Mon.Aug 02, 2021

article thumbnail

The European Space Agency Launches Hackable Satellite

Schneier on Security

Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […]. Because the satellite can be reprogrammed in orbit, it can respond to changing demands during its lifetime. […]. The satellite can detect and characterise any rogue emissions, enabling it to respond dynamically to accidental interference or intentional jamming.

article thumbnail

Behind the scenes: A day in the life of a cybersecurity expert

Tech Republic Security

Leading a team is kind of like when a burglar alarm goes off and "you're the police," says the head of cybersecurity at ExpressVPN.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Windows PetitPotam attacks can be blocked using new method

Bleeping Computer

Security researchers have devised a way to block the recently disclosed PetitPotam attack vector that allows hackers to take control of a Windows domain controller easily. [.].

145
145
article thumbnail

Black Hat USA 2021 and DEF CON 29: What to expect from the security events

Tech Republic Security

Key topics analysts anticipate for these security conferences include supply chain attacks, Microsoft Exchange vulnerabilities and the iPhone/Pegasus spyware incident.

Spyware 185
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

U.S., UK and Australia Issue Joint Cybersecurity Advisory

Security Boulevard

As vulnerabilities are discovered, advisories are issued, remedies and mitigations are shared and then the onus is on the end user and/or company to do what’s necessary to close the window into their infrastructure. That is what happens in a perfect world, where CISOs and CIOs have fully collaborative relationships with operations and when the.

article thumbnail

PwnedPiper threatens thousands of hospitals worldwide, patch your systems now

Tech Republic Security

Nine critical vulnerabilities in a popular hospital pneumatic tube software could give attackers control of infrastructure and allow them to launch additional attacks that cripple healthcare operations.

More Trending

article thumbnail

Ransomware Attacks Leave Lasting Damage

Security Boulevard

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keeper Security survey of 2,000 U.S.-based workers found that nearly all companies targeted by a ransomware attack paid the ransom, and another.

article thumbnail

How can eSIM help overcome the challenges of IoT connectivity activation?

CyberSecurity Insiders

Connected IoT devices and smart solutions are quickly expanding into every industry and aspects of our lives, and the numbers back this up. By 2025, it has been predicted that 75 billion IoT devices will be connected with a potential market value of around $1.6 trillion. With the ability to leverage real-time data and analytics from connected devices, enterprises can gain powerful insights to help boost efficiency and productivity. .

IoT 144
article thumbnail

5 riskiest mobile apps

CSO Magazine

Unsanctioned software and applications running on corporate mobile devices is a security nightmare. These can range from meeting genuine business needs—commonly referred to as Shadow IT—such as efficient, remote communication with colleagues or corporate document management via downloadable messaging and file sharing apps, to using apps for non-work-related lifestyle or entertainment purposes such as socializing, fitness, gaming, and watching sports. [ Learn the 8 mobile security threats you sho

Mobile 143
article thumbnail

Empty npm package '-' has over 700,000 downloads — here's why

Bleeping Computer

A mysterious, one-letter npm package named "-" sitting on the registry since 2020 has received over 700,000 downloads. What's more? The package contains no functional code, so what makes it score so many downloads? [.].

Software 141
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CompTIA Security+: Prerequisites, obectives, and cost

CSO Magazine

CompTIA Security+ is a security certification offered by the Computing Technology Industry Association (CompTIA), a U.S.-based trade and industry nonprofit. Security+ is one of a suite of certifications that CompTIA offers across multiple IT disciplines; it's focused on entry-level security professionals and is one of the most popular. Like any well-regarded certification, CompTIA Security+ can help boost your career and your earning power.

article thumbnail

Detect What Others Miss with CESA

Cisco Security

With the executive order signed by the US government in the wake of recent cybersecurity attacks like SolarWinds , Colonial Pipeline , Microsoft Exchange server breach that have plagued high-value government entities and private organizations, it is very important to have security ammunition ready that can detect such attacks – one that can provide deep forensic details and visibility into your users and endpoints.

article thumbnail

BrandPost: Cyberattacks Escalate, Putting Pressure on the Defensive

CSO Magazine

How serious is the threat to enterprises from cyberattacks? Look no further than Colonial Pipeline, whose 5,500-mile-long pipeline carries 45 percent of the U.S. East Coast’s fuel supplies. This vital fuel supplier was forced to temporarily shut down after a ransomware attack, leading to panic buying and gas hoarding. According to the Guardian , “The wider American public was afforded an unwanted glimpse into the wild west world of ransomware this week, after a cyberattack crippled Colonial Pip

article thumbnail

Microsoft's Windows 365 Cloud PC service is live - Costs from $24 to $162

Bleeping Computer

Microsoft's Windows 365 Cloud PC service is now generally available, allowing businesses to deploy Windows 10 desktops in the cloud for prices ranging between $24 and $162 per device per month. [.].

131
131
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Basic flaws put pneumatic tube transport systems in hospitals at risk

CSO Magazine

Researchers have identified several high-risk vulnerabilities in a popular model of pneumatic tube systems (PTS) that are used by many hospitals to transport sensitive materials including lab specimens, blood products, tests and medications between different departments. The flaws could enable attackers to sabotage or hold the systems hostage, which can potentially have a negative impact on patient care.

Risk 135
article thumbnail

On course for a good hacking

We Live Security

A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK. The post On course for a good hacking appeared first on WeLiveSecurity.

Hacking 131
article thumbnail

BrandPost: Improving Cybersecurity as a Team

CSO Magazine

No matter an organization's size or complexity, cybersecurity is a team sport. Departments and individuals across the board have a stake in ensuring that assets and data remain secure. Just like a successful sports team, collaboration among the players is essential. Likewise, the person in charge of a cybersecurity program needs to be able to manage and monitor activities to achieve success.

article thumbnail

Do You Trust Your Smart TV?

Security Affairs

Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related activities may not be so trustworthy? In our latest video, we demonstrate an attack scenario that can occur within any organization – hacking a smart TV. The video shows an insider plugging a USB Rubber Ducky into a smart TV in a company meeting room.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Google Chrome to no longer show secure website indicators

Bleeping Computer

Google Chrome will no longer show whether a site you are visiting is secure and only show when you visit an insecure website. [.].

Software 145
article thumbnail

WordPress Download Manager Plugin was affected by two flaws

Security Affairs

An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under specific configurations. Researchers from Wordfence team discovered a vulnerability, tracked as CVE-2021-34639, affecting the WordPress Download Manager plugin that could allow attackers to execute arbitrary code under specific configurations.

Hacking 122
article thumbnail

SANS Survey Finds Only 29% of Orgs Have Automated Most of Their Security Testing

Veracode Security

IT workloads are increasingly moving to the cloud, changing the way organizations develop and deliver software. Deploying and running production systems is now separate from the hardware and network, infrastructure is defined through code, and operations are now part of cloud service APIs. What does this mean for security? Security professionals need to be able to read and write code.

article thumbnail

Cloud Security Company SecureWorx acquired by EY Australia

CyberSecurity Insiders

Ernst & Young Australia has made it official that it is going to acquire Cloud Security Company SecureWorx that offers managed security solutions to National Network Operations Centre (NOC) and Secure Operations Centre (SOC). SecureWorx is also involved in the designing the security network fabric of Amazon Web Services, VMware cloud, Commvault and LogRhythm along with and Microsoft Azure, Thus, the latest acquisition is said to help EY Australia strengthen its stand in Cyber security by int

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

How Ransomware Sneaks In

Webroot

Ransomware has officially made the mainstream. Dramatic headlines announce the latest attacks and news outlets highlight the staggeringly high ransoms businesses pay to retrieve their stolen data. And it’s no wonder why – ransomware attacks are on the rise and the average ransom payment has ballooned to over $200,000. But the true cost of ransomware can go beyond the headline-grabbing payments.

article thumbnail

Record 300 million Ransomware Attacks in first half of 2021

CyberSecurity Insiders

According to a report released by SonicWall, over 300 million ransomware attacks were observed in the first half of 2021, surpassing 2020s total of 302.73 million. And the highlight of the find is that the month June 2021 alone witnessed a record new high of 78.4 million file encrypting malware than compared to April and May of this year. There has been a massive spike in the attacks in United States and UK alone as the attacks in the said two nations made up 185 percent and 144 percent of the t

article thumbnail

More evidence suggests that DarkSide and BlackMatter are the same group

Security Affairs

Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that after the clamorous Colonia Pipeline attack, the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. The experts analyzed encryption algorithms in a decryptor used by BlackMatter, which is actively attacking corporate entities.

article thumbnail

Set up an SSH tarpit in Ubuntu Server 20.04: Here's how

Tech Republic Security

You can add an SSH tarpit to Ubuntu Server with the help of endlessh. Jack Wallen shows you how.

147
147
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

CompTIA Security+: Prerequisites, objectives, and cost

CSO Magazine

CompTIA Security+ is a security certification offered by the Computing Technology Industry Association (CompTIA), a U.S.-based trade and industry nonprofit. Security+ is one of a suite of certifications that CompTIA offers across multiple IT disciplines; it's focused on entry-level security professionals and is one of the most popular. Like any well-regarded certification, CompTIA Security+ can help boost your career and your earning power.

article thumbnail

Cloudflare Vulnerability Enabled Compromise of 12% of All Websites

Security Boulevard

A vulnerability in the open-source cdnjs CDN could have enabled cyberattacks on the 12.7% of ALL websites that rely on its JavaScript and CSS libraries, with hackers taking over systems or propagating flaws to millions of websites. The post Cloudflare Vulnerability Enabled Compromise of 12% of All Websites appeared first on Ericom Blog. The post Cloudflare Vulnerability Enabled Compromise of 12% of All Websites appeared first on Security Boulevard.

article thumbnail

Enable secure DNS on your Chromebook: Here's how

Tech Republic Security

For a more secure experience, use DNS-over-HTTPS on your Chromebook. Jack Wallen shows you how.

DNS 140
article thumbnail

PwnedPiper critical bug set impacts major hospitals in North America

Bleeping Computer

Pneumatic tube system (PTS) stations used in thousands of hospitals worldwide are vulnerable to a set of nine critical security issues collectively referred to as PwnedPiper. [.].

109
109
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.