Thu.Mar 11, 2021

article thumbnail

Fast Random Bit Generation

Schneier on Security

Science has a paper (and commentary ) on generating 250 random terabits per second with a laser. I don’t know how cryptographically secure they are, but that can be cleaned up with something like Fortuna.

280
280
article thumbnail

Hackers update Gootkit RAT to use Google searches and discussion forums to deliver malware

Tech Republic Security

Security analysts and an SEO expert explain how this new approach uses legitimate websites to trick users into downloading infected files.

Malware 193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese state hackers target Linux systems with new malware

Bleeping Computer

Security researchers at Intezer have discovered a previously undocumented backdoor dubbed RedXOR, with links to a Chinese-sponsored hacking group and used in ongoing attacks targeting Linux systems. [.].

Malware 144
article thumbnail

Employers aren't training staff to use new tech tools. Employees are paying the price

Tech Republic Security

Organizations have invested millions in new technology over the past year, yet fewer than one in 10 businesses have trained staff in to use these tools. Little surprise, then, that employees are using them incorrectly - and getting in trouble for it.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The Future of Cyberwarfare

Security Boulevard

Over the years, we have seen an escalation in the series of hacks on health care services, power grids, nuclear plants and our privacy, with no respite. The threat is not just from China alone. It could be from North Korea or, as a matter of fact, from any state or non-state actor. This intent. The post The Future of Cyberwarfare appeared first on Security Boulevard.

Hacking 144
article thumbnail

Hackers attempt to poison the well, but AI cybersecurity solutions bolster water treatment facility security

Tech Republic Security

After a breach at a Florida treatment facility, tap water security is front and center. In the digital age, there are no shortages of challenges in the pipeline between facility and spigot.

More Trending

article thumbnail

How to install and configure 2FA on AlmaLinux

Tech Republic Security

Jack Wallen walks you through the process of enabling two-factor authentication on the new fork of CentOS, AlmaLinux.

article thumbnail

What is cryptojacking? How to prevent, detect, and recover from it

CSO Magazine

Cryptojacking definition. Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser. [ How much does a cyber attack really cost?

CSO 143
article thumbnail

5 common VPN myths busted

Malwarebytes

Virtual Private Networks ( VPN s) are popular but often misunderstood. There are many misconceptions about them—misconceptions that may be stopping people from adding a useful layer to their security and privacy defenses. So, let’s do some myth busting. 1. VPNs are for illegal activity. Some people think that VPNs are only useful for doing things like torrenting, accessing geo-locked content, or getting around work/school/government firewalls.

VPN 141
article thumbnail

RedXOR, a new powerful Linux backdoor in Winnti APT arsenal

Security Affairs

Intezer experts have spotted a new strain of Linux backdoor dubbed RedXOR that is believed to be part of the arsenal of China-linked Winniti APT. Researchers from Intezer have discovered a new sophisticated backdoor, tracked as RedXOR, that targets Linux endpoints and servers. The malware was likely developed by the China-linked cyber espionage group Winnti. “We have discovered an undocumented backdoor targeting Linux systems, masqueraded as polkit daemon.

Malware 141
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Threat Trends: DNS Security, Part 1

Cisco Security

Part 1: Top threat categories. When it comes to security, deciding where to dedicate resources is vital. To do so, it’s important to know what security issues are most likely to crop up within your organization, and their potential impact. The challenge is that the most active threats change over time, as the prevalence of different attacks ebb and flows.

DNS 139
article thumbnail

A new Linux Foundation open source signing tool could make secure software supply chains universal

Tech Republic Security

sigstore could eliminate the headaches associated with current software signing technology through public ledgers.

Software 157
article thumbnail

Ransomware now attacks Microsoft Exchange servers with ProxyLogon exploits

Bleeping Computer

A new ransomware called 'DEARCRY' is targeting Microsoft Exchange servers, with one victim stating they were infected via the ProxyLogon vulnerabilities. [.].

article thumbnail

8 new roles today’s security team needs

CSO Magazine

There's an estimated 500,000 unfilled cybersecurity positions in the United States today, including 166,000 jobs for information security analysts—the profession’s most common job title.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

New DEARCRY Ransomware is targeting Microsoft Exchange Servers

Bleeping Computer

A new ransomware called 'DEARCRY' is targeting Microsoft Exchange servers, with one victim stating they were infected via the ProxyLogon vulnerabilities. [.].

article thumbnail

Trouble is brewing, as cyber incident takes down Molson Coors operations

SC Magazine

Pictured: a Molson Canadian facility, as seen from Old Montreal. (Eternalsleeper at en.wikipedia, CC BY 3.0 [link] , via Wikimedia Commons). Molson Coors today reported that it has experienced a systems outage caused by a cybersecurity incident that has delayed and may continue to disrupt parts of the company’s business, including its brewery operations, production and shipments.

article thumbnail

Why SaaS Security Is So Hard

Security Boulevard

It’s never quiet in the era of cybercrime — and a company’s SaaS security posture is fast becoming a more common vector for bad actors and infiltration. The SaaS market growing at 30% per year, and Deloitte and others predicted that, post-COVID-19, the SaaS model will be even more widespread. It is safe to say. The post Why SaaS Security Is So Hard appeared first on Security Boulevard.

article thumbnail

Cyber secure your Smart Phone by doing so

CyberSecurity Insiders

While most of the smart phones of today’s generation are well incepted when it comes to security, some practices of users makes the device fall into the prying eyes of hackers. So, just by simply following the below steps, you can not only secure your smart phone from hacking campaigns, but also keep it free from adware or mining malware. 1- Always use a 4 digit or a 6 digit password to lock the phone as it helps in keeping the data out of reach of unwanted minds.

Adware 128
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Does XDR Mark the Spot? 6 Questions to Ask

Dark Reading

Extended detection and response technology goes well beyond endpoint management to provide visibility into networks, servers, cloud, and applications. Could it be the answer to your security challenges?

article thumbnail

Linux Systems Under Attack By New RedXOR Malware

Threatpost

Researchers say the new RedXOR backdoor is targeting Linux systems with various data exfiltration and network traffic tunneling capabilities.

Malware 139
article thumbnail

ProxyLogon PoC Exploit Released; Likely to Fuel More Disruptive Cyber Attacks

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) on Wednesday issued a joint advisory warning of active exploitation of vulnerabilities in Microsoft Exchange on-premises products by nation-state actors and cybercriminals.

article thumbnail

Ransomware Cyber Attack on Molson Coors

CyberSecurity Insiders

Brewery company Molson Coors has made it official that its IT infrastructure was reigning under a major cyber attack that has brought its Beverage production to a complete standstill. According to an update released through SEC filing, the company acknowledged the attack as a Cybersecurity incident that has halted the operations, productions and shipments.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Criminals arrested after trusting encrypted chat app cracked by the police

Graham Cluley

Police in the Netherlands and Belgium have made hundreds of raids, and arrested at least 80 people, after cracking into an encrypted phone network used by organised criminals. Read more in my article on the Tripwire State of Security blog.

article thumbnail

With Proof-of-Concept Out, FBI & CISA Urge Organizations to Mitigate Microsoft Exchange Threat ASAP

Hot for Security

The US Cybersecurity & Infrastructure Security Agency (CISA) and the FBI have released a joint advisory urging organizations to take steps towards mitigating the recent Microsoft Exchange ‘ProxyLogon’ vulnerabilities. Soon after Microsoft disclosed the existence of several chainable vulnerabilities in its Exchange products, CISA published granular guidelines that IT administrators could follow to detect potential intrusions.

article thumbnail

OVH data center fire likely caused by faulty UPS power supply

Bleeping Computer

OVH founder and chairman Octave Klaba has provided a plausible explanation for the fire that burned down OVH data centers in Strasbourg, France. [.].

article thumbnail

Smashing Security podcast #218: Microsoft, McAfee, and mayhem

Graham Cluley

Is it the end of the road for John McAfee? Is PornHub more legitimate than Facebook? And do you know as much as you think you do about the Microsoft Exchange Server mega-hack? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.

Hacking 117
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Microsoft confirms Windows 10 crash issue due to March updates

Bleeping Computer

Microsoft has confirmed that Windows 10 devices might crash with a Blue Screen of Death (BSOD) when printing under certain conditions after applying the March KB5000802 cumulative update. [.].

115
115
article thumbnail

Menlo Security Gateway Now Protects Mobile Devices

Security Boulevard

Menlo Security this week announced it has extended the reach of its cloud service for isolating endpoints from web content to mobile computing devices. The company’s secure web gateway (SWG) only renders content on a remote cloud service that can be viewed using a browser running on an endpoint. That approach eliminates the possibility malware.

Mobile 113
article thumbnail

Molson Coors brewing operations disrupted by cyberattack

Bleeping Computer

The Molson Coors Beverage Company has suffered a cyberattack that is causing significant disruption to business operations. [.].

135
135
article thumbnail

Virginia Passes Consumer Data Protection Act

Digital Guardian

Virginia’s Consumer Data Protection Act (CDPA) is first major state privacy law since California's. Under the law, organizations will need to implement reasonable security practices to protect sensitive data.

109
109
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.