Tue.Aug 03, 2021

article thumbnail

Paragon: Yet Another Cyberweapons Arms Manufacturer

Schneier on Security

Forbes has the story : Paragon’s product will also likely get spyware critics and surveillance experts alike rubbernecking: It claims to give police the power to remotely break into encrypted instant messaging communications, whether that’s WhatsApp, Signal, Facebook Messenger or Gmail, the industry sources said. One other spyware industry executive said it also promises to get longer-lasting access to a device, even when it’s rebooted. […].

article thumbnail

Global Foundation for Cyber Studies and Research Launches Cyber-Policy Magazine, Cyber Insights

Joseph Steinberg

The Global Foundation for Cyber Studies and Research (GFCyber) announced today that it has launched Cyber Insights , a new digital magazine that aims to help readers stay informed about contemporary cyber-related issues and their potential ramifications, from the perspectives of policy, practice, and technology. Cyber Insights provides policymakers and tech leaders with guidance and suggestions as to what issues they should ponder, and discusses associated challenges and concerns that might war

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 factors for success in cybersecurity projects among shifting priorities

Tech Republic Security

As more companies are considering the shift to a fully or hybrid remote workforce, accelerating plans to acquire digital and cloud services to address increasing cybersecurity risks is necessary.

article thumbnail

Linux Kernel Security Done Right

Google Security

Posted by Kees Cook, Software Engineer, Google Open Source Security Team To borrow from an excellent analogy between the modern computer ecosystem and the US automotive industry of the 1960s, the Linux kernel runs well: when driving down the highway, you're not sprayed in the face with oil and gasoline, and you quickly get where you want to go. However, in the face of failure, the car may end up on fire, flying off a cliff.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

True cybersecurity means centering policies on employee behavior, report says

Tech Republic Security

Protecting systems from bad actors is essential, but all the firewalls in the world are useless against the modern hacker who targets human weaknesses instead of digital ones.

Firewall 184
article thumbnail

Data Laundering Poses Privacy, Security Risks

Security Boulevard

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make the data seem authentic. As both customer bases and companies adapt to modern technologies and. The post Data Laundering Poses Privacy, Security Risks appeared first on Security Boulevard.

Risk 145

More Trending

article thumbnail

RDP brute force attacks explained

Malwarebytes

While you read these words, the chances are that somebody, somewhere, is trying to break in to your computer by guessing your password. If your computer is connected to the Internet it can be found, quickly, and if it can be found, somebody will try to break in. And it isn’t like the movies. The criminal hacker trying to guess your password isn’t sat in a darkened room wondering which of your pets’ names to type on their keyboard.

Passwords 145
article thumbnail

Olympic-themed passwords put people at risk

Tech Republic Security

Beyond using "tokyo" and "olympics" as their passwords, people have been turning to names of athletes, such as "kenny," "williams," and "asher," says NordPass.

Passwords 179
article thumbnail

Italian Vaccine Sites Shut Down by Ransomware Thugs

Security Boulevard

Some Italian healthcare websites and their backroom systems have been wiped off the internet by malware. The post Italian Vaccine Sites Shut Down by Ransomware Thugs appeared first on Security Boulevard.

article thumbnail

Cybersecurity professionals: Positive reinforcement works wonders with users

Tech Republic Security

The blame game is not working; experts suggest using positive reinforcement to improve employee attitude and performance.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The Kaseya ransomware attack: A timeline

CSO Magazine

The attack on US-based software provider Kaseya by notorious Russia-linked ransomware group REvil in July 2021 is estimated to have affected up to 2,000 global organizations. REvil targeted a vulnerability ( CVE-2021-30116 ) in a Kaseya remote computer management tool to launch the attack, with the fallout lasting for weeks as more and more information on the incident came to light.

article thumbnail

Connect Ubuntu Linux Desktop 21.04 to an Active Directory domain: Here's how

Tech Republic Security

Jack Wallen walks you through the steps to join Ubuntu Desktop to Active Directory domains.

209
209
article thumbnail

What is an SBOM? A deep dive.

Security Boulevard

By now, you’ve probably heard the term software bill of materials (SBOM). It’s become the security buzzword of the year. Let’s look a little deeper into the what a SBOM is, what it contains, how it is used and how the industry plans to exchange them. The post What is an SBOM? A deep dive. appeared first on Security Boulevard.

Software 143
article thumbnail

DDoS attacks largely target the US and the computers and internet sectors

Tech Republic Security

DDoS attacks are a nuisance to be sure, but they're also used in a variety of ways that make them a severe threat, says Atlas VPN.

DDOS 176
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Top Telecom Companies in the world digitally compromised by China

CyberSecurity Insiders

According to a report released by US Security firm Cybereason Inc, some of the top telecom companies in the world were digitally compromised by hackers sponsored by China stealing info, such as phone data and location information of telecom service users, respectively. Going deep into the details, Lior Div, the CEO of Cybereason confirmed the incident and tagged the espionage as a threat to national security and stated that such state sponsored espionage operations make customer lose trust on th

Hacking 143
article thumbnail

Beef up security in Firefox with Fission

Tech Republic Security

Jack Wallen shows you how to enable Fission. Firefox developers understand web browser security is at a premium, so they've rolled out a site isolation feature.

147
147
article thumbnail

Supply Chain Flaws Found in Python Package Repository

eSecurity Planet

Administrators overseeing the Python Package Index (PyPI) in recent days found themselves responding to vulnerabilities found in the repository of open source software, the latest security problems to hit the Python community. Most recently, the PyPI group sent out fixes for three vulnerabilities that were discovered by security researcher RyotaK and published on his blog.

Software 143
article thumbnail

Ransomware attack hits Italy's Lazio region, affects COVID-19 site

Bleeping Computer

The Lazio region in Italy has suffered a RansomEXX ransomware attack that has disabled the region's IT systems, including the COVID-19 vaccination registration portal. [.].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ransomware Attack on Corona Virus Italian Vaccination Registration System

CyberSecurity Insiders

A Cyber Attack has reportedly disrupted the Corona Virus vaccine registration system from morning hours of today and authorities are clueless on when the digital vaccine registration system will be working normally. Going deep into the details, the population living in Lazio Region, including some from Rome were badly affected by the attack that is suspected to be a Ransomware variant.

article thumbnail

GAO report faults CIOs, OMB for slow adoption of cybersecurity recommendations

CSO Magazine

The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. It was preceded by President Biden’s comments made to the Office of the Director National Intelligence and staff and the leadership of the intelligence community on July 27.

CSO 142
article thumbnail

NSA and CISA share Kubernetes security recommendations

Bleeping Computer

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published comprehensive recommendations for strengthening the security of an organization's Kubernetes system. [.].

article thumbnail

Serious flaws in widespread embedded TCP/IP stack endanger industrial control devices

CSO Magazine

Embedded devices, especially those designed for industrial automation that have long shelf lives, are known to use a mixture of in-house and third-party code that was created at a time when software vulnerabilities were not as well understood as today. Critical flaws found in proprietary components that hardware vendors have widely used for years have far-reaching implications.

CSO 134
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Beware of this Bazaloader Malware campaign

CyberSecurity Insiders

Microsoft has recently uncovered a malware campaign that tricks victims into downloading Bazaloader Malware, thereafter giving remote keyboard access to hackers. As of now, news is out that the campaign is limited to countries enriched with Non-Native English speakers and might soon spread its wings in the attack chain. Microsoft 365 Defender Threat Intelligence Team says that the attack is being launched through BazaCall, where hackers email victims mentioning about an emergency and urging vict

Malware 131
article thumbnail

GhostEmperor Operation Employs Unknown Malware To Target High-profile Organizations

Heimadal Security

A new report shows that in Q2, 2021 the threat environment experienced major growth in cyberattacks against Microsoft Exchange servers. Last week, Kaspersky security specialists disclosed in Kaspersky’s APT Trends Q2 2021 report the specifics of a unique, long-standing Advanced Persistent Threat (APT) campaign dubbed GhostEmperor. According to the report, the Chinese-speaking APT GhostEmperor took advantage of […].

Malware 130
article thumbnail

Introducing our new CISO Advisor, Pam Lindemeon

Cisco Security

Pam Lindemeon. I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam joins us with 25 years experience in the IT industry, with her most recent role being Deputy Chief Information Security Officer at Anthem, Inc. At Anthem Pam was considered a bold and strategic thinker who envisioned and delivered a world class Enterprise Information Security strategy, including leading the Steering Committee with cross functional business and technology membership.

CISO 125
article thumbnail

New Phishing Attack Uses a Compromised SharePoint Website as a Lure 

Heimadal Security

Office 365 users and admins should be on the lookout for a phishing email that has spoofed sender addresses as this is part of a new phishing attack. As explained in our glossary spoofing is an attempt of an unauthorized person to gain access to a specific information system by impersonating an authorized user. When […]. The post New Phishing Attack Uses a Compromised SharePoint Website as a Lure appeared first on Heimdal Security Blog.

Phishing 126
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Microsoft halts Windows 365 trials after running out of servers

Bleeping Computer

Microsoft has suspended free trials of their newly launched Windows 365 Cloud PC service after running out of available servers. [.].

145
145
article thumbnail

Is Your VPN Tracking (and Leaking) User Activity?

Security Boulevard

The VPN industry touts all sorts of privacy protocols and encryption methods that purport to protect users. While this is, undoubtedly, important information, and is a decent way to compare and contrast different VPN services, it isn’t the full story when it comes to your privacy. An often-overlooked issue is the use of trackers by. The post Is Your VPN Tracking (and Leaking) User Activity?

VPN 123
article thumbnail

Italian Vaccine Registration System Possibly Hit with Ransomware

Heimadal Security

Residents of Lazio, one of Italy’s largest regions, are currently blocked from booking new vaccination appointments due to a vaccination registration system breach, suspected to be a ransomware attack. Lazio President Nicola Zingaretti revealed in a Facebook post that residents of the area (including Rome) won’t be able to book new appointments for several days. […].

article thumbnail

Back-to-Basics: Keep Software Patched

PCI perspectives

As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses.

Software 119
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.