Tue.Jun 29, 2021

article thumbnail

Risks of Evidentiary Software

Schneier on Security

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead to inaccurate evidence, but the proprietary nature of software makes it hard for defendants to examine it. The software engineers proposed a three-part test.

Software 303
article thumbnail

More than 3.5 million people needed worldwide to work in cybersecurity

Tech Republic Security

Expert says attacks are getting bigger and more aggressive than before. Instead of being like a burglary, they're more like a home invasion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian hackers had months-long access to Denmark's central bank

Bleeping Computer

Russian state hackers compromised Denmark's central bank (Danmarks Nationalbank) and planted malware that gave them access to the network for more than half a year without being detected. [.].

Banking 145
article thumbnail

Americans lost $29.8 billion to phone scams in the past year, study finds

Tech Republic Security

The number of spam calls, the number of people losing money to them and the total amount of money lost In the past year are all record setting.

Scams 202
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

4 Warning Signs of an Insecure App

Security Boulevard

The “golden age of digital transformation” is upon us, and companies around the globe are scurrying to meet consumers on the digital frontier. For developers, it is a virtual gold rush, as businesses overhaul their infrastructure to meet consumers where they are—their mobile phones. For most, this means developing a mobile app. Unfortunately, the byproduct.

article thumbnail

How legitimate security tool Cobalt Strike is being used in cyberattacks

Tech Republic Security

Normally used by organizations for penetration testing, Cobalt Strike is exploited by cybercriminals to launch attacks, says Proofpoint.

More Trending

article thumbnail

iOS 15: How to enable Mail Privacy Protection

Tech Republic Security

If you have access to Apple's iOS 15 Developer Beta, learn how to use an important security feature called Mail Privacy Protection.

171
171
article thumbnail

New LinkedIn breach exposes data of 700 Million users

Security Affairs

A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more than 92% of the total 756M users. A new massive LinkedIn breach made the headlines, a database containing data of 700M users, more than 92% of the total 756M users, is available for sale on forums on the dark web. The exposed records include email addresses full names, phone numbers, physical addresses, geolocation records, LinkedIn username and profile URL, personal and professional experi

article thumbnail

Cyberattacks and ransomware are no longer burglary; they're home invasion, expert says

Tech Republic Security

More than 3.5 million people worldwide are needed to play defense against cyberattacks.

article thumbnail

Botnet attacks on APIs: Why most companies are unprepared

CSO Magazine

As companies move applications to the cloud and expose functionality via application programming interfaces (APIs), criminals have been moving quickly to take advantage of this newly exposed attack surface. By using botnets , they can dramatically increase the reach and effectiveness of their attacks. As with many new technologies, security is lagging behind.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Security and automation are top priorities for IT professionals

Tech Republic Security

Data protection and lack of budgets and resources continue to present the biggest challenges as cyberattacks increase, according to a new Kaseya report.

144
144
article thumbnail

New disputes to arise from ransomware payments ban

CyberSecurity Insiders

As the law enforcement agencies are urging ransomware victims not to make any ransom payment to hackers, as it not only encourages crime but also doesn’t guarantee a decryption key for sure in exchange for the payment. Some security analysts say that this could give rise to fresh troubles to businesses and their owners on a respective note. Know how….?

article thumbnail

How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions

Tech Republic Security

New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on both Ubuntu- and Red Hat-based Linux distributions.

133
133
article thumbnail

Data Breaches Rise as Organizations Shift to the Cloud

Security Boulevard

As more and more organizations make the move into public clouds, a corresponding rise in cloud data breaches has followed, according to an IDC survey of 200 security decision-makers in the U.S. The survey found nearly all (98%) of the companies surveyed had experienced at least one cloud data breach in the past 18 months, The post Data Breaches Rise as Organizations Shift to the Cloud appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Hackers use zero-day to mass-wipe My Book Live devices

Bleeping Computer

A zero-day vulnerability in Western Digital My Book Live NAS devices allowed a threat actor to perform mass-factory resets of devices last week, leading to data loss. [.].

124
124
article thumbnail

Understanding Global IoT Security Regulations

Security Boulevard

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% over the 2020-2024 forecast period. It offers promising benefits that are rapidly transforming a variety of industries, including manufacturing, health care, commercial buildings, smart homes, retail and energy. The huge potential of IoT.

IoT 120
article thumbnail

DoubleVPN servers, logs, and account info seized by law enforcement

Bleeping Computer

?Law enforcement has seized the servers and customer logs for DoubleVPN, a double-encryption service commonly used by threat actors to evade detection while performing malicious activities. [.].

article thumbnail

Mercedes-Benz Data Breach Sheds Light on the Importance of Third-Party Risks

Heimadal Security

The Mercedes-Benz data breach that recently took place exposed important information such as credit card information, social security numbers, and driver license numbers of almost 1,000 Mercedes-Benz customers and potential buyers. Mercedes-Benz announced last week, after assessing 1.6 million customer records which included customer names, addresses, emails, phone numbers, and purchased vehicle information, that sensitive […].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Lorenz ransomware decryptor recovers victims' files for free

Bleeping Computer

Dutch cybersecurity firm Tesorion has released a free decryptor for the Lorenz ransomware, allowing victims to recover some of their files for free without paying a ransom. [.].

article thumbnail

Empowering women in the field of ethics and compliance

CyberSecurity Insiders

This blog was written by an independent guest blogger. Ethics and compliance is becoming a burgeoning industry as an increase in government regulations in areas such as sustainability, diversity, and data privacy make compliance an important focus for companies. It’s especially important in tech companies as the ever-growing risk of cybersecurity breaches requires that security teams be vigilant in protecting sensitive data.

article thumbnail

Microsoft successfully hit by dependency hijacking again

Bleeping Computer

Microsoft has once again been successfully hit by a dependency hijacking attack. This month, another researcher found an npm internal dependency, after squatting which, he began receiving messages from Microsoft's servers. [.].

119
119
article thumbnail

Experts developed a free decryptor for the Lorenz ransomware

Security Affairs

Researchers analyzed a recently discovered threat, the Lorenz ransomware, and developed a free decryptor for the victims of this new operation. The Lorenz ransomware gang has been active since April and hit multiple organizations worldwide demanding hundreds of thousands of dollars in ransoms to the victims. Like other ransomware gangs, Lorenz operators also implement double-extortion model by stealing data before encrypting it and threatening them if the victim doesn’t pay the ransom.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

BrandPost: The SMB Mission: Data Security Without Compromising User Productivity

CSO Magazine

There’s little need to belabor the point that the cyberattack landscape has become significantly more dangerous. Yet, for small and medium-sized businesses (SMBs), any security incident can quickly become costly and damaging. At the same time, it’s difficult to limit access to the resources employees need to get work done. Any strain on productivity also affects the bottom line.

110
110
article thumbnail

Windows 11 includes the DNS-over-HTTPS privacy feature - How to use

Bleeping Computer

Microsoft has added a privacy feature to Windows 11 called DNS-over-HTTPS, allowing users to perform encrypted DNS lookups to bypass censorship and Internet activity. [.].

DNS 109
article thumbnail

STEMatch creates new cybersecurity education and career paths

CSO Magazine

The critical cybersecurity skills shortage is giving rise to innovative programs designed to bring into the field people who otherwise wouldn't or couldn't pursue the opportunity. STEMatch is one such program. “The purpose of STEMatch is to make the opportunities that are created by STEM education more visible, accessible and affordable for people that are underrepresented in our industry,” Chris Zannetos, creator of CSO50 recognized project STEMatch tells CSO.

Education 107
article thumbnail

Top Countries With ICS Endpoint Malware Detections

Trend Micro

The Trend Micro research paper, "2020 Report on Threats Affecting ICS Endpoints,” presents findings on ICS endpoints and the threats that plague them. From these findings, we rounded up the list of the top ten countries with the most malware and grayware detections.

Malware 105
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

BrandPost: What’s Your Plan if Ransomware Hits?

CSO Magazine

Ransomware continues to plague businesses around the globe. Sophos’ 2021 State of Ransomware Survey finds 37% of respondent organizations were hit by ransomware in the last year alone. Several headline-making attacks in recent months, in which victim organizations paid the ransom for access to their data, raised eyebrows and sparked conversations on whether or not paying is ever a good idea.

article thumbnail

The known Windows 11 issues and how you can fix them

Bleeping Computer

?The first Windows 11 preview build was released yesterday, and with it came a variety of bugs that are sure to frustrate testers. Below we have listed the most noticeable issues and how you can fix them. [.].

103
103
article thumbnail

Fired by algorithm: The future’s here and it’s a robot wearing a white collar

Malwarebytes

Black Mirror meets 1984. Imagine that your employer uses a bot to keep track of your “production level.” And when this bot finds that you are an under-performer it fires off a contract-termination mail. Does this sound like the world you live in? Unfortunately, for some people it is. The case. Amazon.com has used algorithms for many years to manage the millions of third-party merchants on its online marketplace.

article thumbnail

LinkedIn Data of 700 Million People Leaked

Heimadal Security

Last Tuesday, a popular hacker calling himself “GOD User TomLiner” advertised data from over 700 million LinkedIn users for sale with samples that the data is real and up to date as per June 2021. LinkedIn is one of the most popular professional networking platforms that allows its users to create business connections, discover potential […]. The post LinkedIn Data of 700 Million People Leaked appeared first on Heimdal Security Blog.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.