Wed.Sep 07, 2022

article thumbnail

The LockBit Ransomware Gang Is Surprisingly Professional

Schneier on Security

This article makes LockBit sound like a legitimate organization: The DDoS attack last weekend that put a temporary stop to leaking Entrust data was seen as an opportunity to explore the triple extortion tactic to apply more pressure on victims to pay a ransom. LockBitSupp said that the ransomware operator is now looking to add DDoS as an extortion tactic on top of encrypting data and leaking it. “I am looking for dudosers [DDoSers] in the team, most likely now we will attack targets and pr

article thumbnail

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

The Last Watchdog

Finally, Uncle Sam is compelling companies to take cybersecurity seriously. Related: How the Middle East paved the way to CMMC. Cybersecurity Maturity Model Certification version 2.0 could take effect as early as May 2023 mandating detailed audits of the cybersecurity practices of any company that hopes to do business with the Department of Defense.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Benefits of edge computing

Tech Republic Security

Learn more about how edge computing can reduce latency, boost performance and improve data security among other benefits. The post Benefits of edge computing appeared first on TechRepublic.

Internet 211
article thumbnail

TikTok Hack: 2B Records Leak — but ByteDance Denies

Security Boulevard

TikTok was hacked, with over two billion records stolen. Or so says notorious leak group BlueHornet (a/k/a AgainstTheWest, @AggressiveCurl). The post TikTok Hack: 2B Records Leak — but ByteDance Denies appeared first on Security Boulevard.

Hacking 140
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

iPhone 14 cheat sheet: Everything to know about Apple’s 2022 flagship phones

Tech Republic Security

Learn all about the key features, specs, pricing, availability and other details about Apple's 2022 release of iPhone 14 and iPhone 14 Pro. The post iPhone 14 cheat sheet: Everything to know about Apple’s 2022 flagship phones appeared first on TechRepublic.

Mobile 148
article thumbnail

Experts spotted a new stealthy Linux malware dubbed Shikitega

Security Affairs

A new Linux malware dubbed Shikitega leverages a multi-stage infection chain to target endpoints and IoT devices. Researchers from AT&T Alien Labs discovered a new piece of stealthy Linux malware, dubbed Shikitega, that targets endpoints and IoT devices. The malware outstands for its multistage infection chain, threat actors use it to can gain full control of the system and carry out other malicious activities, including cryptocurrency mining.

Malware 139

LifeWorks

More Trending

article thumbnail

API Security for the Modern Enterprise

IT Security Guru

In today’s cloud-based enterprise, APIs are a critical part of every business. They’re used extensively to foster more rapid application development, and without proper security measures, sensitive data can easily get into the wrong hands. As modern organizations become more dependent on APIs to achieve their goals, their API security strategy must be up-to-date and in line with recent developments in technology.

DDOS 131
article thumbnail

QNAP tells NAS users to “take immediate action” after new wave of DeadBolt ransomware attacks

Graham Cluley

Owners of QNAP NAS drives have been advised to "take immediate action" in the wake of a new wave of DeadBolt ransomware attacks.

article thumbnail

The Los Angeles Unified School District hit by a ransomware attack

Security Affairs

One of the US largest School districts, the Los Angeles Unified School District, suffered a ransomware attack during the weekend. The Los Angeles Unified School District is one of the largest school distinct in the US, it was hit by a ransomware attack during the Labor Day weekend. The security breach took place a few days ahead of the scheduled opening that was planned for Tuesday morning which will happen regularly. “Los Angeles Unified detected unusual activity in its Information Techno

article thumbnail

DEADBOLT ransomware rears its head again, attacks QNAP devices

Naked Security

NAS devices make it easy for anyone to add high-capacity file servers to their network. Guess why cybercrooks love NAS devices too.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy

The Last Watchdog

The internet has drawn comparisons to the Wild West, making ransomware the digital incarnation of a hold-up. Related: It’s all about ‘ attack surface management ‘ However, today’s perpetrator isn’t standing in front of you brandishing a weapon. They could be on the other side of the globe, part of a cybercrime regime that will never be discovered, much less brought to justice.

article thumbnail

RDP on the radar: An up?close view of evolving remote access threats

We Live Security

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol. The post RDP on the radar: An up‑close view of evolving remote access threats appeared first on WeLiveSecurity.

article thumbnail

Google Vulnerability Reward Program Focuses on Open Source Software 

Security Boulevard

Google’s bug bounty program will be expanded to include a special open source section called the Open Source Software Vulnerability Rewards Program (OSS VRP), the company announced on its security blog. Through this program, security researchers will thus receive a reward for finding security vulnerabilities in open source projects maintained by Google as well as.

Software 119
article thumbnail

Enhancing Cloud Security by Reducing Container Images Through Distroless Techniques

Trend Micro

We analyzed the Distroless technique for reducing the size of container images and explored its capabilities to address security concerns. We provide an alternative approach to Distroless that reduces the attack surface for malicious actors targeting cloud-native applications while optimizing cloud resources.

119
119
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’

Security Boulevard

Finally, Uncle Sam is compelling companies to take cybersecurity seriously. Related: How the Middle East paved the way to CMMC. Cybersecurity Maturity Model Certification version 2.0 could take effect as early as May 2023 mandating detailed audits of the cybersecurity … (more…). The post SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’ appeared first on Security Boulevard.

article thumbnail

200,000 North Face accounts hacked in credential stuffing attack

Bleeping Computer

Outdoor apparel brand 'The North Face' was targeted in a large-scale credential stuffing attack that has resulted in the hacking of 194,905 accounts on the thenorthface.com website. [.].

article thumbnail

Using Backups to Turn the Tables on Ransomware

Security Boulevard

When an enterprise gets hit with ransomware, the fundamental question is whether the cost of downtime is greater than the cost of paying the ransom. Once the ramifications of frozen data—financial and otherwise—lost revenue and productivity and the intangible cost of a damaged reputation are added up, it’s no wonder many organizations decide to just.

Backups 119
article thumbnail

4 strategy game-changers for finding cybersecurity talent

CSO Magazine

Dave Stirling, CISO of Zions Bancorporation, isn’t waiting for a shakeup in the talent pool or some big shift in the job market to solve the cybersecurity skills gap. Instead, he’s making his own luck. How? By changing up his own staffing strategy, “by trying different things and seeing what sticks.” That approach has Stirling recruiting candidates from the bank’s IT and operations staff, working with local colleges, investing more in training and rethinking how he posts open jobs.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

California Regulators Hit Sephora with $1.2M Fine

Security Boulevard

Regulators have roared back from a pandemic-induced stupor that seemingly tamped down some of the most aggressive actions at their disposal—as Sephora recently became painfully aware. The cosmetics retailer is set to pay $1.2 million in penalties for running afoul of the California Consumer Privacy Act (CCPA). The CCPA has been something of a sleeping.

Retail 118
article thumbnail

BrandPost: Calling Women to Join the Cybersecurity Field

CSO Magazine

As the cybersecurity skills gap persists, it is imperative to create access to training, career pathways, and opportunities in order to encourage more people to pursue careers in cybersecurity. By providing access to and possibilities for cyber jobs for everyone, including women, students, veterans, and others, Fortinet is working to encourage greater representation within cybersecurity.

article thumbnail

Moobot botnet is back and targets vulnerable D-Link routers

Security Affairs

The Moobot botnet is behind a new wave of attacks that started in early August and that target vulnerable D-Link routers. Palo Alto Network’s Unit 42 researchers reported a new wave of attacks launched by the Moobot botnet that target vulnerable D-Link routers. The Mirai -based Moobot botnet was first documented by Palo Alto Unit 42 researchers in February 2021, in November 2021, it started exploiting a critical command injection flaw ( CVE-2021-36260 ) in the webserver of several Hikvision prod

DDOS 114
article thumbnail

Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages

Bleeping Computer

Someone is flooding Cobalt Strike servers operated by former members of the Conti ransomware gang with anti-Russian messages to disrupt their activity. [.].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

APT Spotlight Series: APT41

Digital Shadows

Stealthy, sustained, and frequently state-backed, advanced persistent threats (APTs for short) are often the leading antagonists of the cyber threat. The post APT Spotlight Series: APT41 first appeared on Digital Shadows.

article thumbnail

Cyberattack Launched upon InterContinental Hotels Group

Heimadal Security

InterContinental Hotels Group PLC (also known as IHG Hotels & Resorts) announced on September 5, 2022, that its network has been breached. The attack disrupted the hospitality company’s systems like booking and other applications. IHG announced the cyberattack to the authorities and is dealing with it helped by a group of external experts. The aim […].

article thumbnail

Password Reuse is Putting MSP’s at Risk

Security Boulevard

Password hygiene is a huge priority for Managed Service Providers Every organization is at risk for cyber attack, but MSPs have emerged as a top target. This is because threat actors can use a vulnerable MSP as an initial access vector to multiple victim networks, with globally cascading effects. In May of 2022, CISA, the FBI, and a group of. Read More.

Passwords 105
article thumbnail

How to keep cloud storage secure and safe

CyberSecurity Insiders

As the adoption of cloud storage is growing, it is becoming easy to carry documents, passwords, movies, images, music, etc. on one go. Though it is convenient for us, data upload to a third-party platform might fetch some security risks that are as follows. First, we never know what is happening behind the screens in the server farms, as anyone working in or for the data center can easily have access to data.

Passwords 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Trade Secrets: What Your Company Needs to Know

Digital Guardian

What are trade secrets and what makes them so important? As an organization, when you identify a piece of information as a trade secret you should take steps to protect it and keep it from being disclosed.

105
105
article thumbnail

LAUSD, One of the Largest School Districts in the U.S., Suffers Ransomware Attack

Heimadal Security

Los Angeles Unified School District (LAUSD), the largest public school system in California and the 2nd largest public school district in the United States, revealed that last weekend it had been the victim of a ransomware incident that impacted its Information Technology (IT) systems. More on LAUSD The LAUSD had 664,774 students enrolled for the […].

article thumbnail

Moobot botnet is coming for your unpatched D-Link router

Bleeping Computer

The Mirai malware botnet variant known as 'MooBot' has re-emerged in a new attack wave that started early last month, targeting vulnerable D-Link routers with a mix of old and new exploits. [.].

Malware 105
article thumbnail

Some Members of Conti Group Targeting Ukraine in Financially Motivated Attacks

The Hacker News

Former members of the Conti cybercrime cartel have been implicated in five different campaigns targeting Ukraine from April to August 2022. The findings, which come from Google's Threat Analysis Group (TAG), builds upon a prior report published in July 2022, detailing the continued cyber activity aimed at the Eastern European nation amid the ongoing Russo-Ukrainian war.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!