Tue.Oct 04, 2022

article thumbnail

NSA Employee Charged with Espionage

Schneier on Security

An ex-NSA employee has been charged with trying to sell classified data to the Russians (but instead actually talking to an undercover FBI agent). It’s a weird story, and the FBI affidavit raises more questions than it answers. The employee only worked for the NSA for three weeks—which is weird in itself. I can’t figure out how he linked up with the undercover FBI agent.

article thumbnail

How ransomware gangs operate like legitimate businesses

Tech Republic Security

Today’s ransomware groups act like regular businesses with PR and advertising, escrow services and even customer support, says Cybersixgill. The post How ransomware gangs operate like legitimate businesses appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

8 strange ways employees can (accidently) expose data

CSO Magazine

Employees are often warned about the data exposure risks associated with the likes of phishing emails, credential theft, and using weak passwords. However, they can risk leaking or exposing sensitive information about themselves, the work they do, or their organization without even realizing. This risk frequently goes unexplored in cybersecurity awareness training, leaving employees oblivious to the risks they can pose to the security of data which, if exposed, could be exploited both directly a

Risk 143
article thumbnail

Top 5 trends to watch in cloud security

Tech Republic Security

Cloud security solutions continue to emerge as threats to cloud resources evolve. However, what are the common trends to look out for in cloud security in the coming years? Let's find out. The post Top 5 trends to watch in cloud security appeared first on TechRepublic.

152
152
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Hackers stole data from US defense org using Impacket, CovalentStealer

Bleeping Computer

The U.S. Government today released an alert about state-backed hackers using a custom CovalentStealer malware and the Impacket framework to steal sensitive data from a U.S. organization in the Defense Industrial Base (DIB) sector. [.].

article thumbnail

Keep your business totally secure with this decentralized VPN

Tech Republic Security

The pocket-sized Deeper Connect Pico can help you tap into a worldwide security network. The post Keep your business totally secure with this decentralized VPN appeared first on TechRepublic.

VPN 147

More Trending

article thumbnail

How Oso’s security-as-code approach to authorization might change how you think about security

Tech Republic Security

Most developers aren’t particularly good at building authorization into their applications, but would they trust a third-party provider like Oso? The post How Oso’s security-as-code approach to authorization might change how you think about security appeared first on TechRepublic.

article thumbnail

Fake Microsoft Exchange ProxyNotShell exploits for sale on GitHub

Bleeping Computer

Scammers are impersonating security researchers to sell fake proof-of-concept ProxyNotShell exploits for newly discovered Microsoft Exchange zero-day vulnerabilities. [.].

134
134
article thumbnail

Gartner explains why SBOMs are critical to software supply chain security management

Security Boulevard

With modern software development reliant on third-party sources — and attacks surging on that supply chain — Gartner expects adoption of software bills of material (SBOM) to go from less than 5% now to 60% in 2025. . The post Gartner explains why SBOMs are critical to software supply chain security management appeared first on Security Boulevard.

Software 133
article thumbnail

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords

Thales Cloud Protection & Licensing

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords. divya. Tue, 10/04/2022 - 05:20. Historically, October has always been an important month for the cybersecurity community and a month of major cybersecurity events. So in 2004, the President of the United States designated October as Cybersecurity Awareness Month.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CISA orders federal agencies to catalog their networks, and scan for bugs

The State of Security

You always want to know what is attached to your network. And whether it could be vulnerable or not. Read more in my article on the Tripwire State of Security blog.

134
134
article thumbnail

Aryaka rolls out cloud-based web gateway for SASE-focused WAN offering

CSO Magazine

Aryaka's Secure Web Gateway and Firewall-as-a-Service adds cloud-based security services to its Zero Trust WAN platform, as it moves toward providing SASE capabilities for its users.

Firewall 128
article thumbnail

Weaponizing Open Source Through Job Recruiting

Security Boulevard

Over the last week, troubling new reports have arisen about state-sponsored threat actors leveraging modified open source applications to compromise employees' machines at technology companies, governments, and non-profit organizations. Microsoft , Mandiant , and Ars Technica all covered the technicalities of the attack type, where bad actors pose as recruiters who target specific individuals as their victims.

article thumbnail

Russian retail chain 'DNS' confirms hack after data leaked online

Bleeping Computer

Russian retail chain 'DNS' (Digital Network System) disclosed yesterday that they suffered a data breach that allegedly exposed the personal information of 16 million customers and employees. [.].

Retail 116
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

OpenText Report Identifies Nastiest Malware for 2022

Security Boulevard

OpenText today published a Nastiest Malware of 2022 report that highlighted how ransomware attacks are evolving into triple threats. In addition to encrypting and stealing data, many attackers now include a distributed denial-of-service (DDoS) attack when victims refuse to cave to ransom demands. Specifically, the report identified the Lockbit ransomware gang as the main driver.

Malware 122
article thumbnail

FBI warns of "Pig Butchering" cryptocurrency investment schemes

Bleeping Computer

The Federal Bureau of Investigation (FBI) warns of a rise in 'Pig Butchering' cryptocurrency scams used to steal ever-increasing amounts of crypto from unsuspecting investors. [.].

article thumbnail

The Growing Threat of Ransomware as a Service

Security Boulevard

Ransomware attacks have reportedly declined this year. But don’t start celebrating just yet. “Gang models are evolving,” notes my colleague, Alexandra (Alix) Weaver, Semperis Solutions Architect. “I caution everyone: Do not let your guard down.” Part of the changing trend, Alix says, might be attributed to an increase in the popularity of ransomware as a.

article thumbnail

Hackers are breaching scam sites to hijack crypto transactions

Bleeping Computer

In a perfect example of there being no honor among thieves, a threat actor named 'Water Labbu' is hacking into cryptocurrency scam sites to inject malicious JavaScript that steals funds from the scammer's victims. [.].

Scams 111
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

FAIL: Los Angeles School District Loses 500GB of PII

Security Boulevard

The Los Angeles Unified School District has lost control of a huge cache of sensitive data because its superintendent, Alberto M. Carvalho, refused to pay the ransom. The post FAIL: Los Angeles School District Loses 500GB of PII appeared first on Security Boulevard.

article thumbnail

Kim Kardashian gets caught in a Cyber Investment Fraud

CyberSecurity Insiders

Kim Kardashian, the reality TV star, was slapped with a fine of $1.26 million by the SEC as she failed to disclose the amount she earned for promoting a product related to cryptocurrency. When a celebrity invests in a product, some of their followers blindly follow them and invest in the same brand or product to mimic their favorite star’s likings. Similarly, Ms.

article thumbnail

BrandPost: The Cyberthreat Minute: The Scale and Scope of Worldwide Cybercrime in 60 Seconds

CSO Magazine

By Steve Ginty, Principal Program Manager, Microsoft Defender Threat Intelligence (MDTI) Cybercrime is big and growing bigger. So much so that it can often be difficult to fully understand the impact online attacks have driven over the past decades. To better illustrate the scale and scope of worldwide cybercrime, we've used data from across Microsoft-owned properties and a mix of external sources to create the Cyberthreat Minute , a comprehensive report on malicious activity that is happening w

article thumbnail

Safe Security Adds Cybersecurity ROI Tool to Portfolio

Security Boulevard

Safe Security, Inc. today announced it has added a Return on Security Investment (ROSI) Calculator module to its risk quantification and management platform. Pankaj Goyal, senior vice president for Safe Security, said the ROSI Calculator automatically collects data from cybersecurity tools via application programming interfaces (APIs) to calculate the potential cost of risk to the.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Cheerscrypt Ransomware Strain Attributed to Chinese Hacking Group

Heimadal Security

Researchers attributed Cheerscrypt – a newly found ransomware strain that operates on Linux – to a Chinese cybercriminal group. The group, that launches brief ransomware attacks, is known by the names Emperor Dragonfly or Bronze Starlight (Secureworks) and DEV-0401 (Microsoft). Details About the Hacking Group Sygnia report shows that “Emperor Dragonfly’ (A.K.A.

Hacking 113
article thumbnail

Live support service hacked to spread malware in supply chain attack

Bleeping Computer

The official installer for the Comm100 Live Chat application, a widely deployed SaaS (software-as-a-service) that businesses use for customer communication and website visitors, was trojanized as part of a new supply-chain attack. [.].

Hacking 108
article thumbnail

How a deepfake Mark Ruffalo scammed half a million dollars from a lonely heart

Graham Cluley

A 74-year-old Manga artist received an unsolicited Facebook message from somebody claiming to be Incredible Hulk actor Mark Ruffalo. You can probably guess where this is heading.

Scams 111
article thumbnail

Ferrari Targeted by Ransomware Attack

Heimadal Security

Data from Ferrari’s website was posted on a dark web leak site owned by ransomware group RansomEXX. The hackers claim they have obtained internal documents, datasheets, repair manuals, and other information, amounting to almost 7 GB of data. A screenshot of the stolen data shows a document marked ‘confidential’, and it appears to be a […].

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Trojanized Comm100 Live Chat app installer distributed a JavaScript backdoor

Security Affairs

A threat actor used a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor. Cybersecurity firm CrowdStrike disclosed details of a supply chain attack that involved the use of a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor. Comm100 is a provider of customer service and communication products that serves over 200,000 businesses.

article thumbnail

ProxyNotShell – the New Proxy Hell?

The Hacker News

Nicknamed ProxyNotShell, a new exploit used in the wild takes advantage of the recently published Microsoft Server-Side Request Forgery (SSRF) vulnerability CVE-2022-41040 and a second vulnerability, CVE-2022-41082 that allows Remote Code Execution (RCE) when PowerShell is available to unidentified attackers.

Risk 108
article thumbnail

Microsoft mitigation for new Exchange Server zero-day exploits can be bypassed

CSO Magazine

Attackers are currently exploiting two unpatched vulnerabilities to remotely compromise on-premises Microsoft Exchange servers. Microsoft confirmed the flaws late last week and published mitigation advice until a complete patch can be developed, but according to reports, the proposed mitigation can be easily bypassed. The new vulnerabilities were discovered in early August by a Vietnamese security company called GTSC while performing security monitoring and incident response for a customer whose

107
107
article thumbnail

The API Hacker’s Guide to Payload Injection with Postman

Security Boulevard

Learn how to use Postman to attack APIs with payload injection. The post The API Hacker’s Guide to Payload Injection with Postman appeared first on Dana Epp's Blog. The post The API Hacker’s Guide to Payload Injection with Postman appeared first on Security Boulevard.

Hacking 105
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.