Mon.Jun 19, 2023

article thumbnail

Power LED Side-Channel Attack

Schneier on Security

This is a clever new side-channel attack : The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader­or of an attached peripheral device­during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used in Minerva.

article thumbnail

Hackers use fake OnlyFans pics to drop info-stealing malware

Bleeping Computer

A malware campaign is using fake OnlyFans content and adult lures to install a remote access trojan known as 'DcRAT,' allowing threat actors to steal data and credentials or deploy ransomware on the infected device. [.

Malware 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Valence Revolutionizes SaaS Security with AI

CyberSecurity Insiders

The widespread adoption of SaaS applications has created an intricate ‘SaaS mesh’ in most organizations. While these applications have undoubtedly improved productivity, they have also introduced a new set of security risks. From insecure integrations and unmanaged user identities to rogue data sharing, businesses face numerous challenges that traditional security solutions such as CASBs struggle to address.

Risk 126
article thumbnail

ASUS urges customers to patch critical router vulnerabilities

Bleeping Computer

ASUS has released new firmware with cumulative security updates that address vulnerabilities in multiple router models, warning customers to immediately update their devices or restrict WAN access until they're secured. [.

Firmware 132
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

PharMerica Breach: The Lure of Health Care Data

Security Boulevard

Two months after noticing suspicious activity in its systems, PharMerica disclosed that nearly six million patients had their health care data stolen by threat actors. The large pharmacy services company, which has more than 2,500 locations in the U.S., filed a data breach notification in May 2023. PharMerica noted that a third party had gained. The post PharMerica Breach: The Lure of Health Care Data appeared first on Security Boulevard.

article thumbnail

Android spyware camouflaged as VPN, chat apps on Google Play

Bleeping Computer

Three Android apps on Google Play were used by state-sponsored threat actors to collect intelligence from targeted devices, such as location data and contact lists. [.

Spyware 132

LifeWorks

More Trending

article thumbnail

Iowa’s largest school district confirms ransomware attack, data theft

Bleeping Computer

Des Moines Public Schools, Iowa's largest school district, confirmed today that a ransomware attack was behind an incident that forced it to take all networked systems offline on January 9, 2023. [.

article thumbnail

Reddit Ransomware Raid Redux: BlackCat/ALPHV Demands $4.5M

Security Boulevard

And now, this: John-Oliver-pics protest won’t change Reddit policy, but will ransom demand work? The post Reddit Ransomware Raid Redux: BlackCat/ALPHV Demands $4.5M appeared first on Security Boulevard.

article thumbnail

New Stealer Malware on the Rise: Mystic Stealer

Heimadal Security

Mystic Stealer is an information-stealing malware that first emerged on hacking forums on April 2023. The stealer gets more and more popular among cybercriminals as its features evolve. Details About Mystic Stealer The malware is rented for $150/month, or $390/ quarter, as announced on forums like WWH-Club, BHF, and XSS. It currently targets 40 web […] The post New Stealer Malware on the Rise: Mystic Stealer appeared first on Heimdal Security Blog.

Malware 104
article thumbnail

How to Find Qualified Cyber Security Candidates

Security Boulevard

In today’s digital landscape, organisations face an ever-increasing threat of cyberattacks. Since 2019, the number of cyberattacks globally has increased […] The post How to Find Qualified Cyber Security Candidates appeared first on Security Boulevard.

105
105
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions

The Hacker News

A new information-stealing malware called Mystic Stealer has been found to steal data from about 40 different web browsers and over 70 web browser extensions. First advertised on April 25, 2023, for $150 per month, the malware also targets cryptocurrency wallets, Steam, and Telegram, and employs extensive mechanisms to resist analysis.

Malware 103
article thumbnail

Strengthening Blockchain Security: Secureflo’s Cybersecurity Capabilities

Security Boulevard

Strengthening Blockchain Security: Secureflo’s Cybersecurity Capabilities Strengthening Blockchain Security: Secureflo’s Cybersecurity Capabilities Introduction Introduction Blockchain technology has revolutionized various industries, providing decentralized and transparent systems. However, ensuring the security and integrity of blockchain networks is of utmost importance.

article thumbnail

Researchers Discover New Sophisticated Toolkit Targeting Apple macOS Systems

The Hacker News

Cybersecurity researchers have uncovered a set of malicious artifacts that they say is part of a sophisticated toolkit targeting Apple macOS systems. "As of now, these samples are still largely undetected and very little information is available about any of them," Bitdefender researchers Andrei Lapusneanu and Bogdan Botezatu said in a preliminary report published on Friday.

article thumbnail

Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution

Security Boulevard

If your company uses software under a license agreement that gives audit rights to the software vendor—and your company probably does—you may well have an adventure in your future. Vendors do, in fact, conduct software audits on a regular basis and, unfortunately, it’s quite common for them to find that a user is out of. The post Adventures in Audits, Part One: How Software License Terms Drive Audit Resolution appeared first on Security Boulevard.

Software 105
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Law enforcement’s battle against Cryptocurrency crime

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. While cryptocurrencies have been celebrated for their potential to revolutionize finance, their anonymous nature has also been exploited for illicit activities. From drug dealing and arms trafficking to funding terrorism, black market activities have thrived under the cloak of cryptocurrency’s pseudonym

article thumbnail

GUEST ESSAY: The need to assess context, intent when granting privileged access in today’s world

The Last Watchdog

The number one cybersecurity threat vector is unauthorized access via unused, expired or otherwise compromised access credentials. Related: The rising role of PAM for small businesses In the interconnected work environment, where users need immediate access to many platforms on and off-premises to do their jobs, keeping track of user activity and proper on and off-boarding is becoming more and more difficult.

article thumbnail

Cyber Attack on European Investment Bank and Redditt

CyberSecurity Insiders

According to recent reports, it appears that the European Investment Bank (EIB) has fallen victim to a cyber attack orchestrated by the Russian hacking group known as Killnet. These hackers, who have been planning the digital assault since May, aim to cripple the Western financial system by the end of this month. Speculation suggests that this attack could be in retaliation to the assistance provided by several countries, including the UK and the USA, to Ukraine in its conflicts with the Kremlin

article thumbnail

SeroXen Mechanisms: Exploring Distribution, Risks, and Impact

Trend Micro

This is the third installment of a three-part technical analysis of the fully undetectable (FUD) obfuscation engine BatCloak and SeroXen malware. In this entry, we document the techniques used to spread and abuse SeroXen, as well as the security risks, impact, implications of, and insights into highly evasive FUD batch obfuscators.

Risk 99
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions

The Hacker News

Microsoft on Friday attributed a string of service outages aimed at Azure, Outlook, and OneDrive earlier this month to an uncategorized cluster it tracks under the name Storm-1359. "These attacks likely rely on access to multiple virtual private servers (VPS) in conjunction with rented cloud infrastructure, open proxies, and DDoS tools," the tech giant said in a post on Friday.

DDOS 99
article thumbnail

Malwarebytes issues fix for Chrome broken by Windows 11 KB5027231

Bleeping Computer

Malwarebytes released a fix for a known issue breaking Google Chrome on its customers' systems after installing the Windows 11 22H2 KB5027231 cumulative update released last week. [.

99
article thumbnail

Experts found components of a complex toolkit employed in macOS attacks

Security Affairs

Researchers uncovered a set of malicious files with backdoor capabilities that they believe is part of a toolkit targeting Apple macOS systems. Bitdefender researchers discovered a set of malicious files with backdoor capabilities that are suspected to be part of a sophisticated toolkit designed to target Apple macOS systems. The investigation is still ongoing, the experts pointed out that the samples are still largely undetected.

Spyware 98
article thumbnail

MOVEit Vulnerability Exposes Millions in Oregon DMV Breach

SecureWorld News

In a significant data breach impacting millions of individuals, the Oregon Department of Transportation (ODOT) has confirmed that its data was compromised as part of a global attack on the popular file transfer software, MOVEit Transfer. The breach, which exploited a Zero-Day vulnerability, has raised concerns about the patching practices and security measures employed by organizations worldwide.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

EU member states are urged to restrict without delay 5G equipment from risky suppliers

Security Affairs

The European Commission urges member states to limit “without delay” equipment from Chinese suppliers from their 5G networks, specifically Huawei and ZTE. The European Commission told member states to impose restrictions on high-risk suppliers for 5G networks without delay, with a specific focus on the dependency on high-risk suppliers, specifically Chinese firms Huawei and ZTE.

Risk 98
article thumbnail

Black Cat ransomware group wants $4.5m from Reddit or will leak stolen files

Malwarebytes

The ramifications of a Reddit breach which occurred back in February are now being felt, with the attackers threatening to leak the stolen data. The February attack, billed as a “sophisticated phishing campaign” by Reddit, involved an attempt to swipe credentials and two-factor authentication tokens. One employee was tricked into handing over details, and then reported what had happened to Reddit.

article thumbnail

Diicot cybercrime gang expands its attack capabilities

Security Affairs

Researchers found evidence that Diicot threat actors are expanding their capabilities with new payloads and the Cayosin Botnet. Cado researchers recently detected an interesting attack pattern linked to an emerging cybercrime group tracked as Diicot (formerly, “Mexals”) and described in analyses published by Akamai and Bitdefender. The experts discovered several payloads, some of which were not publicly known, that are being used as part of a new ongoing campaign.

article thumbnail

Update now! ASUS fixes nine security flaws

Malwarebytes

ASUS has released firmware updates for several router models fixing two critical and several other security issues. The new firmware with accumulated security updates is available for the models GT6, GT-AXE16000, GT-AX11000 PRO, GT-AXE11000, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and TUF-AX5400.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ASUS addressed critical flaws in some router models

Security Affairs

ASUS addressed critical vulnerabilities in multiple router models, urging customers to immediately install firmware updates. ASUS is warning customers to update some router models to the latest firmware to address critical vulnerabilities. The impacted models are GT6, GT-AXE16000, GT-AX11000 PRO, GT-AX6000, GT-AX11000, GS-AX5400, GS-AX3000, XT9, XT8, XT8 V2, RT-AX86U PRO, RT-AX86U, RT-AX86S, RT-AX82U, RT-AX58U, RT-AX3000, TUF-AX6000, and TUF-AX5400.

article thumbnail

Phishing scam takes $950k from DoorDash drivers

Malwarebytes

A particularly nasty slice of phishing, scamming, and social engineering is responsible for DoorDash drivers losing a group total of around $950k. DoorDash drivers are contractors who pick up food deliveries from stores and restaurants and deliver the products to the customer. A 21 year old man named David Smith, from Connecticut, allegedly figured out a way to extract large quantities of cash from drivers with a scam stretching back to 2020.

Scams 98
article thumbnail

GUEST ESSAY: The need to assess context, intent when granting privileged access in today’s world

Security Boulevard

The number one cybersecurity threat vector is unauthorized access via unused, expired or otherwise compromised access credentials. Related: The rising role of PAM for small businesses In the interconnected work environment, where users need immediate access to many platforms on … (more…) The post GUEST ESSAY: The need to assess context, intent when granting privileged access in today’s world appeared first on Security Boulevard.

article thumbnail

Baby monitor safety: What you need to know

Malwarebytes

Do you have an impending new arrival in your family of the small and very noisy variety? If so, you’re probably going to invest in a baby monitor for peace of mind both at night and during the day. But do you know what kind of monitor you’re going to buy? Will it be audio only, or have images? Will it be Wi-Fi, or the non Wi-Fi kind? Did you know there’s a non Wi-Fi kind?

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!