Wed.Aug 03, 2022

article thumbnail

Sending Spammers to Password Purgatory with Microsoft Power Automate and Cloudflare Workers KV

Troy Hunt

How best to punish spammers? I give this topic a lot of thought because I spend a lot of time sifting through the endless rubbish they send me. And that's when it dawned on me: the punishment should fit the crime - robbing me of my time - which means that I, in turn, need to rob them of their time. With the smallest possible overhead on my time, of course.

Passwords 364
article thumbnail

Drone Deliveries into Prisons

Schneier on Security

Seems it’s now common to sneak contraband into prisons with a drone.

324
324
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers steal almost $200 million from crypto firm Nomad

Tech Republic Security

The theft of $190 million of cryptocurrencies owned by Nomad users highlights the challenges involved in securing digital assets. The post Hackers steal almost $200 million from crypto firm Nomad appeared first on TechRepublic.

article thumbnail

Google fixed Critical Remote Code Execution flaw in Android

Security Affairs

Google addressed a critical vulnerability in Android OS, tracked as CVE-2022-20345, that can be exploited to achieve remote code execution over Bluetooth. Google has fixed a critical vulnerability, tracked as CVE-2022-20345, that affects the Android System component. The IT giant has fixed the flaw with the release of Android 12 and 12L updates. Google did not disclose additional details about the vulnerability. “The most severe vulnerability in this section could lead to remote code execu

Media 134
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to configure Dolibarr

Tech Republic Security

Jack Wallen takes you through the customization of the Dolibarr ERP platform, so your business can make use of this powerful solution. The post How to configure Dolibarr appeared first on TechRepublic.

Software 159
article thumbnail

Woody RAT: A new feature-rich malware spotted in the wild

Malwarebytes

This blog post was authored by Ankur Saini and Hossein Jazi. The Malwarebytes Threat Intelligence team has identified a new Remote Access Trojan we are calling Woody Rat that has been in the wild for at least one year. This advanced custom Rat is mainly the work of a threat actor that targets Russian entities by using lures in archive file format and more recently Office documents leveraging the Follina vulnerability.

Malware 134

LifeWorks

More Trending

article thumbnail

Salt Security Survey Shows Surge in API Attacks

Security Boulevard

Salt Security today published a quarterly report that found malicious application programming interface (API) traffic now accounts for 2.1% of all API traffic seen by its customers. On average, those organizations were hit by 26.46 million malicious API calls for the month of June 2022, a more than 100% increase compared to the 12.22 million. The post Salt Security Survey Shows Surge in API Attacks appeared first on Security Boulevard.

article thumbnail

Consumers benefit from virtual experiences but are concerned about tech fatigue and security

Tech Republic Security

Deloitte’s 2022 Connectivity and Mobile Trends Survey finds people are fine-tuning the balance between their virtual and physical activities. The post Consumers benefit from virtual experiences but are concerned about tech fatigue and security appeared first on TechRepublic.

Mobile 148
article thumbnail

Post-quantum cryptography – new algorithm “gone in 60 minutes”

Naked Security

And THIS is why you don't knit your own home-made encryption algorithms and hope no one looks at them.

article thumbnail

Pulling security to the left: How to think about security before writing code

Tech Republic Security

Involving everyone in security, and pushing crucial conversations to the left, will not only better protect your organization but also make the process of writing secure code easier. The post Pulling security to the left: How to think about security before writing code appeared first on TechRepublic.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Manjusaka, a new attack tool similar to Sliver and Cobalt Strike

Security Affairs

Researchers spotted a Chinese threat actors using a new offensive framework called Manjusaka which is similar to Cobalt Strike. Talos researchers observed a Chinese threat actor using a new offensive framework called Manjusaka (which can be translated to “cow flower” from the Simplified Chinese writing) that is similar to Sliver and Cobalt Strike tools.

Malware 125
article thumbnail

35,000 code repos not hacked—but clones flood GitHub to serve malware

Bleeping Computer

Thousands of GitHub repositories were forked (cloned) and altered to include malware, a software engineer discovered. [.].

Malware 124
article thumbnail

Power semiconductor component manufacturer Semikron suffered a ransomware attack

Security Affairs

Semikron, a German-based independent manufacturer of power semiconductor components, suffered a ransomware cyberattck. Semikron is a German-based independent manufacturer of power semiconductor components, it employs more than 3,000 people in 24 subsidiaries worldwide, with production sites in Germany, Brazil, China, France, India, Italy, Slovakia and the USA.

article thumbnail

Critical RCE Bug in DrayTek Routers Opens SMBs to Zero-Click Attacks

Dark Reading

SMBs should patch CVE-2022-32548 now to avoid a host of horrors, including complete network compromise, ransomware, state-sponsored attacks, and more.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Aviation Safety and Cybersecurity: Learning from Incidents

The State of Security

The aviation safety sector is the study and practice of managing aviation risks. It is a solid concentration of regulations, legal documents, investigations of accidents and near-miss aviation incidents. On top of them lie lessons learned and shared knowledge; reports, facts and stats forming a cognitive super vitamin, that the aviation community uses to keep […]… Read More.

article thumbnail

Microsoft accounts targeted with new MFA-bypassing phishing kit

Bleeping Computer

A new large-scale phishing campaign targeting credentials for Microsoft email services use a custom proxy-based phishing kit to bypass multi-factor authentication. [.].

Phishing 119
article thumbnail

Cyber threat to VMware customers

CyberSecurity Insiders

Virtualization giant Vmware has issued an official cyber threat warning to all its customers about a vulnerability that can allow hackers to bypass authentication and take over the entire network and user interface. Thus the company is urging customers to keep their software updated and discouraged those who depend heavily on various workarounds. Revealing the severity of other 9 additional vulnerabilities, the tech giant that offers software services to many enterprise and government infrastruc

article thumbnail

Cobalt Strike Inspires Next-generation Crimeware

eSecurity Planet

Cobalt Strike is a legitimate vulnerability scanning and pentesting tool that has long been a favorite tool of hackers , and it’s even been adapted by hackers for Linux environments. And now it’s inspiring imitators. Cisco Talos researchers have disclosed a new toolset used in the wild by threat actors as an alternative to Cobalt Strike or Silver.

Passwords 117
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

How to protect yourself and your kids against device theft

Malwarebytes

In no time at all, kids will be going back to school or starting college. And while gearing up for this, it’s very important to be aware of the threat from device loss in the school environment. Maybe you are away at university for the first time and have a new place to live, or maybe your kids have devices they take into school. Whatever the reason, if you lose a device or it gets stolen, the end result can be quite serious—from loss of sensitive data, wasted time and misplaced work, to blackma

article thumbnail

Hackers Find Alternatives to Microsoft Office Macros

eSecurity Planet

Hackers have been exploiting macros in Microsoft Office products for years, but now their tactics are changing as Microsoft has begun blocking macros by default. The typical attack scenario involves phishing via email attachments, such as Word, Excel or PowerPoint documents containing malicious macros infected with malware. Such documents are common in enterprises, and the Microsoft Office suite is widely used.

Phishing 117
article thumbnail

Employee of T-Mobile hacks internal systems to unlock and unblock phones

CyberSecurity Insiders

A T-Mobile employee, who has been now ousted from the post, was found guilty of indulging in a $25 million scam where he hacked into the internal systems of mobile carrier to unlock and unblock cell phones on network. Argishti Khudaverdyan, a 41-year-old from California, had the privilege of working for T-Mobile as a retail store owner. He indulged in false practices of unlocking devices without the consent from cellular networks and ran a fraudulent scheme between 2014-2019, making millions fro

Mobile 115
article thumbnail

School Kid Uploads Ransomware Scripts to PyPI Repository as 'Fun' Project

Dark Reading

The malware packages had names that were common typosquats of a legitimate widely used Python library. One was downloaded hundreds of times.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cyber Attack related 7 news headlines trending on Google

CyberSecurity Insiders

1.) First news is about a cyber attack on two energy companies operating in Luxembourg. According to the web, two energy firms Creos and Enovos, both business units of Encevo Group, were targeted by a ransomware attack on the night of July 22 this year. However, electricity and gas supply weren’t disrupted by the digital disruption. The ransomware group that targeted Encevo remains a mystery, as the European energy operator is not willing to disclose before the completion of a security investiga

article thumbnail

5 Ways Chess Can Inspire Strategic Cybersecurity Thinking

Dark Reading

Rising interest in chess may feed the next generation of cybersecurity experts.

article thumbnail

China to indulge in data security assessment for cross border data transfers

CyberSecurity Insiders

The Cyberspace Administration of China has implemented security assessments for all data transfers that are taking place across borders. That means, any data that is being transmitted to foreign servers, irrespective of the reason, will be analyzed and then permitted to other borders. The measures were outlined by the CAC regarding the China’s Personal Information Protection Law (PIPL) and Cybersecurity Law and Data Security Law.

article thumbnail

Update now! VMWare patches critical vulnerabilities in several products

Malwarebytes

In a new critical security advisory, VMSA-2022-0021 , VMWare describes multiple vulnerabilities in several of its products, one of which has a CVSS score of 9.8. Exploiting these vulnerabilities would enable a threat actor with network access to bypass authentication and execute code remotely. Vulnerabilities. VMWare patched several other vulnerabilities.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Busting the Myths of Hardware Based Security

Security Affairs

Many experts often overlook hardware based security and its vital importance in establishing a secure workspace. When it comes to cybersecurity, everyone likes to talk about software and the dangers that it poses. However, people often overlook hardware-based security and its vital importance in establishing a secure workspace. This is attributed to a general lack of knowledge when it comes to hardware security and how it works.

Media 112
article thumbnail

NetStandard attack should make Managed Service Providers sit up and take notice

Malwarebytes

Managed Service Providers (MSPs), organizations that allow companies to outsource a variety of IT and security functions, are a growing market. Because they are a potential gateway to lots of company networks they make a very attractive target for cybercriminals. In a recent threat advisory Huntress noticed that an increasing number of Initial Access Brokers (IAB) are focusing on MSPs.

article thumbnail

ReliaQuest and Digital Shadows – The Next Stage of the Journey

Digital Shadows

We are pleased to announce that the acquisition of Digital Shadows by ReliaQuest, announced onlytwo months ago, has now closed. The post ReliaQuest and Digital Shadows – The Next Stage of the Journey first appeared on Digital Shadows.

article thumbnail

NYDFS Proposes New Changes to Its Cybersecurity Rules

Digital Guardian

Recently proposed amendments to the NYDFS Cybersecurity Regulation would demand new technological enhancements, audit and risk assessment requirements of companies.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!