Thu.Apr 29, 2021

article thumbnail

Welcoming the Romanian Government to Have I Been Pwned

Troy Hunt

Today I'm very happy to announce the arrival of the 15th government to Have I Been Pwned, Romania. As of now, CERT-RO has access to query all Romanian government domains across HIBP and subscribe them for future notifications when subsequent data breaches affect aliases on those domains. Romania joins a steadily growing number of governments across the globe to have free and unrestricted access to API-based domain searches for their assets in HIBP.

article thumbnail

Identifying People Through Lack of Cell Phone Use

Schneier on Security

In this entertaining story of French serial criminal Rédoine Faïd and his jailbreaking ways, there’s this bit about cell phone surveillance: After Faïd’s helicopter breakout, 3,000 police officers took part in the manhunt. According to the 2019 documentary La Traque de Rédoine Faïd , detective units scoured records of cell phones used during his escape, isolating a handful of numbers active at the time that went silent shortly thereafter.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 241

Troy Hunt

What. A. Week. Heaps of data breaches, heaps of law enforcement and gov stuff and somehow, I still found time to put even more IP addresses into the house courtesy of even more IoT. I'm not sure if the latter gives me a break from the more professional tech stuff or just compounds the amount of stuff I've already got on my plate, but I'm having fun doing it anyway ??

IoT 228
article thumbnail

Neurodiversity in IT Security

Security Boulevard

Neurodiversity, the term for the range of differences in individual brain function and behavioral traits, with regard to sociability, learning, attention, mood and other mental functions in a non-pathological sense, is important to foster in any industry, but the security space in particular has always welcomed a range of neurodiverse groups. Whether professionals are diagnosed.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to Conduct Vulnerability Assessments: An Essential Guide for 2021

The Hacker News

Hackers are scanning the internet for weaknesses all the time, and if you don't want your organization to fall victim, you need to be the first to find these weak spots. In other words, you have to adopt a proactive approach to managing your vulnerabilities, and a crucial first step in achieving this is performing a vulnerability assessment.

Internet 143
article thumbnail

The Infosec Meme That Touched a Raw Nerve

Security Boulevard

One of our memes was reposted by The Cyber Security Hub, an infosec community with greater than 1 million (yes, it’s MILLION) followers on LinkedIn. The meme (see below) was on the topic of cybersecurity budgets and it was our tongue-in-cheek way to start a discussion. But we were blown away by the response it …. Read More. The post The Infosec Meme That Touched a Raw Nerve appeared first on Security Boulevard.

InfoSec 145

More Trending

article thumbnail

What is Schrems II and how does it affect your data protection in 2021?

Security Boulevard

Over six months on, the Schrems II verdict is proving to be a difficult obstacle for many businesses when it comes to data management. Find out why here. The post What is Schrems II and how does it affect your data protection in 2021? appeared first on Security Boulevard.

article thumbnail

Emotet malware steals 4.3 million email addresses

CyberSecurity Insiders

Emotet Botnet that establishes a backdoor on Windows systems has reportedly stolen 4 million email addresses over the past couple of years said Troy Hunt, the Regional Director of Microsoft and the founder of data breach disclosure digital firm HaveIBeenPwned. All those compromised emails have been registered at the website of Mr. Troy and those concerned can check if their email addresses have been compromised by the threat actors of Emotet Botnet gang.

Malware 141
article thumbnail

New ransomware group uses SonicWall zero-day to breach networks

Bleeping Computer

A financially motivated threat actor exploited a zero-day bug in Sonicwall SMA 100 Series VPN appliances to deploy new ransomware known as FiveHands on the networks of North American and European targets. [.].

article thumbnail

What is Smishing? The 101 guide

Malwarebytes

Smishing is a valuable tool in the scammer’s armoury. You’ve likely run into it, even if you didn’t know that is its name. It doesn’t arrive by email or social media direct message, instead choosing a route directly aimed at what may be your most personal device: the mobile phone. So, what is Smishing? We’re glad you asked.

Mobile 138
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Task force proposes framework for combatting ransomware

CSO Magazine

Ransomware, the " perfect crime " of the internet era, is spreading rapidly, growing according to some accounts by 150% or more in 2020. There are no signs of a slow-down in 2021. The average ransom demanded by attackers jumped 43% from Q4 2020 to Q1 2021 to $220,298 as threat groups target bigger and more vulnerable organizations, from police forces to hospitals to municipal school districts.

article thumbnail

What Are The Most Critical Components of Threat Intelligence and How Do You Take Action on Them?

Digital Guardian

Threat intelligence is all about collecting data, information that can keep you apprised of potential threats. What are the most critical components of threat intelligence? We asked 25 experts.

133
133
article thumbnail

The Life-Threatening Rise of Ransomware in Healthcare

Security Boulevard

Cybersecurity is generally not the first thing on anyone’s mind when she or he is contemplating a major operation or a prolonged hospital stay. However, with the healthcare sector experiencing a constant rise in cyber attacks , the potential health impact of getting caught in the crossfire of a ransomware attack is now an increasingly frightening prospect for a significant number of healthcare consumers. .

article thumbnail

How to get rid of Ransomware Attacks?

Hacker Combat

The importance of accessibility and protection of personal information can never be overstated especially when it comes to online dealings. This is because of the sensitive nature of such information which could prove extremely detrimental in cases where it falls into the wrong hands. One of the major instruments that facilitate such fraudulent access and use of sensitive data which is otherwise meant to be private is ransomware.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

To better defend digital assets, follow physical security's playbook

CSO Magazine

In the wake of the terrorist attacks on September 11, 2001, owners and managers of tall buildings scrambled to improve the security of their assets, their tenants, and the millions of visitors that frequented their sites annually. In a rush to enhance the security and safety of their buildings, along with the people who occupied them, facility managers invested millions of dollars on access controls, monitoring systems, and people to ensure they were better prepared for unexpected events.

128
128
article thumbnail

The importance of creating a small business Cybersecurity plan

CyberSecurity Insiders

This blog was written by an independent guest blogger. It’s estimated that cyber crime will cost businesses as much as $45,000,000,000 by 2025. Each year, small businesses who haven’t put a cyber security plan in place are at the mercy of hackers who are using ever increasingly sophisticated methods to breach their network, compromise their data – and even hold the business to ransom.

article thumbnail

FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims

We Live Security

The data breach notification site now allows you to check if your login credentials may have been compromised by Emotet. The post FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims appeared first on WeLiveSecurity.

article thumbnail

Command injection flaw in PHP Composer allowed supply-chain attacks

Security Affairs

A vulnerability in the PHP Composer could have allowed an attacker to execute arbitrary commands and backdoor every PHP package. The maintainers of the PHP Composer package have addressed a critical vulnerability, tracked as CVE-2021-29472, that could have allowed an attacker to execute arbitrary commands and establish a backdoor in every PHP package.

Hacking 125
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Here for Change: 12 Groups Supporting Women in Cybersecurity

Cisco Security

In celebration of International Women’s Day on March 8, we reached out to a group of women security experts and asked them, “Who has meant the most to you as an ally? And how has this impacted your career?” We then compiled their answers into an e-Book, Lifting Each Other Up: A Celebration of Women in Cybersecurity and Their Advocates. . This resource illuminates how some of today’s leading infosec women experts got started in the cybersecurity industry and embraced the common goal of creating a

article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

There’s an interesting paper, ‘It depends on your threat model’: the anticipatory dimensions of resistance to data-driven surveillance. The author critiques ‘anticipatory data practices’, a collection of techniques that include my own work, as presented to civil society activists. It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents

article thumbnail

Prime targets: Governments shouldn’t go it alone on cybersecurity

We Live Security

A year into the pandemic, ESET reveals new research into activities of the LuckyMouse APT group and considers how governments can rise to the cybersecurity challenges of the accelerated shift to digital. The post Prime targets: Governments shouldn’t go it alone on cybersecurity appeared first on WeLiveSecurity.

article thumbnail

SaaS Attacks: Lessons from Real-Life Misconfiguration Exploits

Threatpost

There is a way to protect users from deceptive OAuth apps, misconfigurations and misappropriated user permissions. SaaS Security Posture Management (SSPM) takes an automated approach to tracking, and even remediating, the exploitable misconfigurations in organizations’ SaaS apps.

121
121
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Microsoft finds critical code execution bugs in IoT, OT devices

Bleeping Computer

Microsoft security researchers have discovered over two dozen critical remote code execution (RCE) vulnerabilities in Internet of Things (IoT) devices and Operational Technology (OT) industrial systems. [.].

IoT 120
article thumbnail

New Terminal Software Module Introduced in PCI Secure Software Standard Version 1.1

PCI perspectives

Today, the PCI Security Standards Council (PCI SSC) published version 1.1 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard is one of two standards that are part of the PCI Software Security Framework (SSF). The PCI Secure Software requirements provide assurance that payment software is designed, engineered, developed and maintained in a manner that protects payment transactions and data, minimizes vulnerabilities, and defends itself f

Software 119
article thumbnail

Brazil's Rio Grande do Sul court system hit by REvil ransomware

Bleeping Computer

Brazil's Tribunal de Justiça do Estado do Rio Grande do Sul was hit with an REvil ransomware attack yesterday that encrypted employee's files and forced the courts to shut down their network. [.].

article thumbnail

CISA & NIST Publish Recommendations for IT Admins to Defend Against the Next ‘SolarWinds’ Event

Hot for Security

The Cybersecurity & Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) this week released an overview of supply chain threats. Its purpose: to help organizations keep themselves out of scenarios like the recent SolarWinds incident. The 16-page Defending Against Software Supply Chain Attacks released by CISA and NIST this week provides an overview of software supply chain risks and recommendations on how software customers and vendors can use t

Software 116
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Ransomware Task Force releases long-awaited recommendations

SC Magazine

People wait in line at the Apple Fifth Avenue store in New York City. The new Apple iPhone 12 was released today. Apple is among the more recent companies to be targeted by a ransomware gang, which demanded payment to “buy back” 15 stolen schematics of unreleased MacBooks and gigabytes of personal data on several major Apple brands. (Photo by Michael M.

article thumbnail

Hacker steals funds from customer bank accounts through Brute Force Attacks

CyberSecurity Insiders

First Horizon Bank of United States witnessed a cyber attack on a few of its customers resulting in fund loss of $1 million in total. The banking firm reported the same in the Securities and Exchange Commission (SEC) filing and stated that the attack could have taken place after the hacker/s stole customer credentials. Highly placed sources say that the attack could have taken place last month when the threat actor stole customer details from the banking servers through a vulnerability lying ins

Banking 112
article thumbnail

The privacy paradox: 5 places we give up privacy online — and don’t know it

StaySafeOnline

The post The privacy paradox: 5 places we give up privacy online — and don’t know it appeared first on Stay Safe Online.

138
138
article thumbnail

An alleged ransomware attack hit the Italian Banca di Credito Cooperativo causing chaos

Security Affairs

Banca di Credito Cooperativo (BCC), one of the largest Italian cooperative credit banks was hit by a ransomware attack. Banca di Credito Cooperativo (BCC), one of the largest Italian cooperative credit banks, was hit by a cyberattack allegedly carried out by one of the most aggressive ransomware gangs, Darkside. The attack paralyzed the operations at 188 branches causing serious problems to the customers of the bank as reported by the Italian newspaper La Repubblica.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.