Thu.Nov 17, 2022

article thumbnail

Failures in Twitter’s Two-Factor Authentication System

Schneier on Security

Twitter is having intermittent problems with its two-factor authentication system: Not all users are having problems receiving SMS authentication codes, and those who rely on an authenticator app or physical authentication token to secure their Twitter account may not have reason to test the mechanism. But users have been self-reporting issues on Twitter since the weekend, and WIRED confirmed that on at least some accounts, authentication texts are hours delayed or not coming at all.

article thumbnail

Researchers Quietly Cracked Zeppelin Ransomware Keys

Krebs on Security

Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “ Zeppelin ” in May 2020. He’d been on the job less than six months, and because of the way his predecessor architected things, the company’s data backups also were encrypted by Zeppelin. After two weeks of stalling their extortionists, Peter’s bosses were ready to capitulate and pay the ransom demand.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech news you may have missed: Nov. 10 – 17

Tech Republic Security

This week’s trending news features a primer on Industrial IoT, new and upcoming features for Windows users and the latest cybersecurity threats. The post Tech news you may have missed: Nov. 10 – 17 appeared first on TechRepublic.

IoT 166
article thumbnail

One in Five Public-Facing Cloud Storage Buckets Expose Sensitive Data

eSecurity Planet

Public-facing cloud storage buckets are a data privacy nightmare, according to a study released today. Members of Laminar Labs’ research team recently found that one in five public-facing cloud storage buckets contains personally identifiable information (PII) – and the majority of that data isn’t even supposed to be online in the first place.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Reducing Friction in SecureX Orchestration

Cisco Security

Since releasing SecureX orchestration, we’ve regularly published two types of content for our customers to import and use: atomic actions and workflows. Atomic actions are small, re-usable functions that allow you to do simple things like isolating an endpoint in Cisco Secure Endpoint. Workflows are more complex combinations of activities, often made up of multiple atomic actions, that accomplish a broader objective.

Firewall 145
article thumbnail

Two public schools in Michigan hit by a ransomware attack

Security Affairs

Public schools in two Michigan counties were forced to halt their activities, including the lessons, after a ransomware attack. Public schools in Jackson and Hillsdale counties, Michigan, reopen after a closure of two days caused by a ransomware attack that hit its systems. The public schools started experiencing a systems outage affecting critical operating systems on Monday, the outage occurred because they were victims of a ransomware attack detected over the weekend.

LifeWorks

More Trending

article thumbnail

Black Friday and retail season – watch out for PayPal “money request” scams

Naked Security

Don't let a keen eye for bargains lead you into risky online behaviour.

Retail 138
article thumbnail

Magento and Adobe Commerce websites under attack

Security Affairs

Researchers warn of a surge in cyberattacks targeting CVE-2022-24086, a pre-authentication issue impacting Adobe Commerce and Magento stores. In September 2022, Sansec researchers warned of a surge in hacking attempts targeting a critical Magento 2 vulnerability tracked as CVE-2022-24086. Magento is a popular open-source e-commerce platform owned by Adobe, which is used by hundreds of thousands of e-stores worldwide.

eCommerce 138
article thumbnail

MITRE ResilienCyCon: You Will Be Breached So Be Ready

eSecurity Planet

Speakers at last week’s MITRE ResilienCyCon conference had a surprisingly candid message for attendees: You will likely be breached at some point so focus on the controls and response capabilities your organization needs to survive a cyber attack. The conference’s focus on cyber resilience doesn’t mean that organizations should abandon core security defenses like EDR , access control and firewalls , but they should be prepared for the advanced threats that will, at some point,

Backups 135
article thumbnail

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident

Dark Reading

Researchers find current data protections strategies are failing to get the job done, and IT leaders are concerned, while a lack of qualified IT security talent hampers cyber-defense initiatives.

129
129
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

China-based Fangxiao group behind a long-running phishing campaign

Security Affairs

A China-based financially motivated group, tracked as Fangxiao, is behind a large-scale phishing campaign dating back as far as 2019. Researchers from Cyjax reported that a China-based financially motivated group, dubbed Fangxiao, orchestrated a large-scale phishing campaign since 2017. The sophisticated phishing campaign exploits the reputation of international brands and targets businesses in multiple industries, including retail, banking, travel, and energy.

Phishing 127
article thumbnail

MFA Fatigue Attacks Are on the Rise

Heimadal Security

MFA Fatigue seems to be hackers` favorite tool this fall, as we have lately witnessed an increase in numbers of this kind of cyber-attack. We are now at the point where it seems that an MFA Fatigue attack can happen to anyone. If you think that being a giant company with a strong IT security […]. The post MFA Fatigue Attacks Are on the Rise appeared first on Heimdal Security Blog.

article thumbnail

Microsharding can help in protecting cloud data from ransomware attacks

CyberSecurity Insiders

Companies are nowadays showing more interest in moving their data and application assets onto Cloud. But are still concerned about how well the CSP will protect their data against hacks and data breaches, although it allows users to encrypt it to the core. Here’s what Microsharding Technology comes to their rescue. Speaking specifically, the technology isn’t new as businesses involved in the business of data storage have been using it since 2017 to mitigate performance issues.

article thumbnail

Earth Preta Spear-Phishing Governments Worldwide

Trend Micro

We break down the cyberespionage activities of advanced persistent threat (APT) group Earth Preta, observed in large-scale attack deployments that began in March. We also show the infection routines of the malware families they use to infect multiple sectors worldwide: TONEINS, TONESHELL, and PUBLOAD.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

S3 Ep109: How one leaked email password could drain your business

Naked Security

Latest episode - listen now! Cybersecurity news plus loads of great advice.

Passwords 119
article thumbnail

Massive Wave of TrojanOrders Attacks Target Magento Stores

Heimadal Security

A significant increase in “TrojanOrders” attacks against Magento 2 websites is being attributed to at least seven hacker groups. These attacks take advantage of a flaw that lets threat actors infiltrate unprotected servers. Hacking groups are fighting each other to take control of the infected sites. Almost 40% of the Magneto 2 websites are being […].

Hacking 119
article thumbnail

Instagram Impersonators Target Thousands, Slipping by Microsoft's Cybersecurity

Dark Reading

The socially engineered campaign used a legitimate domain to send phishing emails to large swaths of university targets.

article thumbnail

What is a Security Questionnaire and Why is It Important?

Security Boulevard

Everything you need to know to ensure accurate vendor risk management through understanding security questionnaires. The post What is a Security Questionnaire and Why is It Important? appeared first on Scytale. The post What is a Security Questionnaire and Why is It Important? appeared first on Security Boulevard.

Risk 116
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Webroot™ Premium: The all-in-one protection for your devices and identity

Webroot

The risk of becoming a victim of identity theft has never been greater. We are increasingly living our lives in the digital realm. Whether we’re banking, purchasing or browsing, our daily activities are most likely taking place online. Not only has this sped up our efficiency, but it has also expanded our exposure to a host of cybercriminals who are eager to use our personal information.

article thumbnail

SyncJacking: Hard Matching Vulnerability Enables Azure AD Account Takeover

Security Boulevard

This post describes an abuse of hard matching synchronization in Azure AD Connect that can lead to Azure AD account takeover. These findings build on the research that Semperis published in August, which described abuse of soft matching (also known as SMTP matching). This SyncJacking vulnerability means that an attacker with certain privileges can abuse.

article thumbnail

FBI: Hive ransomware extorted $100M from over 1,300 victims

Bleeping Computer

The Federal Bureau of Investigation (FBI) said today that the notorious Hive ransomware gang has successfully extorted roughly $100 million from over a thousand companies since June 2021. [.].

article thumbnail

Cybersecurity Compliance Audit: 6 Steps To Be Compliant

Security Boulevard

Are your cybersecurity efforts sufficient for meeting the regulations and requirements for your industry? If not, you could face fines and fees — or worse, you could suffer the consequences of a severe data breach. . To ensure you maintain adequate data security measures, you need to conduct regular cybersecurity compliance audits. External agencies may require such an audit to ensure your efforts meet their requirements.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FBI-Wanted Leader of the Notorious Zeus Botnet Gang Arrested in Geneva

The Hacker News

A Ukrainian national who has been wanted by the U.S for over a decade has been arrested by Swiss authorities for his role in a notorious cybercriminal ring that stole millions of dollars from victims' bank accounts using malware called Zeus.

Banking 111
article thumbnail

Researchers Quietly Cracked Zeppelin Ransomware Keys

Security Boulevard

Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “Zeppelin” in May 2020. He’d been on the job less than six months, and because of the way his predecessor architected things,… Read More ». The post Researchers Quietly Cracked Zeppelin Ransomware Keys appeared first on Security Boulevard.

article thumbnail

Announcing the General Availability of Duo Verified Push

Duo's Security Blog

As attackers have figured out ways to get around traditional multi-factor authentication (MFA), Duo has continued to evolve to prevent fraudulent access and protect the workforce. Every day, users are inundated with notifications on their phones, and it can be difficult to appropriately respond to each buzz or alert. Some attack patterns, like push harassment, rely on the assumption that if you bother an end user enough times, they will eventually relent and accept the request.

article thumbnail

Data Privacy and Remote Work: Three Things Businesses Need to Know

Security Boulevard

Due to the COVID-19 pandemic, a large-scale and abrupt shift in employee work habits from in-office to home-based work produced unforeseen dangers to data privacy in addition to logistical and cybersecurity issues for enterprises. It’s crucial for organizations to reduce the data privacy threats that could harm their operations as they concentrate on being effective.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Tank, the leader of the Zeus cybercrime gang, was arrested by the Swiss police

Security Affairs

A suspected leader of the Zeus cybercrime gang, Vyacheslav Igorevich Penchukov (aka Tank), was arrested by Swiss police. Swiss police last month arrested in Geneva Vyacheslav Igorevich Penchukov (40), also known as Tank, which is one of the leaders of the JabberZeus cybercrime group. “ Vyacheslav “Tank” Penchukov , the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Eur

article thumbnail

Noname Security Adds API Security Reconnaissance Capability

Security Boulevard

Noname Security today added a Noname Recon module to its platform for securing application programming interfaces (APIs) that makes it possible to discover active patterns being employed by cybercriminals. Dor Dankner, head of research for Noname Security, said the company is now scanning public sources to surface threat intelligence concerning attacks being made against APIs.

article thumbnail

Quick Heal Launches an all new version 23 – Smart, Secure and Sustainable

Quick Heal Antivirus

Cybercrimes have been on the rise post-pandemic and are becoming even more sophisticated. Digitization and work from home. The post Quick Heal Launches an all new version 23 – Smart, Secure and Sustainable appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

article thumbnail

Cybersecurity Audits: What to Expect, How to Perform One, and What to Do With Your Findings

Security Boulevard

Why do some companies fare so poorly with cybersecurity audits and with putting audit findings to good use? The post Cybersecurity Audits: What to Expect, How to Perform One, and What to Do With Your Findings appeared first on Hyperproof. The post Cybersecurity Audits: What to Expect, How to Perform One, and What to Do With Your Findings appeared first on Security Boulevard.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!