Fri.Oct 07, 2022

article thumbnail

Spyware Maker Intellexa Sued by Journalist

Schneier on Security

The Greek journalist Thanasis Koukakis was spied on by his own government, with a commercial spyware product called “Predator.” That product is sold by a company in North Macedonia called Cytrox, which is in turn owned by an Israeli company called Intellexa. Koukakis is suing Intellexa. The lawsuit filed by Koukakis takes aim at Intellexa and its executive, alleging a criminal breach of privacy and communication laws, reports Haaretz.

Spyware 62
article thumbnail

Weekly Update 316

Troy Hunt

Geez it's nice to be home 😊 It's nice to live in a home that makes you feel that way when returning from a place as beautiful as Bali 😊 This week's video is dominated by the whole discussion around this tweet: I love that part of the Microsoft Security Score for Identity in Azure improves your score if you *don't* enforce password rotation, what a sign of the times!

Passwords 297
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: Big U.S. Banks Are Stiffing Account Takeover Victims

Krebs on Security

When U.S. consumers have their online bank accounts hijacked and plundered by hackers, U.S. financial institutions are legally obligated to reverse any unauthorized transactions as long as the victim reports the fraud in a timely manner. But new data released this week suggests that for some of the nation’s largest banks, reimbursing account takeover victims has become more the exception than the rule.

Banking 285
article thumbnail

2022 State of the Threat: Ransomware is still hitting companies hard

Tech Republic Security

SecureWorks found that business email compromise still generates huge revenues for cybercriminals, while cyberespionage activities tend not to change so much. The post 2022 State of the Threat: Ransomware is still hitting companies hard appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

TOP 10 unattributed APT mysteries

SecureList

Targeted attack attribution is always a tricky thing, and in general, we believe that attribution is best left to law enforcement agencies. The reason is that, while in 90%, it is possible to understand a few things about the attackers, such as their native language or even location, the remaining 10% can lead to embarrassing attribution errors or worse.

Malware 145
article thumbnail

Mobile Ecosystem Forum CEO talks privacy, security and the future of the mobile industry

Tech Republic Security

Dario Betti talks to TechRepublic about the stir-shaken concept, investing in the right tech and other issues. The post Mobile Ecosystem Forum CEO talks privacy, security and the future of the mobile industry appeared first on TechRepublic.

Mobile 147

LifeWorks

More Trending

article thumbnail

Why Don’t You Go Dox Yourself?

Cisco Security

Whether or not you’ve heard the term “doxxing” before, you’re probably familiar with the problem it names: collecting personal information about someone online to track down and reveal their real-life identity. The motivations for doxxing are many, and mostly malicious: for some doxxers, the goal in tracking someone is identity theft. For others, it’s part of a pattern of stalking or online harassment to intimidate, silence or punish their victim – and overwhelmingly, victims are youth and youn

Media 145
article thumbnail

Hacker Paige Thompson is FREE (‘Because Transgender Status and Mental Health Issues’)

Security Boulevard

Capital One hacker Paige A. Thompson sentenced to “time served and probation.” The judge went easy “because of her mental health and transgender status,” according to the sore losers at the DoJ. The post Hacker Paige Thompson is FREE (‘Because Transgender Status and Mental Health Issues’) appeared first on Security Boulevard.

Firewall 128
article thumbnail

LofyGang Uses 100s of Malicious NPM Packages to Poison Open Source Software

Dark Reading

The group has been operating for over a year, promoting their tools in hacking forums, stealing credit card information, and using typosquatting techniques to target open source software flaws.

Software 124
article thumbnail

Cybersecurity Leaders Are Struggling Keeping Companies Safe

Heimadal Security

With more businesses experiencing a digital transformation, cybersecurity risks are becoming an increasing concern for companies. According to ZDNET, 90% of the security leaders participating in a survey consider that their organizations are not prepared enough to address cybersecurity risks. Cyberattacks are getting more sophisticated and companies seem to struggle with the rapid pace of […].

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Cybersecurity Will Account for Nearly One-Quarter of AI Software Market Through 2025

Dark Reading

A boom in artificial intelligence-powered detection and remediation tools pushes security spending to the top of the AI market, according to Forrester.

Marketing 123
article thumbnail

Uber Guilty Verdict Raises Security Stakes for CSOs

eSecurity Planet

In a case that ups the stakes for CSOs dealing with data breaches, former Uber chief security officer Joe Sullivan was found guilty by a federal jury earlier this week of obstructing justice and of misprision (concealing) of a felony in connection with his coverup of a 2016 breach. United States Attorney Stephanie M. Hinds said in a statement that technology companies that collect and store vast amounts of user data must protect that data and alert customers and authorities if it’s stolen.

article thumbnail

3 actions Latin American leaders must take to reduce risk of cyberattacks

CSO Magazine

We have witnessed increased cyberattacks on the Latin American region in recent days. Mexico’s President Obrador confirmed that its government has suffered what is perhaps a sensitive attack on its intelligence and armed forces. Chilean Armed Forces suffered a similar attack and its judiciary system was also compromised. The Colombian National Institute for Drug and Food Surveillance (INVIMA) was also attacked.

article thumbnail

$566 Million Worth of Cryptocurrency Stolen by Hacker on Binance Bridge

Heimadal Security

2 million Binance Coins (BNB), worth $566 million, have apparently been stolen by hackers from Binance Bridge, one of the top Crypto Bridges in the DeFi Industry. The Timeline Of The Attack The attack appears to have occurred at 2:30 PM EST today, with the attacker’s wallet receiving two transactions, each consisting of 1,000,000 BNB. […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

BrandPost: Why a Risk-Based Cybersecurity Strategy is the Way to Go

CSO Magazine

Business leaders spend most of their time conducting risk/reward analyses of virtually every decision they make. Will expanding the sales staff generate enough profit to more than pay for the added costs? Can our new product launch hit the market before the competitors shift their own strategies? Do we know enough about the geopolitical climate in a new market to justify the added costs and hassles in compliance and governance?

Risk 113
article thumbnail

UK populace beware of this promotional Cyber Fraud

CyberSecurity Insiders

Seems like Cyber fraudsters are increasingly targeting the UK populace in a hope of making easy money. Because from the past few weeks, some innocent victims are being receiving fraudulent SMSes that seek virtual purchase of products from reputable shopping platforms and get a commission for boosting sales, which is completely false. And as the shopping season fast approaching the said tactic of fake promotional campaign is said to surge by 50-60 percent in coming weeks.

article thumbnail

WhatsApp goes after Chinese password scammers via US court

Naked Security

If you can't beat 'em, sue 'em!

Passwords 108
article thumbnail

Mentally unstable Capital One hacker sentenced to jail term

CyberSecurity Insiders

Paige Thompson, former Amazon software engineer, was sentenced to a limited time jail term and a 5-year probation for causing anxiety among millions of people who were concerned about the private data leak. Probably, Ms. Thompson, happens to be the first transgender to be found guilty in a digital attack case and will have to face extremely harsh time as she is suffering from mental issues.

Insurance 108
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

What Is Unified Endpoint Security (UES)?

Heimadal Security

If we are talking about a modern business environment, the endpoints of your company’s network are getting more and more varied and numerous. The goal is to keep them all safe, in the meantime preserving the mobility and comfort of employees and being up to date with the latest wireless gadget, let’s say. Sure, you […]. The post What Is Unified Endpoint Security (UES)?

Wireless 105
article thumbnail

DDoS Attacks Exceeded Six Million in First Half of 2022

Security Boulevard

A Netscout Systems report concluded that the number of distributed denial-of-service (DDoS) attacks launched in the first half of this year exceeded six million. The Netscout report was based on statistics collected from internet service providers (ISPs) around the world. The research also noted that TCP-based flood attacks, which first appeared in early 2021, are.

DDOS 105
article thumbnail

Cybersecurity Flaw at ‘Baby Shark’ App Developer, Pinkfong, Causes Data Leak

Heimadal Security

A recently discovered cybersecurity flaw at the South Korean company Pinkfong lead to a data leak, including Google login credentials, app settings, and a Slack webhook. The app developer, Pinkfong, has very successful educational applications for children and also apps with popular characters like Peppa Pig and Bob the Builder. They are the ones who […].

article thumbnail

RansomEXX Claims Credit, Ferrari Denies Data Leak

Security Boulevard

Ferrari’s security posture may not be quite as bold as its cars after attackers—allegedly, the ransomware group RansomEXX—leaked 7GB of the company’s data online. An account of the leak first surfaced in Corriere della Sera, an Italian newspaper that apparently viewed the documents on the Red Hot Cyber website, according to a Reuters report. Among. The post RansomEXX Claims Credit, Ferrari Denies Data Leak appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Hackers Are Using ‘App Mode’ in Chromium Browsers for Phishing

Heimadal Security

Chromium-based web browsers’ Application Mode capability may be misused by threat actors to create ‘realistic desktop phishing programs, as part of a new phishing tactic. At origin, Application Mode is intended to provide native-like experiences by launching the website in a separate browser window, showcasing the website’s favicon, and hiding the address bar.

Phishing 105
article thumbnail

New cryptojacking campaign exploits OneDrive vulnerability

CSO Magazine

Cryptojacking is turning into a security nightmare for consumers and enterprises alike. Malicious actors have used a variety of techniques to install cryptojackers on victims' computers and in a new development, cybersecurity software maker Bitdefender has detected a cryptojacking campaign that uses a Microsoft OneDrive vulnerability to gain persistence and run undetected on infected devices.

article thumbnail

LilithBot: New Malware-as-a-Service Made Available on Telegram

Heimadal Security

A recently discovered malware called LilithBot is linked to the Eternity group, Zscaler researchers claim. Earlier this year, Eternity Project came up on a Telegram channel advertising a toolkit which included a stealer, miner, clipper, ransomware, worm spreader, and a DDoS bot. The threat actor behind the Eternity malware-as-a-service (MaaS) has expanded its arsenal and now there is another threat […].

Malware 105
article thumbnail

VMware fixed a high-severity bug in vCenter Server

Security Affairs

VMware this week addressed a severe vulnerability in vCenter Server that could lead to arbitrary code execution. VMware on Thursday released security patches to address a code execution vulnerability, tracked as CVE-2022-31680 (CVSS score of 7.2), in vCenter Server. The security issue is an unsafe deserialization vulnerability that resides in the platform services controller (PSC).

Hacking 100
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Uber’s Former Security Chief Convicted for Covering Data Breach

Heimadal Security

Uber’s former security chief officer, Joe Sullivan, has been found guilty of obstruction of justice and concealing a felony by a jury in San Francisco. For Sullivan, who at one point in his career prosecuted cybercrime for the US attorney’s office in San Francisco, the conviction represents a stunning turnabout. After the conviction, his lawyer […].

article thumbnail

Fortinet Warns of New Auth Bypass Flaw Affecting FortiGate and FortiProxy

The Hacker News

Fortinet has privately warned its customers of a security flaw affecting FortiGate firewalls and FortiProxy web proxies that could potentially allow an attacker to perform unauthorized actions on susceptible devices.

article thumbnail

Most Common U.S. Security Issues Exploited by Chinese Hackers Since 2020

Heimadal Security

U.S. federal agencies NSA, CISA, and the FBI revealed the top security vulnerabilities most targeted by threat actors backed by the People’s Republic of China (PRC) with the intention to compromise government and critical infrastructure networks. NSA, CISA, and FBI continue to assess PRC state-sponsored cyber activities as being one of the largest and most […].

article thumbnail

Fortinet urges customers to immediately fix a critical authentication bypass flaw in FortiGate and FortiProxy

Security Affairs

Fortinet addressed a critical authentication bypass vulnerability that impacted FortiGate firewalls and FortiProxy web proxies. Fortinet addressed a critical authentication bypass flaw, tracked as CVE-2022-40684, that impacted FortiGate firewalls and FortiProxy web proxies. An attacker can exploit the vulnerability to log into vulnerable devices. “An authentication bypass using an alternate path or channel [CWE-88] in FortiOS and FortiProxy may allow an unauthenticated attacker to perform

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!