Mon.Oct 31, 2022

article thumbnail

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion

Krebs on Security

A 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon , a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. KrebsOnSecurity has learned that the defendant was busted in March 2022, after fleeing mandatory military service in Ukraine in the weeks following the Russian invasion.

Malware 340
article thumbnail

Apple Only Commits to Patching Latest OS Version

Schneier on Security

People have suspected this for a while, but Apple has made it official. It only commits to fully patching the latest version of its OS, even though it claims to support older versions. From ArsTechnica : In other words, while Apple will provide security-related updates for older versions of its operating systems, only the most recent upgrades will receive updates for every security problem Apple knows about.

317
317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: A roadmap to achieve a better balance of network security and performance

The Last Watchdog

Here’s a frustrating reality about securing an enterprise network: the more closely you inspect network traffic, the more it deteriorates the user experience. Related: Taking a risk-assessment approach to vulnerabilities. Slow down application performance a little, and you’ve got frustrated users. Slow it down a lot, and most likely, whichever knob you just turned gets quickly turned back again—potentially leaving your business exposed.

article thumbnail

APT10: Tracking down LODEINFO 2022, part I

SecureList

Kaspersky has been tracking activities involving the LODEINFO malware family since 2019, looking for new modifications and thoroughly investigating any attacks utilizing those new variants. LODEINFO is sophisticated fileless malware first named in a blogpost from JPCERT/CC in February 2020. The malware was regularly modified and upgraded by the developers to target media, diplomatic, governmental and public sector organizations and think-tanks in Japan.

Malware 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

What do kickboxing and cybersecurity have in common

Cisco Security

When people think of cybersecurity, they think it is all about constant, in-the-moment, reactive execution. That is true in many regards, however, there is more to cybersecurity than that. There is also a strategic side; that progressive, long-term vision to anticipate the unknown, convert fear into motivation, and prepare for future threats. . As the Chief Operations Officer of Sara Assicurazioni, Luigi Vassallo has a philosophy that he lives by to keep his motivation strong.

article thumbnail

APT10: Tracking down LODEINFO 2022, part II

SecureList

In the previous publication ‘ Tracking down LODEINFO 2022, part I ‘, we mentioned that the initial infection methods vary in different attack scenarios and that the LODEINFO shellcode was regularly updated for use with each infection vector. In this article, we discuss improvements made to the LODEINFO backdoor shellcode in 2022. Kaspersky investigated new versions of LODEINFO shellcode, namely v0.5.9, v0.6.2, v0.6.3 and v0.6.5, in March, April and June, respectively.

LifeWorks

More Trending

article thumbnail

Cybersecurity news headlines trending on Google

CyberSecurity Insiders

First news that is trending on the Google search engine is related to a ransomware attack that took place on Germany’s Copper producer ‘Aurubis’. News is out that the world’s second largest producer’s IT systems were hit by a ransomware attack disrupting the digital infrastructure to the core. Perhaps this is supposed to be the first company related to metals and mining that was hit a by a file encrypting malware in the European nation and believably first from the west.

article thumbnail

Actively exploited Windows Mark-of-the-Web zero-day received an unofficial patch

Security Affairs

An unofficial patch for an actively exploited flaw in Microsoft Windows that allows to bypass Mark-of-the-Web (MotW) protections. 0patch released an unofficial patch to address an actively exploited security vulnerability in Microsoft Windows that could allow bypassing Mark-of-the-Web ( MotW ) protections by using files signed with malformed signatures.

Internet 126
article thumbnail

EU Copper Giant Aurubis Hit by Cyberattack

Heimadal Security

IT systems belonging to the German copper producer Aurubis have been forcibly shut down after suffering a cyberattack on October 28th. Aurubis is Europe’s largest copper producer and the second largest in the world, with 6,900 employees worldwide, producing one million tons of copper cathodes yearly. While the extent of the impact is currently being assessed, production has not […].

article thumbnail

Snatch group claims to have hacked military provider HENSOLDT France

Security Affairs

The Snatch ransomware group claims to have hacked HENSOLDT France, a company specializing in military and defense electronics. The Snatch ransomware group claims to have hacked the French company HENSOLDT France. HENSOLDT is a company specializing in military and defense electronics. HENSOLDT France offers a wide range of critical electronics solutions, products and services for the aeronautical, defence, energy and transport sectors, whether for air, naval or land applications, both in France

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

German Student Behind One of the Country’s Biggest Dark Web Markets

Heimadal Security

BKA – Germany’s Federal Criminal Police Office announced the detainment of a 22-year-old student in Bavaria, suspected of operating the ‘Deutschland im Deep Web’ (DiDW), one of the major darknet markets in the country. The platform was taken down in March 2022, with 16,000 registered members, 28,000 posts, and 72 high-volume vendors of illegal products […].

Marketing 121
article thumbnail

Engineering workstation attacks on industrial control systems double: Report

CSO Magazine

Engineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control system breaches in companies surveyed globally this year, doubling from the year earlier, according to research conducted by the SANS Institute and sponsored by Nozomi Networks. While the number of respondents who said they had experienced a breach in their OT/ICS systems during the last 12 months dropped to 10.5% (down from 15% in 2021), one third of all the respon

article thumbnail

FTC issues cybersecurity warning to Chegg

CyberSecurity Insiders

Chegg, the American company that offers textbook rental and homework related online services to school and college students, has been asked to revamp its security practices. Failing which it will be eligible to go through harsh legal practices and hefty financial implications. The Federal Trade Commission found in its investigations that the company was storing sensitive information about millions of its student customers and employees without following a basic security hygiene.

article thumbnail

Chinese Tech: Banned in DC, but not in the States

Security Boulevard

There’s a massive loophole in the federal ban on Chinese technology from sus firms such as Huawei and ZTE: It doesn’t stop states from buying it. The post Chinese Tech: Banned in DC, but not in the States appeared first on Security Boulevard.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Who Is Responsible for Developing a Cybersecurity Culture?

Heimadal Security

Creating a cybersecurity culture starts in the board room. However, this is only half of the answer to the question of who is responsible for developing a cybersecurity culture. I’ll explain why in this article. Cybersecurity Is a Must – Here’s Why I’m a person of numbers, so here are a few statistics that perfectly […]. The post Who Is Responsible for Developing a Cybersecurity Culture?

article thumbnail

VMware warns of the public availability of CVE-2021-39144 exploit code

Security Affairs

VMware warned of the availability of a public exploit for a recently addressed critical remote code execution flaw in NSX Data Center for vSphere (NSX-V). VMware warned of the existence of a public exploit targeting a recently addressed critical remote code execution (RCE) vulnerability, tracked as CVE-2021-39144 (CVSS score of 9.8), in NSX Data Center for vSphere (NSX-V).

Hacking 117
article thumbnail

Five Play Store Droppers Target 200 Banking and Cryptocurrency Wallets Apps

Heimadal Security

Five malicious apps that combined have over 130,000 installations on Android devices have been discovered in Google Play Store. The apps have targeted 231 banking and cryptocurrency wallet apps with the help of trojans such as SharkBot and Vultur. Targeted countries include the U.S., the U.K., Italy, Germany, France, Spain, Poland, Australia, Austria, and the […].

article thumbnail

Google buys AI avatar startup for $100 million

CyberSecurity Insiders

Google has bought a new company that deals with Artificial Intelligence based ‘Alter’ that develops avatars to be posted on various social media platforms and other media. The internet juggernaut bought the company for $100 million and kept the details under wraps. It has now revealed the details to the world and will put more efforts to improve its content online and to battle competition with Chinese brand TikTok.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware.

Malware 112
article thumbnail

Critical ConnectWise Vulnerability Affects Thousands of Internet-Exposed Servers

Hacker Combat

ConnectWise, a company that makes software for IT management, made an announcement on Friday about updates that address a significant vulnerability. According to cybersecurity professionals, this weakness leaves thousands of servers vulnerable to attacks. The ConnectWise Recover backup and disaster recovery software (versions 2.9.7 and older) as well as the R1Soft server backup manager are also vulnerable to the issue, which has been defined as “improper neutralisation of special component

Internet 112
article thumbnail

What You Should Know about the New OpenSSL Vulnerability

Security Boulevard

Find out how to detect which OpenSSL version you’re running and if your organization is exposed to the critical OpenSSL vulnerability - and what to do about it. The post What You Should Know about the New OpenSSL Vulnerability appeared first on Ermetic. The post What You Should Know about the New OpenSSL Vulnerability appeared first on Security Boulevard.

111
111
article thumbnail

Hackers selling access to 576 corporate networks for $4 million

Bleeping Computer

A new report shows that hackers are selling access to 576 corporate networks worldwide for a total cumulative sales price of $4,000,000, fueling attacks on the enterprise. [.].

103
103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Psychotherapy extortion suspect: arrest warrant issued

Naked Security

Wanted! Not only the extortionist who abused the data, but also the CEO who let it happen.

102
102
article thumbnail

GitHub Repojacking Bug Could've Allowed Attackers to Takeover Other Users' Repositories

The Hacker News

Cloud-based repository hosting service GitHub has addressed a high-severity security flaw that could have been exploited to create malicious repositories and mount supply chain attacks.

100
100
article thumbnail

You Need to Update Google Chrome, Windows, and Zoom Right Now

WIRED Threat Level

Plus: Important patches from Apple, VMWare, Cisco, Zimbra, SAP, and Oracle.

Hacking 99
article thumbnail

Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability

The Hacker News

An unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows that makes it possible for files signed with malformed signatures to sneak past Mark-of-the-Web (MotW) protections.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Trick or treat? Stay so cyber?safe it’s scary – not just on Halloween

We Live Security

Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond. The post Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween appeared first on WeLiveSecurity.

Scams 98
article thumbnail

Samsung Galaxy Store Bug Could've Let Hackers Secretly Install Apps on Targeted Devices

The Hacker News

A now-patched security flaw has been disclosed in the Galaxy Store app for Samsung devices that could potentially trigger remote command execution on affected phones. The vulnerability, which affects Galaxy Store version 4.5.32.4, relates to a cross-site scripting (XSS) bug that occurs when handling certain deep links.

99
article thumbnail

IT Security Workforce Gap Widens

Security Boulevard

An ongoing skills gap in the information security space, with an estimated shortage of 3.4 million cybersecurity workers globally, is putting security professionals and organizations under greater pressure than ever before, according to research from (ICS)2. The survey of 11,779 international practitioners and decision-makers revealed 70% felt their organization did not have enough cybersecurity staff.

article thumbnail

Malicious dropper apps on Play Store totaled 30.000+ installations

Security Affairs

ThreatFabric researchers discovered five malicious dropper apps on Google Play Store with more than 130,000 downloads. Researchers at ThreatFabric have discovered five malicious dropper apps on the official Google Play Store. The malicious dropper apps are designed to deliver banking trojans, such as SharkBot and Vultur , that already totaled over 130,000 installations. “Droppers on Google Play went from using AccessibilityService to auto-allow installation from unknown sources to using le

Banking 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!