Sat.Mar 13, 2021

article thumbnail

Phishing Attacks that Defeat 2FA Every Time

Security Boulevard

Protected with 2FA? Think Again. Two-factor authentication (2FA) is certainly a best practice for corporate security, but cybercriminals are also quite good at defeating it, often without a user’s knowledge. However 2FA is not a panacea and just like cyber awareness training, it is just one part of a total protection program. Assessing the risk […].

Phishing 145
article thumbnail

15-year-old Linux kernel bugs let attackers gain root privileges

Bleeping Computer

Three security vulnerabilities found in the iSCSI subsystem of the Linux kernel could allow local attackers with basic user privileges to gain root privileges on unpatched Linux systems. [.].

144
144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The fire in the OVH datacenter also impacted APTs and cybercrime groups

Security Affairs

The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs. OVH, one of the largest hosting providers in the world, has suffered this week a terrible fire that destroyed its data centers located in Strasbourg. The French plant in Strasbourg includes 4 data centers, SBG1, SBG2, SBG3, and SBG4 that were shut down due to the incident, and the fire started in SBG2 one.

article thumbnail

Microsoft shares temporary fix for Windows 10 printing crashes

Bleeping Computer

Microsoft has provided a temporary fix for the Windows 10 blue screen crashes plaguing customers when printing after installing the March 2021 cumulative updates. [.].

145
145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Experts found three new 15-year-old bugs in a Linux kernel module

Security Affairs

Three 15-year-old flaws in Linux kernel could be exploited by local attackers with basic user privileges to gain root privileges on vulnerable Linux systems. GRIMM researchers found three vulnerabilities in the SCSI (Small Computer System Interface) component of the Linux kernel, the issues could be exploited by local attackers with basic user privileges to gain root privileges on unpatched Linux systems.

Hacking 138
article thumbnail

Four innovative payment services using a banking app

CyberSecurity Insiders

The mobile app is the new bank branch. With an installed base of more than three billion iOS and Android smartphones, the mobile banking app has become the main channel for consumers to interact with their bank. In less than a decade, services beyond the simple balance verification emerged, such as check deposits, statements review, bill payments, money transfers, new account opening, setup of new beneficiaries, P2P money transfer, and many more.

Banking 116

More Trending

article thumbnail

How can we prevent sophisticated document fraud in 2021?

CyberSecurity Insiders

It’s hard to imagine that there’s still a big trade for counterfeit documentation and forged IDs. After all, we’re living in a connected era where it feels like much of our lives is spent online and accessed digitally through protected credentials. We’ve become so used to believing that online details – like internet bank accounts and Government tax portals – are inherently more valuable than physical documents (driving licenses, passports , etc. ) that we often forget that document fraud

article thumbnail

New variant for Mac Malware XCSSET compiled for M1 Chips

Security Affairs

Kaspersky researchers spotted a new variant of the XCSSET Mac malware that compiled for devices running on Apple M1 chips. XCSSET is a Mac malware that was discovered by Trend Micro in August 2020, it was spreading through Xcode projects and exploits two zero-day vulnerabilities to steal sensitive information from target systems and launch ransomware attacks.

Malware 105
article thumbnail

How can technology protect and improve the future of sport?

CyberSecurity Insiders

Earlier this month , many sports fans tuned in to watch the latest (and slightly subdued ) edition of NFL’s biggest show, Super Bowl 55 (or LV, if you’re a traditionalist), which felt very different this year as a result of the COVID-19 pandemic. Whether it’s the removal of fans from stadiums or the stringent COVID protocols enforced on athletes, sports teams and organisations have had to completely re-think and reshape their processes to ensure fan and athlete safety. .

article thumbnail

CEO of Sky Global encrypted chat platform indicted by US

Bleeping Computer

The US Department of Justice has indicted the CEO of encrypted messaging company Sky Global, and an associate for allegedly aiding criminal enterprises avoid detection by law enforcement. [.].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Deepfake cyberthreats – The next evolution

CyberSecurity Insiders

This blog was written by an independent guest blogger. In 2019, we published an article about deepfakes and the technology behind them. At the time, the potential criminal applications of this technology were limited. Since then, research published in Crime Science has delved into the topic in-depth. The study identified several potential criminal applications for deepfakes.

article thumbnail

How to Export Your Passwords From LastPass

WIRED Threat Level

The popular security service is severely limiting its free tier starting March 16. If you’d like to move your passwords to another manager, here’s how.

Passwords 100
article thumbnail

What is an incident response plan? Reviewing common IR templates, methodologies

CyberSecurity Insiders

This article was written by an independent guest author. In today’s threat landscape, it’s no longer if an incident will happen, it’s when. Defending your organization and having a plan for what to do if an incident occurs is more critical than ever. And frankly, the benefits of having an incident response plan are quantifiable. Ponemon’s Cost of a Data Breach Report compared organizations boasting robust security Incident Response (IR) capabilities with those that do not

article thumbnail

Police raid apartment of alleged Verkada hacker, as questions asked about employees’ access to customer video feeds

Graham Cluley

Following news that the video streams of 150,000 webcams managed by Verkada had been breached, police in Switzerland have raided the alleged hacker's apartment.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Stories from the SOC – Beaconing Activity

CyberSecurity Insiders

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. Executive Summary. Beaconing analysis is one of the most effective methods for threat hunting on your network. In the world of malware, beaconing is the act of sending regular communications from an infected host to an attacker-controlled host to communicate that the infected h

article thumbnail

Nulled WordPress Themes And Plugins: Why using them is a security risk

SecureBlitz

Nulled themes and plugins, you might have heard of them. Essentially, they’re pirated copies of premium WordPress themes and plugins. They help you gain premium WordPress features and functionalities without having to pay for them. A lot of people, seeing the word “premium” and “free” get attracted to these themes and plugins and download them. The post Nulled WordPress Themes And Plugins: Why using them is a security risk appeared first on SecureBlitz Cybersecurity.

Risk 99
article thumbnail

How to guarantee patient identification during a pandemic

CyberSecurity Insiders

The c oronavirus pandemic has already changed the world in unprecedented ways and is also likely to shape how w e will interact with others for many years to come. Ensuring we maintain strict hygiene habits, keeping distance from others, and wearing masks when visiting indoor public spaces have already started to feel somewhat normal, and will likely stay that way for quite some time. .

article thumbnail

Hackers Accessed Security Cameras Inside Tesla and Beyond

WIRED Threat Level

Plus: A Molson-Coors hack, Github controversy, and more of the week's top security news.

Hacking 111
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Quantifying CyberRisk- Solving the riddle

CyberSecurity Insiders

In the late 1990’s and early 2000’s there was a concept that was bandied about that was coined “Return on Security Investment” or ROSI. Borrowing from the common business term Return on Investment (ROI) where a return on a particular investment (capital investment, personnel, training etc.) could be quantified, the cybersecurity industry attempted to quantify a return on security investment.

article thumbnail

Microsoft Edge to use a four-week release cycle to sync with Chrome

Bleeping Computer

Major 'Stable' versions of Microsoft Edge will now be released every four weeks to synchronize with the new four-week release cycle announced by Google Chrome. [.].

78
article thumbnail

BSides Huntsville 2021 – Joanna Burkey’s ‘Keynote – Cybersecurity As An Ecosystem’

Security Boulevard

Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosec event. Permalink. The post BSides Huntsville 2021 – Joanna Burkey’s ‘Keynote – Cybersecurity As An Ecosystem’ appeared first on Security Boulevard.

InfoSec 70
article thumbnail

Cybersecurity and online gaming: Don’t be a victim

CyberSecurity Insiders

Theresa Lanowitz collaborated on this blog. Introduction. The proliferation of technology and internet connectivity has made it possible for people to seek out most things online, and gaming and gambling are not exceptions. In addition to online video games, social media, music, and video streaming, there are also online casinos and gambling for real money.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Retrieve Process Run-time Architecture on Apple Silicon Macs On The Command Line with `archinfo`

Security Boulevard

Apple M1/Apple Silicon/arm64 macOS can run x86_64 programs via Rosetta and most M1 systems currently (~March 2021) very likely run a mix of x86_64 and arm64 processes. Activity Monitor can show the architecture: but command line tools such as ps and top do not due to Apple hiding the details of the proper sysctl() incantations. Continue reading ?. The post Retrieve Process Run-time Architecture on Apple Silicon Macs On The Command Line with `archinfo` appeared first on Security Boulevard.

article thumbnail

A plea to small businesses: Improve your security maturity

CyberSecurity Insiders

Never have I been so compelled to help educate small businesses on the need for cybersecurity. On Saturday morning, March 6, 2021, I awoke to the Wall Street Journal article describing the Hafnium attack. This attack on Microsoft Exchange Servers was shared publicly on March 2nd with a patch for the issue released on Wednesday, March 3rd. This patch appeared to spark action from the hacker who ramped up and automated their attack for maximum scale.

article thumbnail

5 Tips To Succeed In Building An Offshore Team

SecureBlitz

Offshoring is not a new trend. It has been used over the years and is currently a common practice with many companies. Thanks to technological advancements and the internet, offshoring is now easier for all companies, and not only those in the information technology industry. Offshore outsourcing has numerous benefits. Not only does it offer. The post 5 Tips To Succeed In Building An Offshore Team appeared first on SecureBlitz Cybersecurity.

article thumbnail

BSides Huntsville 2021 – Fernando Tomilson’s ‘The Invisible War: A Look At The Ransomware Battle’

Security Boulevard

Many thanks to BSides Huntsville 2021 for publishing their tremendous conference videos on the organization's YouTube channel; one of the best BSides for this year, don't miss this 10-video infosec event. Permalink. The post BSides Huntsville 2021 – Fernando Tomilson’s ‘The Invisible War: A Look At The Ransomware Battle’ appeared first on Security Boulevard.

InfoSec 57
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

International Women’s Day: Celebrating female-led innovation

CyberSecurity Insiders

Today we mark International Women’s Day – a global event which seeks to celebrate the social, economic, cultural and political achievements of women. The event also signifies a call to action for people worldwide to push for greater gender parity in all aspects of everyday life. As part of this year’s theme, organizers have created the hashtag #ChooseToChallenge , calling upon people globally to challenge and call out gender inequality while celebrating women’s achievements, with the end g

article thumbnail

XKCD ‘Circles’

Security Boulevard

via the comic delivery system monikered Randall Munroe resident at XKCD ! Permalink. The post XKCD ‘Circles’ appeared first on Security Boulevard.

57
article thumbnail

Why biometric bank cards are the future of payments

CyberSecurity Insiders

It goes without saying , but smartphones are everywhere these days. In fact, in 202 1 , there are now an estimated 3.8 billion smartphone users – which equals 48.5% of the world’s population. For these consumers, smartphones have become the default way to carry out important everyday tasks; from ordering food and buying clothes , to accessing online accounts and paying for goods in-store. .

Banking 52
article thumbnail

Security News in Review: Microsoft Exchange Server Hack “Doubling” Every Two Hours; Linux Foundation Creates New Software Signing Service

Security Boulevard

In this week’s edition of our roundup of the cybersecurity news, you’ll find information on Microsoft’s Patch Tuesday in case you missed it, new insights into the Exchange Server hack, and information on the rise in K-12 cyberattacks among other important security news stories from the past week. . The post Security News in Review: Microsoft Exchange Server Hack “Doubling” Every Two Hours; Linux Foundation Creates New Software Signing Service appeared first on Security Boulevard.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.