Sat.Mar 19, 2022

article thumbnail

Weekly Update 287

Troy Hunt

So the plan was to schedule this week's session in advance then right on 17:30 at my end, go live. It mostly worked, I just forgot to press the "go live" button having worked on the (obviously incorrect) assumption that would happen automatically. Lesson learned, session restarted, we'll be all good next week 😊 References Asking about IoT'ing the kids' showers led to lots of wrong answers (maybe I'm just scarred now knowing how much work is involved as so

IoT 269
article thumbnail

FBI: Avoslocker ransomware targets US critical infrastructure

Bleeping Computer

The Federal Bureau of Investigation (FBI) warns of AvosLocker ransomware being used in attacks targeting multiple US critical infrastructure sectors. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Developer sabotages own npm module prompting open-source supply chain security questions

CSO Magazine

The developer of a popular JavaScript component hosted on the npm repository decided to protest Russia's invasion of Ukraine by adding code to his own component that would add or delete files on people's computers in a way they didn't expect. The component, called node-ipc, is a dependency for a variety of other projects, which had to issue emergency updates to stop the undesired behavior they unwittingly inherited.

Risk 119
article thumbnail

Avoslocker ransomware gang targets US critical infrastructure

Security Affairs

The Federal Bureau of Investigation (FBI) reported that AvosLocker ransomware is being used in attacks targeting US critical infrastructure. The Federal Bureau of Investigation (FBI) published a joint cybersecurity advisory warning of AvosLocker ransomware attacks targeting multiple US critical infrastructure. The advisory was published in coordination with the US Treasury Department and the Financial Crimes Enforcement Network (FinCEN). “AvosLocker is a Ransomware as a Service (RaaS) affi

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A Developer Altered Open Source Software to Wipe Files in Russia

WIRED Threat Level

The author of a popular application pushed out an update containing malicious code in an effort to sabotage computers in the country.

Software 104
article thumbnail

Emsisoft releases free decryptor for the victims of the Diavol ransomware

Security Affairs

Cybersecurity firm Emsisoft released a free decryptor that allows the victims of the Diavol ransomware to recover their files without paying a ransom. Cybersecurity firm Emsisoft has released a free decryption tool to help Diavol ransomware victims recover their files without paying a ransom. In January, the FBI officially linked the Diavol ransomware operation to the infamous TrickBot gang , the group that is behind the TrickBot banking trojan.

More Trending

article thumbnail

Crooks claims to have stolen 4TB of data from TransUnion South Africa

Security Affairs

TransUnion South Africa discloses a data breach, threat actors who stolen sensitive data, demanded a ransom payment not to release stolen data. TransUnion South Africa announced that threat actors compromised a company server based in South Africa using stolen credentials. Threat actors have stolen company data and demanded a ransom payment not to release stolen data.

article thumbnail

Purdue University’s CERIAS 2021 Security Symposium – Dr. Antonio Bianchi’s ‘LIGHTBLUE: Automatic Profile-Aware Debloating Of Bluetooth Stacks’

Security Boulevard

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel. Permalink. The post Purdue University’s CERIAS 2021 Security Symposium – Dr. Antonio Bianchi’s ‘LIGHTBLUE: Automatic Profile-Aware Debloating Of Bluetooth Stacks’ appeared first on Security Boulevard.

article thumbnail

Exotic Lily initial access broker works with Conti gang

Security Affairs

Google’s Threat Analysis Group (TAG) uncovered a new initial access broker, named Exotic Lily, that is closely affiliated with the Conti ransomware gang. Google’s Threat Analysis Group (TAG) researchers linked a new initial access broker, named Exotic Lily, to the Conti ransomware operation. Initial access brokers play an essential role in the cybercrime ecosystem, they provide access to previously compromised organizations to threat actors.

article thumbnail

DEF CON 29 Ham Radio Village – Jon Marler’s ‘Amateur Radio Digital Modes Primer’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEF CON 29 Ham Radio Village videos on the Conferences’ YouTube channel. Permalink. The post DEF CON 29 Ham Radio Village – Jon Marler’s ‘Amateur Radio Digital Modes Primer’ appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

TSA’s First Crack at Guarding Pipelines From Hackers Falls Short

WIRED Threat Level

Plus: Anonymous dedicates a hack to Hillary Clinton, Google researchers expose Exotic Lily, and more.

Hacking 73
article thumbnail

New Phishing toolkit lets anyone create fake Chrome browser windows

Bleeping Computer

A phishing kit has been released that allows red teamers and wannabe cybercriminals to create effective single sign-on phishing login forms using fake Chrome browser windows. [.].

Phishing 119