Tue.Aug 23, 2022

article thumbnail

Signal Phone Numbers Exposed in Twilio Hack

Schneier on Security

Twilio was hacked earlier this month, and the phone numbers of 1,900 Signal users were exposed : Here’s what our users need to know: All users can rest assured that their message history, contact lists, profile information, whom they’d blocked, and other personal data remain private and secure and were not affected. For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal.

Hacking 243
article thumbnail

GUCCI vs CUGGL

Javvad Malik

In Japan, someone registered a trademark for CUGGL as a clothing brand in Japan. GUCCI tried to sue for copyright, but the Japan trademark office stated that CUGGL is not similar enough to GUCCI to warrant enforcement. Well, maybe not in the written word, but what do you think about the partially obscured logo? I am both disgusted and impressed by this. ( Credit to Halvar Flake for the find ).

182
182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is the cost of a data breach?

CSO Magazine

The cost of a data breach is not easy to define, but as more organizations fall victim to attacks and exposures, the potential financial repercussions are becoming clearer. For modern businesses of all shapes and sizes, the monetary impact of suffering a data breach is substantial. IBM’s latest Cost of a Data Breach report discovered that, in 2022, the average cost of a data breach globally reached an all-time high of $4.35 million.

article thumbnail

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

Trend Micro

We investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is currently being abused by a ransomware actor to kill antivirus processes and services for mass-deploying ransomware.

Antivirus 144
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

DESFA Suffers Cyberattack, Ragnar Locker Ransomware Claims Responsibility

Heimadal Security

Last weekend, DESFA, a natural gas transmission system operator in Greece, revealed that a cyberattack led to “a limited scope data breach and IT system outage.” What Happened? According to a public statement made by the natural gas distributor, the threat actors tried to breach its system, but the swift actions of its IT team […].

article thumbnail

Over 80,000 Hikvision cameras can be easily hacked

Security Affairs

Experts warn that over 80,000 Hikvision cameras are vulnerable to a critical command injection vulnerability. Security researchers from CYFIRMA have discovered over 80,000 Hikvision cameras affected by a critical command injection vulnerability tracked as CVE-2021-36260. The Chinese vendor addressed the issue in September 2021, but tens of thousands of devices are yet to be patched.

Hacking 126

LifeWorks

More Trending

article thumbnail

What Is Mobile Email Management (MEM)?

Heimadal Security

Email has traditionally served as the main means through which employees communicate with one another, stay informed about the company’s latest updates, and interact with consumers. But when it comes to corporate email on mobile devices, IT professionals usually deal with some serious threats. The ability to view corporate emails on personal/company devices is convenient […].

Mobile 119
article thumbnail

Whistleblower claims faults with Twitter Cybersecurity Defense policies

CyberSecurity Insiders

According to a report published on CNN and reaffirmed by The Washington Post, Twitter has been misleading regulators by claiming false cybersecurity practices and foxing them with low fake accounts count. Peiter Zatko, a former Security Chief of the social media giant claimed that all his independent investigations done till February this year proved that the online services giant was duping US Securities and Exchange Commission and the Federal Trade Commission with claims that aren’t real in pr

article thumbnail

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

Hacker Combat

Following what it referred to as a “ridiculous vulnerability disclosure process,” a security company has revealed the specifics of a problem with a CrowdStrike product. Following the disclosure, CrowdStrike clarified a few things. An flaw with CrowdStrike’s Falcon endpoint detection and response tool was uncovered by researchers at the Swiss security firm Modzero.

Risk 113
article thumbnail

Microsoft collaborates with Kaspersky for Cyber Threat Intelligence

CyberSecurity Insiders

Microsoft has joined hands with Kaspersky to let its Sentinel platform get feeds from the security firm’s threat intelligence. Thus, the aim will be to gain actionable feeds related to cyber attacks leading to efficient incident responses. Kaspersky says that it is delighted to team up with a reputable company and hopes that its data such as threat names, time stamps, geolocation, data related to IP addresses related to infected devices and hashes will help its valuable customers attain timely i

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

A Potential GDPR Nightmare Hiding in the 3rd Party Digital Supply Chain

Security Boulevard

By Source Defense It’s a scenario we’ve all experienced: You’re filling out an online form to obtain some sort of product, service, or information, and suddenly you have second thoughts. It doesn’t matter why, but you’ve decided you no longer want to go through with the transaction. So you close your browser before you hit. The post A Potential GDPR Nightmare Hiding in the 3rd Party Digital Supply Chain appeared first on Source Defense.

Risk 111
article thumbnail

Is your personal data all over the internet? 7 steps to cleaning up your online presence

We Live Security

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps. The post Is your personal data all over the internet? 7 steps to cleaning up your online presence appeared first on WeLiveSecurity.

Internet 106
article thumbnail

SOVA Android Banking Trojan Becomes Even More Powerful

Heimadal Security

A new version of SOVA, an Android banking trojan, has been launched. This fifth version contains improved functions and code enhancements that translate into a ransomware module used to encrypt files on Android devices. SOVA, like any information stealing trojan, is built to snatch credentials and cookies, evade multi-factor authentication, and harm Android’s Accessibility Service […].

Banking 104
article thumbnail

PreVeil Update: DoD to Ramp up Enforcement of Compliance with NIST SP 800-171; Final DFARS Rule coming Dec. 2022

Security Boulevard

The Department of Defense (DoD) has updated guidance that it will cement clauses 7019 and 7020 of its November 2020 Interim DFARS Rule into a Final Rule in December 2022. The DFARS Interim Rule—currently in effect—aims to strengthen NIST SP 800-171 compliance and requires that all defense contractors that handle CUI (Controlled Unclassified Information) and […].

103
103
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Firewall Bug Under Active Attack Triggers CISA Warning

Threatpost

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Firewall 101
article thumbnail

Mudge Blows Whistle on Alleged Twitter Security Nightmare

Dark Reading

Lawmakers and cybersecurity insiders are reacting to a bombshell report from former Twitter security head Mudge Zatko, alleging reckless security lapses that could be exploited by foreign adversaries.

article thumbnail

The Most Damning Allegation in the Twitter Whistleblower’s Report

WIRED Threat Level

Peiter “Mudge” Zatko’s claims about the company’s lax security are all bad. But one clearly captures the extent of systemic issues.

98
article thumbnail

Meta Takes Offensive Posture With Privacy Red Team

Dark Reading

Engineering manager Scott Tenaglia describes how Meta extended the security red team model to aggressively protect data privacy.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft publicly discloses details on critical ChromeOS flaw

Security Affairs

Microsoft shared technical details of a critical ChromeOS flaw that could be exploited to trigger a DoS condition or for remote code execution. Microsoft shared details of a critical ChromeOS vulnerability tracked as CVE-2022-2587 (CVSS score of 9.8). The flaw is an out-of-bounds write issue in OS Audio Server that could be exploited to trigger a DoS condition or, under specific circumstances, to achieve remote code execution. “Microsoft discovered a memory corruption vulnerability in a Ch

Media 98
article thumbnail

Thoma Bravo Buying Spree Highlights Hot Investor Interest in IAM Market

Dark Reading

M&A activity in the identity and access management (IAM) space has continued at a steady clip so far this year.

article thumbnail

Google Uncovers Tool Used by Iranian Hackers to Steal Data from Email Accounts

The Hacker News

The Iranian government-backed actor known as Charming Kitten has added a new tool to its malware arsenal that allows it to retrieve user data from Gmail, Yahoo!, and Microsoft Outlook accounts.

article thumbnail

ETHERLED: Air-gapped systems leak data via network card LEDs

Bleeping Computer

Israeli researcher Mordechai Guri has discovered a new method to exfiltrate data from air-gapped systems using the LED indicators on network cards. Dubbed 'ETHERLED', the method turns the blinking lights into Morse code signals that can be decoded by an attacker. [.].

98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Zero-Trust: How SOC 2 Compliance Can Help

Security Boulevard

The Cloud Security Alliance (CSA) has released the first in a series of research summaries culled from a survey about the adoption of so-called zero-trust cybersecurity principles. The results of that survey indicated that achieving and sustaining SOC 2 compliance can help ease, speed and spread adoption of zero-trust across almost any SMB or emerging.

article thumbnail

Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business

Security Affairs

Experts found backdoors in budget Android device models designed to target WhatsApp and WhatsApp Business messaging apps. Researchers from Doctor Web discovered backdoors in the system partition of budget Android device models that are counterfeit versions of famous brand-name models. The malware targets WhatsApp and WhatsApp Business messaging apps and can allow attackers to conduct multiple malicious activities. “Among them is the interception of chats and the theft of the confidential i

Mobile 98
article thumbnail

Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault

Security Boulevard

The promise of AI code assistance like Copilot was an exciting promise when released. But they might not be the answer to all your problems. A research study has now found that while Copilot frequently introduces vulnerabilities, it may in fact be influenced by the input. Poor code, poor outcome. The post Crappy code, crappy Copilot. GitHub Copilot is writing vulnerable code and it could be your fault appeared first on Security Boulevard.

98
article thumbnail

CISA adds Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog

Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) added a flaw, tracked as CVE-2022-0028 , affecting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Announcing SOC 2 Compliance for Cisco Secure Endpoint, Cisco Secure Malware Analytics, and Cisco SecureX

Cisco Security

With a rising number of cyberattacks targeting organizations, protecting sensitive customer information has never been more critical. The stakes are high due to the financial losses, reputational damage, legal & compliance fines, and more that often stem from mishandled data. At Cisco Secure, we recognize this and are continuously looking for ways to improve our information security practices.

Malware 98
article thumbnail

Oracle’s HUGE Ad Data Graph is ‘Illegal Panopticon’ — 5 BILLION People Big

Security Boulevard

Oracle “illegally” collects and links data about you, selling it to the highest bidder—all without your consent. The post Oracle’s HUGE Ad Data Graph is ‘Illegal Panopticon’ — 5 BILLION People Big appeared first on Security Boulevard.

article thumbnail

XCSSET Malware Updates with Python 3 to Target macOS Monterey Users

The Hacker News

The operators of the XCSSET macOS malware have upped the stakes by making iterative improvements that add support for macOS Monterey by upgrading its source code components to Python 3. "The malware authors have changed from hiding the primary executable in a fake Xcode.app in the initial versions in 2020 to a fake Mail.app in 2021 and now to a fake Notes.

Malware 98
article thumbnail

GitLab fixed a critical Remote Code Execution (RCE) bug in CE and EE releases

Security Affairs

DevOps platform GitLab fixed a critical remote code execution flaw in its GitLab Community Edition (CE) and Enterprise Edition (EE) releases. DevOps platform GitLab has released security updates to fix a critical remote code execution vulnerability, tracked as CVE-2022-2884 (CVSS 9.9), affecting its GitLab Community Edition (CE) and Enterprise Edition (EE) releases.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!