Mon.Feb 27, 2023

article thumbnail

GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems

The Last Watchdog

A new generation of security frameworks are gaining traction that are much better aligned to today’s cloud-centric, work-from-anywhere world. Related: The importance of ‘attack surface management’ I’m referring specifically to Secure Access Service Edge (SASE) and Zero Trust (ZT). SASE replaces perimeter-based defenses with more flexible, cloud-hosted security that can extend multiple layers of protection anywhere.

Risk 208
article thumbnail

The mobile malware threat landscape in 2022

SecureList

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Figures of the year In 2022, Kaspersky mobile products and technology detected: 1,661,743 malicious installers 196,476 new mobile banking Trojans 10,543 new mobile ransomware Trojans Trends of the year Mobile attacks leveled off after decreasing in the second half of 2021 and remained around the same level throughout 2022.

Mobile 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wind turbines and lightning very very frightening – and cyber security

Javvad Malik

I saw a video on the BBC about a wind Turbine catching fire after a lightning strike. The video looked kind of cool as the flaming blades were spinning creating rings of smoke. With a bit of digging, it transpired that lightning strikes on wind turbines are very common and is only set to get worse as turbines get taller and blades are increasingly made of carbon.

Insurance 140
article thumbnail

LastPass: The crooks used a keylogger to crack a corporatre password vault

Naked Security

Seems the crooks implanted a keylogger via a vulnerable media app (LastPass politely didn't say which one!) on a developer's home computer.

Passwords 138
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cybersecurity in wartime: how Ukraine's infosec community is coping

CSO Magazine

Whenever shells rain down on Ukraine, Yuriy Gatupov's colleagues put a '+' sign in a chat room. Then, the pluses are counted. "We check if everybody is alive," he says. Gatupov, the owner of two cybersecurity companies, says it is vital to stay connected during a time of war. With Russia now controlling around 18% of Ukraine's territory including Donbas and Crimea, tech workers face formidable challenges.

InfoSec 137
article thumbnail

LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults

The Hacker News

LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access encrypted password vaults, said it happened as a result of the same adversary launching a second attack on its systems.

LifeWorks

More Trending

article thumbnail

Ransomware Attack on servers of the US Marshals Service

CyberSecurity Insiders

Ransomware attacks seem to surge day by day on the servers belonging to government agencies and the latest to fall as the victim is the computer network of the US Marshals Service, aka USMS. According to the update provided by the Department of Justice, the incident occurred on February 17th of this year and sensitive details such as PII of employees, administrative data, returns from legal procedures, third party documents and some information related to private detectives was accessed and poss

article thumbnail

How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever

Dark Reading

Infighting, conscription, emigration. The war in Ukraine has pitted cybercriminals against one another like no other event before it.

article thumbnail

Data Breach occurs at Stanford University

CyberSecurity Insiders

Stanford University, one of the top ranked Universities of the United States and world, has become a victim to a cyber attack leading to data leak or unauthorized access of sensitive information. The leaked details include first and last names of students, their DOBs, contact mail address, phone numbers, email IDs, gender, ethnicity, race, citizenship, nativity, transcripts, resume, recommendation letter (if any) and filled up admission forms on a digital note.

article thumbnail

LastPass: DevOps engineer hacked to steal password vault data in 2022 breach

Bleeping Computer

LastPass revealed more information on a "coordinated second attack," where a threat actor accessed and stole data from the Amazon AWS cloud storage servers for over two months. [.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Supply Chain Dependency: What Your GitHub Connections May Trigger

Security Boulevard

The writing is on the walls, and it’s hard to avoid after the significant spike in attacks against GitHub repositories. The recent CircleCI breach, in which customers’ secrets and encryption keys were stolen, make it very clear that attackers already understand and leverage this vector. Now more than ever, is the time for companies to. The post Supply Chain Dependency: What Your GitHub Connections May Trigger appeared first on Security Boulevard.

article thumbnail

Special Report: The State of Software Supply Chain Security 2023

CyberSecurity Insiders

Attacks on software supply chains surged in 2022. A few years after word of the SolarWinds hack first spread, software supply chain attacks show no sign of abating. In the commercial sector, attacks that leverage malicious, open source modules continue to multiply. Enterprises saw an exponential increase in supply chain attacks since 2020, and a slower, but still steady rise in 2022.

Software 105
article thumbnail

Dutch police arrest three cyberextortion suspects who allegedly earned millions

Naked Security

Ever paid hush money to crooks who broke into your network? Wondered how much you can trust them?

article thumbnail

The Definitive Guide for Modern Healthcare Cybersecurity

Duo's Security Blog

A nurse goes to login to Epic but gets an error message instead that says the patient files are being held for ransom. A hacker accessed the network using a stolen credential and now equipment has stopped working and patient health is in jeopardy. Healthcare has coveted private medical records and data that is easy to monetize on the black market, making the industry one of the most targeted by hackers.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation. Tracked as CVE-2022-36537 (CVSS score: 7.5), the issue impacts ZK Framework versions 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2, and 8.6.4.

article thumbnail

Microsoft Defender app now force-installed for Microsoft 365 users

Bleeping Computer

Microsoft is now force-installing the Microsoft Defender for Individuals application when installing or updating the Microsoft 365 apps. [.

99
article thumbnail

iPhone users targeted in phone AND data theft campaign

Malwarebytes

When is an iPhone theft not just an iPhone theft? When the user's Apple ID and more, goes with it. That's what the Wall Street Journal reports has been happening over recent months. The paper interviewed a handful of people who fell victim to old-school phone theft while out in a bar. But it wasn't just the phone that was taken. In minutes, they were also denied access to their Apple accounts and everything attached to them, including photos, videos, contacts, notes, and more.

article thumbnail

Resecurity identified the investment scam network ‘Digital Smoke’

Security Affairs

Resecurity identified one of the largest investment fraud networks, tracked as Digital Smoke, by size and volume of operations. Resecurity identified one of the largest investment fraud networks by size and volume of operations created to defraud Internet users from Australia, Canada, China, Colombia, the European Union, India, Singapore, Malaysia, United Arab Emirates, Saudi Arabia, Mexico, the U.S. and other regions.

Scams 98
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

“Ethical hacker” amongst those arrested in Dutch ransomware investigation

Graham Cluley

Three men have been arrested by Dutch police in connection with ransomware attacks that blackmailed thousands of companies. Amongst them? An ethical hacker. Read more in my article on the Hot for Security blog.

article thumbnail

LastPass: hackers breached the computer of a DevOps engineer in a second attack

Security Affairs

Threat actors hacked the home computer of a DevOp engineer, they installed a keylogger as part of a sophisticated cyber attack. Password management software firm LastPass disclosed a “second attack,” a threat actor used data stolen from the August security breach and combined it with information available from a third-party data breach. Then the attackers exploited a flaw in a third-party media software package to target the firm. “Our investigation has revealed that the threat actor pivot

article thumbnail

How to work from home securely, the NSA way

Malwarebytes

People working remotely is no longer unusual, so the National Security Agency (NSA) has produced a short Best Practices PDF document detailing how remote workers can keep themselves safe from harm. In fact, the guide can also be applied to people using computers at home generally and is written in a way that's easy to understand. Back to basics The NSA's three main executive summary points are: Upgrade and update all equipment and software regularly, including routing devices Back up your data a

Backups 98
article thumbnail

Dutch Police arrests 3 men involved in a massive extortion scheme. One of them is an ethical hacker

Security Affairs

The Dutch police arrested three individuals as a result of an investigation into computer trespass, data theft, extortion, extortion, and money laundering. The Dutch police announced the arrest of three men as the result of an extensive investigation into computer trespass, data theft, extortion, extortion, and money laundering The suspects were arrested by the Amsterdam police arrested on January 23, 2023.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

ChatGPT is down worldwide - OpenAI working on issues

Bleeping Computer

ChatGPT is down, according to OpenAI and users reports. Users are currently experiencing issues worldwide, with many unable to access the AI. [.

article thumbnail

Threat actors leak Activision employee data on hacking forum

Security Affairs

Data allegedly stolen from the American gaming giant Activision in December security breach were leaked on a cybercrime forum. A threat actor leaked on the Breached hacking forum the data allegedly stolen from the gaming giant Activision in December 2022. @Activision was breached December 4th, 2022. The Threat Actors successfully phished a privileged user on the network.

Hacking 98
article thumbnail

Ransomware Attack Brings Dole Operations to a Temporary Halt

Security Boulevard

At a time when companies are plagued by supply chain issues, inflation is skyrocketing and cyberattacks proliferate, Dole PLC recently found itself the victim of a ransomware attack that temporarily shuttered some of its North American operations. “The Dole ransom attack highlights how the just-in-time nature of food supply chains makes them particularly vulnerable to financially motivated.

article thumbnail

PureCrypter used to deliver AgentTesla to govt organizations

Security Affairs

An unknown threat actor is targeting government organizations with the PureCrypter downloader, Menlo Security firm reported. Menlo Labs researchers uncovered an unknown threat actor is using the PureCrypter downloader in attacks aimed at government entities. The campaign relies on the domain of a compromised non-profit organization as a C2 server to deliver a second-stage payload.

Malware 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks

The Hacker News

The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg in an attempt to circumvent security protections and gain control of a target system.

98
article thumbnail

PlugX Trojan disguised as a legitimate Windows open-source tool in recent attacks

Security Affairs

Researchers detailed a new wave of attacks distributing the PlugX RAT disguised as a legitimate Windows debugger tool. Trend Micro uncovered a new wave of attacks aimed at distributing the PlugX remote access trojan masqueraded as an open-source Windows debugger tool called x32dbg. The legitimate tool allows to examine kernel-mode and user-mode code, crash dumps, or CPU registers.

Malware 98
article thumbnail

What is a Botnet Attack?

Security Boulevard

Definition of a botnet attack Bots have redefined the online experience for both enterprises and individual consumers alike. Bots, both good and malicious, now comprise a significant portion of internet traffic and are used to automate processes, conduct brute-force attacks, hunt for vulnerabilities in zombie APIs, send emails used for scams, steal cryptocurrency, and everything […] The post What is a Botnet Attack?

article thumbnail

Microsoft fixes bug offering Windows 11 upgrades to unsupported PCs

Bleeping Computer

Microsoft has addressed a known issue behind unsupported computers being offered Windows 11 22H2 upgrades and being unable to complete the installation process. [.

97
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!