Tue.Jan 17, 2023

article thumbnail

The FBI Identified a Tor User

Schneier on Security

No details , though: According to the complaint against him, Al-Azhari allegedly visited a dark web site that hosts “unofficial propaganda and photographs related to ISIS” multiple times on May 14, 2019. In virtue of being a dark web site—­that is, one hosted on the Tor anonymity network—­it should have been difficult for the site owner’s or a third party to determine the real IP address of any of the site’s visitors.

article thumbnail

Thinking of Hiring or Running a Booter Service? Think Again.

Krebs on Security

Most people who operate DDoS-for-hire businesses attempt to hide their true identities and location. Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law. But until recently, their biggest concern wasn’t avoiding capture or shutdown by the feds: It was minimizing harassment from unhappy customers or victims, and insulating themselves ag

DDOS 297
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: DigiCert unveils ‘Trust Lifecyle Manager’ to centralize control of digital certificates

The Last Watchdog

To get network protection where it needs to be, legacy cybersecurity vendors have begun reconstituting traditional security toolsets. The overarching goal is to try to derive a superset of very dynamic, much more tightly integrated security platforms that we’ll very much need, going forward. Related: The rise of security platforms. This development has gained quite a bit of steam over the past couple of years with established vendors of vulnerability management (VM,) endpoint detection and respo

article thumbnail

SimSpace CEO brings dogfight mentality to terra firma for IT cybersecurity training

Tech Republic Security

William “Hutch” Hutchison, founder and CEO of SimSpace, speaks with Karl Greenberg about the virtues of cyber ranges in training IT teams, and SimSpace’s own specialty: Digital-twin based ranges that the firm provides to NATO governments worldwide, including security teams in Ukraine. The post SimSpace CEO brings dogfight mentality to terra firma for IT cybersecurity training appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner

Bleeping Computer

Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google search results. [.].

article thumbnail

GitHub Rebuffs Breach With Swift Action, Rotating Credentials

Security Boulevard

The holidays were anything but happy over at Slack, which saw threat actors access its externally hosted GitHub repositories. The miscreants apparently used a “limited” number of stolen Slack employee tokens. And while they breached some of the platform’s private code repositories, the primary codebase—as well as customer data—weren’t affected. “On December 29, 2022, we.

LifeWorks

More Trending

article thumbnail

Cybersecurity: It’s More Than Just Technology – The Human Element Matters Too

Security Boulevard

Many discussions about the human element in cybersecurity center around human fallibility and error. From misconfigurations to selecting weak passwords and getting duped by phishing emails, the mistakes people make play a visible role in cybersecurity incidents. It’s important not to forget though that companies depend largely on human skills and expertise help to thwart cyberattacks.

article thumbnail

“Payzero” Scams and The Evolution of Asset Theft in Web3

Trend Micro

In this entry, we discuss a Web3 fraud scenario where scammers target potential victims via fake smart contracts, and then take over their digital assets, such as NFT tokens, without paying. We named this scam “Payzero”.

Scams 128
article thumbnail

Top 10 Venmo scams – and how to stay safe

We Live Security

Don’t be the next victim – here's what to know about some of the most common tricks that scammers use on the payment app. The post Top 10 Venmo scams – and how to stay safe appeared first on WeLiveSecurity.

Scams 127
article thumbnail

How to say your webcam on laptop or smartphone has been hacked

CyberSecurity Insiders

Most of us who have been gaining knowledge about the current cybersecurity landscape are aware that Facebook founder Mark Zuckerberg covers his laptop with a tape to avoid any prying eyes tracking him down through the webcam. It is learnt that the owner of Meta also keeps the front camera of his iPhone covered with a cover to keep his private life away from snooping eyes.

Hacking 124
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Where is Your Risk? Vulnerabilities in Open Source Software

Security Boulevard

The first post of this series on the software-related risks organizations are facing looked at vulnerabilities introduced in development. In this post we look at the risks of open source vulnerabilities. Organizations are increasingly dependent on third-party software, including open source code, but current tools provide limited visibility and require a lot of manual work.

Software 121
article thumbnail

Microsoft Patches 4 SSRF Flaws in Separate Azure Cloud Services

Dark Reading

Two of the vulnerabilities — in Azure Functions and Azure Digital Twins — required no account authentication for an attacker to exploit them.

article thumbnail

Importance of having a Threat Intelligence Platform

CyberSecurity Insiders

First, a Threat Intelligence Platform (TIP) is nothing but a converged form of information aggregating platform that helps an organization gain insights on the latest attack campaigns and treats developing in the current cyber threat landscape. It helps organizations in knowing when their IT assets will be targeted by attacks and helps them mitigate the risks in advance.

article thumbnail

Your Guide on How Ransomware Spreads in Company Networks & on the Internet

Heimadal Security

There is no doubt that cybercriminals are constantly looking for new ways to hold your data hostage. As a result, ransomware has emerged as one of the most serious cybersecurity threats to businesses in recent years. Because it’s so dangerous, understanding how ransomware spreads it’s the first step to preventing it. In this article, we’ll discuss how […].

Internet 119
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Why Businesses Need to Think Like Hackers This Year

Dark Reading

Security professionals must update their skill sets and be proactive to stay ahead of cybercriminals. It's time to learn to think and act like an attacker to cope with the cyber "new normal.

118
118
article thumbnail

10 Cybersecurity Budget Questions for 2023

Security Boulevard

10 critical questions you need answered to optimize your cybersecurity budget in 2023. Read More. The post 10 Cybersecurity Budget Questions for 2023 appeared first on Axio. The post 10 Cybersecurity Budget Questions for 2023 appeared first on Security Boulevard.

article thumbnail

Nissan North America data breach caused by vendor-exposed database

Bleeping Computer

Nissan North America has begun sending data breach notifications informing customers of a breach at a third-party service provider that exposed customer information. [.].

article thumbnail

Mitigating the North Korean Cybersecurity Threat

Security Boulevard

Cybersecurity firm Kaspersky recently published an analysis that detailed how a North Korean threat actor, which it called the BlueNoroff group, is stealing cryptocurrency by bypassing the “Mark of the Web” flag security feature within the Windows operating system. Kaspersky’s advisory is only the latest in a string of cybersecurity research pointing to North Korean.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Git patches two critical remote code execution security flaws

Bleeping Computer

Git has patched two critical severity security vulnerabilities that could allow attackers to execute arbitrary code after successfully exploiting heap-based buffer overflow weaknesses. [.].

108
108
article thumbnail

Finding hard-coded secrets before you suffer a breach

Security Boulevard

Your organization could be at risk if you’re not handling hard-coded secrets properly. The Synopsys AST portfolio has you covered at every stage of the SDLC. The post Finding hard-coded secrets before you suffer a breach appeared first on Security Boulevard.

Risk 111
article thumbnail

CIA’s Hive Attack Kit Has Been Pirated by Hackers

Heimadal Security

A version of the Hive cyberattack kit created by the Central Intelligence Agency (CIA) was spotted in the wild. The pirated malicious code acts as spyware, secretly exfiltrating data from victims. The variant was nicknamed xdr33 after its digital certification code, CN=xdr33. The Hive variant – unrelated to the Hive ransomware group – was detected […].

Spyware 108
article thumbnail

CISA Warns of Flaws in Siemens, GE Digital, and Contec Industrial Control Systems

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published four Industrial Control Systems (ICS) advisories, calling out several security flaws affecting products from Siemens, GE Digital, and Contec. The most critical of the issues have been identified in Siemens SINEC INS that could lead to remote code execution via a path traversal flaw (CVE-2022-45092, CVSS score: 9.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Proof-of-Concept Exploit Code to be Released for Critical Zoho RCE Bug

Heimadal Security

Later this week, proof-of-concept exploit code will be made available for a serious vulnerability in multiple VMware products that permits remote code execution (RCE) without authentication. This pre-auth RCE security hole, identified as CVE-2022-47966, is brought on by the usage of the insecure and out-of-date third-party dependency Apache Santuario.

article thumbnail

Over 4,000 Sophos Firewall devices vulnerable to RCE attacks

Bleeping Computer

Over 4,000 Sophos Firewall devices exposed to Internet access are vulnerable to attacks targeting a critical remote code execution (RCE) vulnerability. [.].

Firewall 103
article thumbnail

Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware

The Hacker News

New research has found that it is possible for threat actors to abuse a legitimate feature in GitHub Codespaces to deliver malware to victim systems. GitHub Codespaces is a cloud-based configurable development environment that allows users to debug, maintain, and commit changes to a given codebase from a web browser or via an integration in Visual Studio Code.

Malware 102
article thumbnail

How to abuse GitHub Codespaces to deliver malicious content

Security Affairs

Researchers demonstrated how to abuse a feature in GitHub Codespaces to deliver malware to victim systems. Trend Micro researchers reported that it is possible to abuse a legitimate feature in the development environment GitHub Codespaces to deliver malware to victim systems. Users can customize their project for GitHub Codespaces by committing configuration files to their repository, which creates a repeatable codespace configuration for all users of your project.

Malware 98
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Azure Services Flaws Could've Exposed Cloud Resources to Unauthorized Access

The Hacker News

Four different Microsoft Azure services have been found vulnerable to server-side request forgery (SSRF) attacks that could be exploited to gain unauthorized access to cloud resources.

101
101
article thumbnail

Fortinet observed three rogue PyPI packages spreading malware

Security Affairs

Researchers discovered three malicious packages that have been uploaded to the Python Package Index (PyPI) repository by Lolip0p group. FortiGuard Labs researchers discovered three malicious PyPI packages (called ‘colorslib’, ‘httpslib’, and “libhttps”) on the PyPI repository that were uploaded by the same actor, Lolip0p. The packages were discovered on January 10, 2023, the packages “colorslib” and “httpslib” were published on January 7, 2023, while “libhttps” was published on January 12, 2023.

Malware 98
article thumbnail

Zoho ManageEngine PoC Exploit to be Released Soon - Patch Before It's Too Late!

The Hacker News

Users of Zoho ManageEngine are being urged to patch their instances against a critical security vulnerability ahead of the release of a proof-of-concept (PoC) exploit code. The issue in question is CVE-2022-47966, an unauthenticated remote code execution vulnerability affecting several products due to the use of an outdated third-party dependency, Apache Santuario.

100
100
article thumbnail

1,000 ships impacted by a ransomware attack on maritime software supplier DNV

Security Affairs

A ransomware attack against the maritime software supplier DNV impacted approximately 1,000 vessels. About 1,000 vessels have been impacted by a ransomware attack against DNV , one of the major maritime software suppliers. . DNV GL provides solutions and services throughout the life cycle of any vessel, from design and engineering to risk assessment and ship management.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!