Sun.Sep 25, 2022

article thumbnail

Book Review: 'If It’s Smart, It’s Vulnerable'

Lohrman on Security

This review covers Mikko Hypponen’s latest book, If It’s Smart, It’s Vulnerable. This is an excellent book that is highly recommended.

165
165
article thumbnail

OpIran: Anonymous declares war on Teheran amid Mahsa Amini’s death

Security Affairs

OpIran: Anonymous launched Operation Iran against Teheran due to the ongoing crackdown on dissent after Mahsa Amini’s death. Anonymous launched OpIran against Iran due to the ongoing crackdown on dissent after Mahsa Amini’s death. The protests began after the death of Mahsa Amini from Saqqez in Kurdistan province after her arrest by Iran’s morality police for allegedly wearing her hijab too loosely.

Internet 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Does Social Engineering Have to Do with Ransomware?

ZoneAlarm

Online scams have become so common that we are immediately suspicious whenever we see a pop-up on a website, get an email with a link to click, or a file to open. So how is it possible that so many people and organizations continue to fall for whatever cybercriminals throw their way? Throughout the hundreds … The post What Does Social Engineering Have to Do with Ransomware?

article thumbnail

Windows 11 now warns when typing your password in Notepad, websites

Bleeping Computer

Windows 11 22H2 was just released, and with it comes a new security feature called Enhanced Phishing Protection that warns users when they enter their Windows password in insecure applications or on websites. [.].

Passwords 105
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

ISC fixed high-severity flaws in the BIND DNS software

Security Affairs

The Internet Systems Consortium (ISC) fixed six remotely exploitable vulnerabilities in the BIND DNS software. The Internet Systems Consortium (ISC) this week released security patches to address six remotely exploitable vulnerabilities in BIND DNS software. Four out of six flaws, all denial-of-service (DoS) issue, have been rated as ‘high’ severity.

DNS 100
article thumbnail

Microsoft SQL servers hacked in TargetCompany ransomware attacks

Bleeping Computer

Security analysts at ASEC have discovered a new wave of attacks targeting vulnerable Microsoft SQL servers, involving the deployment of a ransomware strain named FARGO. [.].

More Trending

article thumbnail

New hacking group ‘Metador’ lurking in ISP networks for months

Bleeping Computer

A previously unknown threat actor that researchers have named 'Metador' has been breaching telecommunications, internet services providers (ISPs), and universities for about two years. [.].

article thumbnail

London Police arrested a teen suspected to be behind Uber, Rockstar Games breaches

Security Affairs

The City of London Police this week announced the arrest of a 17-year-old teenager on suspicion of hacking. Is he the Uber hacker? The City of London Police on Friday announced to have arrested a 17-year-old teenager on suspicion of hacking, however, experts believe the arrest could be linked to the recent security breaches suffered by Uber and Rockstar Games.

Hacking 90
article thumbnail

Ransomware data theft tool may show a shift in extortion tactics

Bleeping Computer

Data exfiltration malware known as Exmatter and previously linked with the BlackMatter ransomware group is now being upgraded with data corruption functionality that may indicate a new tactic that ransomware affiliates might switch to in the future. [.].

article thumbnail

Security Affairs newsletter Round 385

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. ISC fixed high-severity flaws in the BIND DNS software Ukraine: SSU dismantled cyber gang that stole 30 million accounts London Police arrested a teen suspected to be behind Uber, Rockstar Games breaches Sophos warns of a new actively exploited fla

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

American Airlines learned it was breached from phishing targets

Bleeping Computer

American Airlines says its Cyber Security Response Team found out about a recently disclosed data breach from the targets of a phishing campaign that was using an employee's hacked Microsoft 365 account. [.].

article thumbnail

Child Predators Mine Twitch to Prey on Kids

WIRED Threat Level

Plus: A leaked trove illuminates Russia’s internet regulator, a report finds Facebook and Instagram violated Palestinian rights, and more.

article thumbnail

Uber and Rockstar – has a LAPSUS$ linchpin just been busted (again)?

Naked Security

Is this the same suspect as before? Is he part of LAPSUS$? Is this the man who hacked Uber and Rockstar? And, if so, who else?

Hacking 93
article thumbnail

VPN Providers Flee India as a New Data Law Takes Hold

WIRED Threat Level

Many companies have pulled physical servers from the country as a mandate to collect customer data goes into effect.

VPN 94
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

For years the tech industry has promised a shift toward a passwordless future. In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology. Google, Paypal, and Lenovo were among the original FIDO founding members. By 2015, Microsoft joined, and in 2020, Apple followed. The road to a passwordless world has been slow, but seems to have accelerated in the past year, helped in part by Microsoft’s move to passwordless sign-on.

Passwords 113