Thu.Aug 01, 2024

article thumbnail

Education in Secure Software Development

Schneier on Security

The Linux Foundation and OpenSSF released a report on the state of education in secure software development. …many developers lack the essential knowledge and skills to effectively implement secure software development. Survey findings outlined in the report show nearly one-third of all professionals directly involved in development and deployment ­ system operations, software developers, committers, and maintainers ­ self-report feeling unfamiliar with secure software development practice

Education 321
article thumbnail

U.S. Trades Cybercriminals to Russia in Prisoner Swap

Krebs on Security

Twenty-four prisoners were freed today in an international prisoner swap between Russia and Western countries. Among the eight Russians repatriated were several convicted cybercriminals. In return, Russia has reportedly released 16 prisoners, including Wall Street Journal reporter Evan Gershkovich and ex-U.S. Marine Paul Whelan. Among the more notable Russian hackers released in the prisoner swap is Roman Seleznev , 40, who was sentenced in 2017 to 27 years in prison for racketeering convictions

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 411

Troy Hunt

The ongoing scourge that is spyware (or, as it is commonly known, "stalkerware"), and the subsequent breaches that so often befall them continue to amaze me. More specifically, it's the way they tackle the non-consensual spying aspect of the service which, on the one hand is represented as a big "no-no" but on the others hand, the likes of Spytech in this week's update literally have a dedicated page for!

Spyware 281
article thumbnail

U.S. Trades Cybercriminals to Russia in Prisoner Swap

Krebs on Security

Twenty-four prisoners were freed today in an international prisoner swap between Russia and Western countries. Among the eight Russians repatriated were several convicted cybercriminals. In return, Russia has reportedly released 16 prisoners, including Wall Street Journal reporter Evan Gershkovich and ex-U.S. Marine Paul Whelan. Among the more notable Russian hackers released in the prisoner swap is Roman Seleznev , 40, who was sentenced in 2017 to 27 years in prison for racketeering convictions

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Microsoft Confirms Global Azure Outage Caused by DDoS Attack

Tech Republic Security

Redmond has confirmed the eight-hour Azure outage on July 30 was triggered by a distributed denial-of-service attack, but an “error in the implementation of [their] defenses” exacerbated it.

DDOS 183
article thumbnail

Black Hat Fireside Chat: Consumers demand secure mobile apps; it’s high time for brands to deliver

The Last Watchdog

Two-plus decades of enduring wave after wave of mobile app malware and fraud has finally taken its toll on users. Now comes a global survey from Appdome and OWASP that reveals the vast majority of consumers are fed up. I recently visited with Appdome CEO Tom Tovar to discuss clear signals that consumers are now insisting upon mobile apps that are private and secure, as well as convenient.

Mobile 147

LifeWorks

More Trending

article thumbnail

Over 20,000 internet-exposed VMware ESXi instances vulnerable to CVE-2024-37085

Security Affairs

Shadowserver researchers reported that over 20,000 internet-exposed VMware ESXi instances are affected by the actively exploited flaw CVE-2024-37085. Researchers at the Shadowserver Foundation reported that approximately 20,000 VMware ESXi servers exposed online appear impacted by the exploited vulnerability CVE-2024-37085. We have started sharing exposed VMware ESXi vulnerable to CVE-2024-37085 (authentication bypass).

Internet 142
article thumbnail

The Top 7 NordVPN Alternatives for 2024

Tech Republic Security

If you’re looking for the best NordVPN alternatives today, Surfshark VPN, Proton VPN and ExpressVPN are among a handful of quality VPNs you should check out.

VPN 173
article thumbnail

Over 1 Million Domains at Risk of 'Sitting Ducks' Domain Hijacking Technique

The Hacker News

Over a million domains are susceptible to takeover by malicious actors by means of what has been called a Sitting Ducks attack. The powerful attack vector, which exploits weaknesses in the domain name system (DNS), is being exploited by over a dozen Russian-nexus cybercriminal actors to stealthily hijack domains, a joint analysis published by Infoblox and Eclypsium has revealed.

DNS 142
article thumbnail

He Was an FBI Informant—and Inspired a Generation of Violent Extremists

WIRED Threat Level

Joshua Caleb Sutter infiltrated far-right extremist organizations as a confidential FBI informant, all while promoting hateful ideologies that influenced some of the internet's most violent groups.

Internet 130
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Hackers Distributing Malicious Python Packages via Popular Developer Q&A Platform

The Hacker News

In yet another sign that threat actors are always looking out for new ways to trick users into downloading malware, it has come to light that the question-and-answer (Q&A) platform known as Stack Exchange has been abused to direct unsuspecting developers to bogus Python packages capable of draining their cryptocurrency wallets.

article thumbnail

A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers

WIRED Threat Level

The RayV Lite will make it hundreds of times cheaper for anyone to carry out physics-bending feats of hardware hacking.

Hacking 129
article thumbnail

Obfuscation: There Are Two Sides To Everything

The Hacker News

How to detect and prevent attackers from using these various techniques Obfuscation is an important technique for protecting software that also carries risks, especially when used by malware authors. In this article, we examine obfuscation, its effects, and responses to it. What Is Obfuscation?

Malware 130
article thumbnail

Pharma Giant Cencora confirmed the theft of personal and health information

Security Affairs

Pharma company Cencora confirmed the theft of personal and health information following the February 2024 data breach. Pharmaceutical giant Cencora confirmed that the threat actors had access to personally identifiable information (PII) and protected health information (PHI) following the February 2024 cyberattack. On February 21, Cencora announced a data breach in a filing with the Securities and Exchange Commission (SEC).

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How “professional” ransomware variants boost cybercrime groups

SecureList

Introduction Cybercriminals who specialize in ransomware do not always create it themselves. They have many other ways to get their hands on ransomware samples: buying a sample on the dark web, affiliating with other groups or finding a (leaked) ransomware variant. This requires no extraordinary effort, as source code is often leaked or published. With a set of standard tools and a freshly built (and sometimes slightly altered) ransomware sample, victims can be sought, and the malicious activity

article thumbnail

Sitting Ducks attack technique exposes over a million domains to hijacking

Security Affairs

Researchers warn of an attack vector in the DNS, called the Sitting Ducks, that exposes over a million domains to hackers’ takeover. Researchers from Eclypsium and Infoblox have identified an attack vector in the domain name system (DNS), dubbed the Sitting Ducks attack. Over a dozen Russian-linked cybercriminal groups exploited this attack technique to carry out a stealth domain name hijacking.

DNS 127
article thumbnail

Twilio kills off Authy for desktop, forcibly logs out all users

Bleeping Computer

Twilio has finally killed off its Authy for Desktop application, forcibly logging users out of the desktop application. [.

119
119
article thumbnail

CSMA Starts with Identity A Comprehensive Approach to Modern Cybersecurity

Security Boulevard

With the rise of AI, NHIs (non-human identities) are booming, and attacks are becoming increasingly identity-first and AI-powered, making them faster, evasive and more sophisticated. The post CSMA Starts with Identity A Comprehensive Approach to Modern Cybersecurity appeared first on Security Boulevard.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

$75 million record-breaking ransom paid to cybercriminals, say researchers

Graham Cluley

The staggering sum of US $75 million has reportedly been paid to a ransomware gang in what is believed to be the largest known ransom payment made by a cyber attack victim since records began. Read more in my article on the Hot for Security blog.

article thumbnail

The Unbreakable Bond: Why Identity and Data Security are Inseparable

Security Boulevard

Identity security and data security must be addressed simultaneously for an organization’s security posture to address security risks and threats adequately. The post The Unbreakable Bond: Why Identity and Data Security are Inseparable appeared first on Security Boulevard.

Risk 118
article thumbnail

Hackers abuse free TryCloudflare to deliver remote access malware

Bleeping Computer

Researchers are warning of threat actors increasingly abusing the Cloudflare Tunnel service in malware campaigns that usually deliver remote access trojans (RATs). [.

Malware 117
article thumbnail

Widespread OTP-Stealing Campaign Targets Android Users

Security Boulevard

Zimperium researchers discovered a widespread and sophisticated malware campaign dubbed SMS Stealer that's being used against Android device users to steal OTPs from text messages, which can lead to account takeover and ransomware attacks. The post Widespread OTP-Stealing Campaign Targets Android Users appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FBI warns of scammers posing as crypto exchange employees

Bleeping Computer

The Federal Bureau of Investigation (FBI) warns of scammers posing as employees of cryptocurrency exchanges to steal funds from unsuspecting victims. [.

article thumbnail

Google Using Enhanced Encryption to Protect Cookies

Security Boulevard

Google is adding greater encryption capabilities to Chrome to better protect users from information-stealing malware, a move that comes after the company's controversial decision to once again delay getting rid of third-party cookies. The post Google Using Enhanced Encryption to Protect Cookies appeared first on Security Boulevard.

article thumbnail

CISA Guide Bolsters Election Security Via Operational Best Practices

SecureWorld News

In an era when election security is paramount, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a crucial resource for election officials. The Guide to Operational Security for Election Officials provides a comprehensive framework for protecting the integrity of election processes through enhanced operational security (OPSEC) measures.

article thumbnail

Navigating Indispensable Cybersecurity Practices for Hybrid Working Professionals

Security Boulevard

A solid cybersecurity program can help prevent cyberattacks, protect networks and communication and give both employers and remote employees peace of mind. The post Navigating Indispensable Cybersecurity Practices for Hybrid Working Professionals appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New Android Banking Trojan BingoMod Steals Money, Wipes Devices

The Hacker News

Cybersecurity researchers have uncovered a new Android remote access trojan (RAT) called BingoMod that not only performs fraudulent money transfers from the compromised devices but also wipes them in an attempt to erase traces of the malware. Italian cybersecurity firm Cleafy, which discovered the RAT towards the end of May 2024, said the malware is under active development.

Banking 109
article thumbnail

Why zero trust is the new gold standard in cybersecurity

Security Boulevard

Why zero trust is the new gold standard in cybersecurity Why zero trust is the new gold standard in cybersecurity Zero Trust: The Cornerstone of Modern Cybersecurity Zero Trust: The Cornerstone of Modern Cybersecurity The ever-changing digital terrain has rendered the formerly dependable castle-and-moat strategy for cybersecurity—which relied solely on firewalls—obviously insufficient.

article thumbnail

Cybersecurity Compass: An Integrated Cyber Defense Strategy

Trend Micro

Explore how the Cybersecurity Compass can guide various security professionals' and stakeholders' decision-making before, during, and after a breach.

article thumbnail

UK takes down major 'Russian Coms' caller ID spoofing platform

Bleeping Computer

The United Kingdom's National Crime Agency (NCA) has shut down Russian Coms, a major caller ID spoofing platform used by hundreds of criminals to make over 1.8 million scam calls. [.

Scams 103
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!