in the IOS XR Network OS that runs on multiple carrier-grade routers. The company confirmed that both vulnerabilities are actively exploited in attacks in the wild.

Internet 130
article thumbnail

How to handle security risks in a hybrid work environment

Tech Republic Security

Half of the organizations surveyed by Tessian were hit by a security incident while employees were working remotely. Here are some tips for mitigation.

Risk 124
article thumbnail

QNAP urges users to update NAS firmware and app to prevent infections

Security Affairs

While the AgeLocker ransomware continues to target QNAP NAS systems, the Taiwanese vendor urges customers to update the firmware and apps. Taiwanese vendor QNAP is urging its customers to update the firmware and apps installed on their network-attached storage (NAS) devices to prevent AgeLocker ransomware infections. The name AgeLocker comes from the use of the Actually Good Encryption ( AGE ) algorithm to encrypt files, experts warn that encrypted files can’t be recovered without paying t

Firmware 130
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Microsoft: Ransomware & Nation-State Attacks Rise, Get More Sophisticated

Dark Reading

Malware-based attacks are out, phishing is in, along with credential stuffing and business email compromise. Microsoft recommends defensive tactics in its new report on rising threats.

Phishing 126
article thumbnail

Ransomware attack on Tyler Technologies might be worse than initially thought

Security Affairs

Customers of Tyler Technologies are reporting finding suspicious logins and previously unseen remote access tools on their infrastructure. Tyler Technologies, Inc. is the largest provider of software to the United States public sector. The company last week disclosed a ransomware attack, and now its customers are reporting finding suspicious logins and previously unseen remote access tools on their networks.

article thumbnail

Why Web Browser Padlocks Shouldn’t Be Trusted

Threatpost

Popular ‘safe browsing’ padlocks are now passe as a majority of bad guys also use them.

Phishing 129
article thumbnail

Shifting Left of Left: Why Secure Code Isn't Always Quality Code

Dark Reading

Enabling engineers to share responsibility for security and empowering them to erase common vulnerabilities are good starting points.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Zerologon Attacks Against Microsoft DCs Snowball in a Week

Threatpost

The attempted compromises, which could allow full control over Active Directory identity services, are flying thick and fast just a week after active exploits of CVE-2020-1472 were first flagged.

Hacking 86
article thumbnail

Vulnerability in Wireless Router Chipsets Prompts Advisory

Dark Reading

Synopsys issues an advisory for vulnerabilities affecting the chipsets of wireless routers from Qualcomm, Mediatek, and Realtek.

Wireless 106
article thumbnail

Las Vegas Students’ Personal Data Leaked, Post-Ransomware Attack

Threatpost

A researcher said he discovered an open data cache with names, grades, birthdates and more, after the Clark County School District refused to pay the ransom.

article thumbnail

New Campaign by China-Linked Group Targets US Orgs for First Time

Dark Reading

In a least one instance, the Palmerworm APT group was able to remain undetected on a compromised system for nearly six months, according to Symantec.

93
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How a Credential Harvesting Attack Cost Companies $1 Million

SecureWorld News

Many organizations believe they are not targets for a cyberattack because they "have nothing of value" that cybercriminals would want. Do you have an employee who is authorized to order office supplies, like printer ink? It turns out, cybercriminals would like that person's login credentials because they have value. Office supply phishing cyberattack campaign.

article thumbnail

State-Sponsored Hacking Groups Increasingly Use Cloud & Open Source Infrastructure

Dark Reading

Microsoft shuts down Azure Active Directory instances used by attackers to evade detection and warns that the use of open source tools by espionage groups is growing.

Hacking 111
article thumbnail

Telehealth Poll: How Risky Are Remote Doctor Visits?

Threatpost

Threatpost's latest poll probes telehealth security risks and asks for IT cures.

Risk 101
article thumbnail

The Shared Irresponsibility Model in the Cloud Is Putting You at Risk

Dark Reading

Step up, put the architecture and organization in place, and take responsibility. If you don't, who will?

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

The Network Perimeter: This Time, It’s Personal

Threatpost

Botnets and IoT devices are forming a perfect storm for IT staff wrestling with WFH employee security.

IoT 80
article thumbnail

DDoS Attacks Soar in First Half of 2020

Dark Reading

Shorter, faster, multivector attacks had a greater impact on victims.

DDOS 99
article thumbnail

2 egregious cloud security threats the CSA missed

InfoWorld on Security

My interesting weekend reading was this Cloud Security Alliance (CSA) report , which was vendor sponsored, highlighting 11 cloud security threats that should be on top of everyone’s mind. These threats are described as “egregious.” CSA surveyed 241 experts on security issues in the cloud industry and came up with these top 11 threats: Data breaches.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

If you think hacking only involves the use of a keyboard, then you’re probably missing out. What about using light? What about using sound? In this episode, The Hacker Mind looks at some of the work Dr. Kevin Fu has been doing at the University of Michigan, such as using laser pointers to pwn voice-activated digital assistants, and using specific frequencies of sound to corrupt or crash hard disk drives.

Hacking 52
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

'Where Law Ends' Review: How the Mueller Investigation Fell Flat

WIRED Threat Level

Prosecutor Andrew Weissmann's Where Law Ends doesn't fill the hole at the center of the Trump-Russia probe, but does help explain why it's there.

105
105
article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

If you think hacking only involves the use of a keyboard, then you’re probably missing out. What about using light? What about using sound? In this episode, The Hacker Mind looks at some of the work Dr. Kevin Fu has been doing at the University of Michigan, such as using laser pointers to pwn voice-activated digital assistants, and using specific frequencies of sound to corrupt or crash hard disk drives.

Hacking 52
article thumbnail

FBI and CISA warn of disinformation campaigns about the hack of voter systems

Security Affairs

The FBI and the US CISA issued a joint public service announcement about the threat of disinformation campaigns targeting the 2020 US election. The Federal Bureau of Investigation (FBI) and the US Cybersecurity and Infrastructure Security Agency (CISA) issued a joint public service announcement to warn of the threat of disinformation campaigns targeting the upcoming 2020 US election season.

Hacking 129