Mon.Mar 21, 2022

article thumbnail

Developer Sabotages Open-Source Software Package

Schneier on Security

This is a big deal : A developer has been caught adding malicious code to a popular open-source package that wiped files on computers located in Russia and Belarus as part of a protest that has enraged many users and raised concerns about the safety of free and open source software. The application, node-ipc, adds remote interprocess communication and neural networking capabilities to other open source code libraries.

Software 254
article thumbnail

Welcoming the Italian Government to Have I Been Pwned

Troy Hunt

For the last 4 years, I've been providing API-level access to national government agencies so that they can search and monitor their government domains on Have I Been Pwned. Today, I'm very happy to welcome the 29th government to join the service, Italy! Via CSIRT-Italia within their National Cybersecurity Agency (ACN), they now have free access to breach data I hope will further empower them to protect their people in the wake of data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI warns of cyberattacks using AvosLocker ransomware

Tech Republic Security

The AvosLocker Ransomware as a Service (RaaS) group has targeted critical infrastructure sectors in the US, such as financial services, manufacturing and government facilities, the FBI said. The post FBI warns of cyberattacks using AvosLocker ransomware appeared first on TechRepublic.

article thumbnail

WhatsApp ban issued across the UK for military personnel

CyberSecurity Insiders

Britain’s military personnel were ordered not to use WhatsApp messaging app anymore, as Russian hackers were using the app’s location service to track down individuals and kill them using missile attacks. Though the built-up theory seems illogical, as WhatsApp functionality is under full encryption, a missile attack that took place on Sunday on a training camp of foreign fighters, suggests that the hackers from the Russian federation could have sniffed the activity by tracking down the phone loc

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Why these 5 cybersecurity threats should concern any IT team

Tech Republic Security

Cybersecurity changes rapidly, but one thing remains constant. Threats don’t seem to slow down. If your network and security tools aren’t up to the task of protecting your organization now, it's not likely to get better going forward. Cybercrime is an industry unto itself, with new business models and tactics being developed all the time. The post Why these 5 cybersecurity threats should concern any IT team appeared first on TechRepublic.

article thumbnail

Serious vulnerability observed on Unisoc processors loaded Android Phones

CyberSecurity Insiders

A vulnerability alert has been issued against the smartphone devices operating on Unisoc processors, and the cyber threat seems to be serious as hackers can take control of the device to access text messages, call logs, contacts, and other such information like photos and videos. A report released by Kryptowire mentions that threat actors can take control of the entire device, just by taking control of the processing chip through a vulnerability.

Marketing 126

More Trending

article thumbnail

Bad Dog—Everyone HATES This FIDO Passwordless Idea

Security Boulevard

Behold! The next steps to passwordless nirvana. But will FIDO2-WebAuthn let “privacy invading megacorps” profit from your private data? The post Bad Dog—Everyone HATES This FIDO Passwordless Idea appeared first on Security Boulevard.

article thumbnail

McAfee Cloud Launches as Skyhigh Security

eSecurity Planet

The final piece of the complicated Mandiant-FireEye split and subsequent FireEye-McAfee merger fell into place today, as McAfee’s cloud security business was officially spun off under the new name of Skyhigh Security. McAfee Enterprise and FireEye were acquired by Symphony Technology Group last year as Mandiant became a standalone company. STG also owns RSA Security, which remains a separate company.

Marketing 123
article thumbnail

Trending ransomware attack news headlines on Google

CyberSecurity Insiders

1.) The top news that is trending on Google is related to a cyber-attack campaign that targeted about 21 natural gas suppliers in the United States, just a few days before the Russian invasion of Ukraine. The targeted companies were those involved in fuel production, export, distribution of natural gas and the aim behind the incident could be to create a kind of scarcity of gas supply in the developed nation.

article thumbnail

New Serpent backdoor malware targets French entities with unforeseen method

Tech Republic Security

The malware has been found in the French construction and government sectors and uses steganography, Tor proxy and package installer software, Proofpoint says. The post New Serpent backdoor malware targets French entities with unforeseen method appeared first on TechRepublic.

Malware 104
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

8 IT security disasters: Lessons from cautionary examples

CSO Magazine

Anyone who follows cybersecurity is aware of the steady drumbeat of data breaches and attacks. So, an attack needs to really stand out to earn the name "disaster." We've assembled eight truly disastrous IT security failures over the past decade, with the goal of finding not just clever hacks, but real mistakes on the part of the victims. Hopefully you'll come away with some ideas on how not to suffer a disaster of your own. [ Learn 8 pitfalls that undermine security program success and 12 tips f

article thumbnail

Kubernetes showing vulnerabilities against ransomware attacks

Tech Republic Security

Veritas Technologies has released a study outlining the security issues with open source container orchestration system, Kubernetes. The post Kubernetes showing vulnerabilities against ransomware attacks appeared first on TechRepublic.

article thumbnail

Diavol Ransomware Receives Free Decryptor

Heimadal Security

Good news for victims of Diavol ransomware. Emsisoft, the well-known cybersecurity company, has just provided a free decryptor for this ransomware family linked to the TrickBot gang. Now victims can use this free decryption tool to recover their files without having to pay a ransom. Free Decryptor for Diavol Ransomware Now Available The free Diavol […].

article thumbnail

Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities

eSecurity Planet

Using misconfigured multi-factor authentication (MFA) and an unpatched Windows vulnerability, Russian state-sponsored hackers were able to breach a non-governmental organization (NGO) and escalate privileges, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI revealed last week. By using a misconfigured Cisco Duo MFA implementation to force enrollment of a new device, the hackers were then able to use the “PrintNightmare” Windows Print Spooler vulnerability ( CVE

VPN 102
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Sandworm: A tale of disruption told anew

We Live Security

As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again. The post Sandworm: A tale of disruption told anew appeared first on WeLiveSecurity.

101
101
article thumbnail

BitRAT malware now spreading as a Windows 10 license activator

Bleeping Computer

A new BitRAT malware distribution campaign is underway, exploiting users looking to activate pirated Windows OS versions for free using unofficial Microsoft license activators. [.].

Malware 98
article thumbnail

Facebook phish claims “Someone tried to log into your account”

Malwarebytes

Watch out for bogus Facebook phishing messages winging their way to your mailbox. The ruse is quite simple: The mail senders are relying on the recipient’s sense of panic to respond without thinking about it. The mail looks professional enough, and seeks to imitate what would be a fairly typical looking message from Facebook. As for the panic aspect, the phishers have pinned the hopes of this attack onto the old faithful “Someone is trying to login as you, so you’d better do something abou

article thumbnail

Why Machine Identity Management is Core to Cybersecurity

Security Boulevard

Over the last year, enterprises everywhere scrambled to get their assets and services online—and fast. This behavior not only rapidly accelerated the digital transformation timeline by almost seven years, it also changed the definition of a machine. A machine is no longer just a computer—it’s everything that is included in a network: Servers, mobile devices, The post Why Machine Identity Management is Core to Cybersecurity appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Serpent malware campaign abuses Chocolatey Windows package manager

Bleeping Computer

Threat actors are abusing the popular Chocolatey Windows package manager in a new phishing campaign to install new 'Serpent' backdoor malware on systems of French government agencies and large construction firms. [.].

Malware 98
article thumbnail

US is on the cusp of a major regulatory overhaul around cybersecurity 

Security Boulevard

According to these publications, the US is working on revamping the cybersecurity regulatory framework to move away from a regime that is currently based on voluntary threat assessment and management to one that is based on regulations enforced by the federal government. The move comes in wake of increasing cyberthreats to IT, IoT, and OT-based […].

article thumbnail

Microsoft investigating claims of hacked source code repositories

Bleeping Computer

Microsoft says they are investigating claims that the Lapsus$ data extortion hacking group breached their internal Azure DevOps source code repositories and stolen data. [.].

Hacking 98
article thumbnail

Women of Cybersecurity: Marketing Guru, Maria Velasquez

Security Boulevard

Women continue to make history, and during Women’s History Month, we’re celebrating women carving paths in the worlds of coding and cybersecurity, in our continuing series, Code of Honor: The Women of Software Development, JavaScript, and Cybersecurity. In this blog, we feature Feroot Security’s own cybersecurity marketing guru, Maria Velasquez, Director of Demand Generation at […].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

New Backdoor Targets French Entities via Open-Source Package Installer

The Hacker News

Researchers have exposed a new targeted email campaign aimed at French entities in the construction, real estate, and government sectors that leverages the Chocolatey Windows package manager to deliver a backdoor called Serpent on compromised systems.

article thumbnail

AvosLocker ransomware uses Microsoft Exchange Server vulnerabilities, says FBI

Malwarebytes

The FBI has issued an advisory about the AvosLocker ransomware. Notably the FBI has noticed that several victims have reported Microsoft Exchange Server vulnerabilities as the intrusion vector. AvosLocker is a Ransomware as a Service (RaaS) affiliate-based group that has targeted victims across multiple critical infrastructure sectors in the United States including financial services, critical manufacturing, and government facilities.

article thumbnail

Hacker leaked a new version of Conti ransomware source code on Twitter

Security Affairs

A Ukrainian security researcher has leaked more source code from the Conti ransomware operation to protest the gang’s position on the conflict. Hacker leaked a new version of the Conti ransomware source code on Twitter as retaliation of the gang’s support to Russia. The attack against the Conti ransomware and the data leak is retaliation for its support for the Russian invasion of Ukraine.

article thumbnail

'CryptoRom' Crypto Scam Abusing iPhone Features to Target Mobile Users

The Hacker News

Social engineering attacks leveraging a combination of romantic lures and cryptocurrency fraud have been luring unsuspecting victims into installing fake apps by taking advantage of legitimate iOS features like TestFlight and Web Clips. Cybersecurity company Sophos, which has named the organized crime campaign "CryptoRom," characterized it as a wide-ranging global scam.

Scams 95
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Lapsus$ gang claims to have hacked Microsoft source code repositories

Security Affairs

Microsoft is investigating claims that the Lapsus$ hacking group breached its internal Azure DevOps source code repositories. Microsoft announced that is investigating claims that the Lapsus$ cybercrime gang breached their internal Azure DevOps source code repositories and stolen data. Over the last months, the gang compromised other prominent companies such as NVIDIA , Samsung , Ubisoft , Mercado Libre, and Vodafone.

Hacking 96
article thumbnail

South Korean DarkHotel Hackers Targeted Luxury Hotels in Macau

The Hacker News

Luxury hotels in the Chinese special administrative region of Macau were the target of a malicious spear-phishing campaign from the second half of November 2021 and through mid-January 2022.

article thumbnail

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of March 14, 2022

The State of Security

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of March 14, 2022. I’ve also included some comments on these stories. Most Orgs Would Take Security Bugs Over Ethical […]… Read More.

InfoSec 94
article thumbnail

Lapsus$ hackers leak 37GB of Microsoft's alleged source code

Bleeping Computer

The Lapsus$ hacking group claims to have leaked the source code for Bing, Cortana, and other projects stolen from Microsoft's internal Azure DevOps server. [.].

Hacking 98
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.