Sun.Apr 04, 2021

article thumbnail

How to check if your info was exposed in the Facebook data leak

Bleeping Computer

Data breach notification service Have I Been Pwned can now be used to check if your personal information was exposed in yesterday's Facebook data leak that contains the phone numbers and information for over 500 million users. [.].

article thumbnail

533 Million Facebook Users' Phone Numbers and Personal Data Leaked Online

The Hacker News

In what's likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular cybercrime forum for free—which was harvested by hackers in 2019 using a Facebook vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five years of the Right to Be Forgotten

Elie

Malware is one of the key threats to online security today, with applications ranging from phishing mailers to ransomware and trojans. We present Spotlight, a large-scale malware lead-generation framework.

Phishing 112
article thumbnail

Malware attack on Applus blocked vehicle inspections in some US states

Security Affairs

A malware attack against vehicle inspection services provider Applus Technologies paralyzed preventing vehicle inspections in eight US states. Applus Technologies is a worldwide leader in the testing, inspection and certification sector, the company was recently hit by a malware cyberattack that impacted vehicle inspections in eight states, including Connecticut, Georgia, Idaho, Illinois, Massachusetts, Utah, and Wisconsin.

Malware 114
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

NIST Releases Draft Guidance on Election Cybersecurity

Lohrman on Security

article thumbnail

Data leak of over 533 million Facebook users

CyberSecurity Insiders

Facebook data of over 533 million users has been discovered on a hacking forum by Alon Gal, the Chef Technology Officer of Cybersecurity firm Hudson Rock who added that the leak could spell trouble to the social media giant as it could face harsh penalties from the data watchdogs across the world. Leaked information includes phone numbers, location data, date of birth and biography of Facebook users.

Media 106

More Trending

article thumbnail

Clop Ransomware operators plunder US universities

Security Affairs

Clop ransomware gang leaked online data stolen from Stanford Medicine, University of Maryland Baltimore, and the University of California. Clop ransomware operators have leaked the personal and financial information stolen from Stanford Medicine, University of Maryland Baltimore (UMB), and the University of California. Data were stolen by the ransomware gang by compromising the Accellion File Transfer Appliance (FTA) application used by the universities to share information.

article thumbnail

NIST Releases Draft Guidance on Election Cybersecurity

Security Boulevard

The 2020 election season was full of claims of online interference, and in response the National Institute of Standards and Technology (NIST) published a draft Cybersecurity Framework Election Infrastructure Profile on Monday, March 29, to help local election officials prepare for and respond to cyber threats. “The guide can help these officials reduce the risk.

article thumbnail

Sierra Wireless resumes production after ransomware attack

Bleeping Computer

Canadian IoT solutions provider Sierra Wireless announced that it resumed production at its manufacturing sites after it halted it due to a ransomware attack that hit its internal network and corporate website on March 20. [.].

article thumbnail

The UK Is Trying to Stop Facebook's End-to-End Encryption

WIRED Threat Level

The government's latest attack is aimed at discouraging the company from following through with its planned rollout across platforms.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Windows 10 21H1 update: What's new, how to download, and more

Bleeping Computer

The Windows 10 21H1 feature update, also known as the Spring 2021 Udpate, is being released in April or May 2021. Find out what's new , how to get it, and more. [.].

79
article thumbnail

Ubiquiti All But Confirms Breach Response Iniquity

Security Boulevard

For four days this past week, Internet-of-Things giant Ubiquiti failed to respond to requests for comment on a whistleblower's allegations that the company had massively downplayed a "catastrophic" two-month breach ending in January to save its stock price, and that Ubiquiti's insinuation that a third-party was to blame was a fabrication. I was happy to add their eventual public response to the top of Tuesday's story on the whistleblower's claims, but their statement deserves a post of its own b

article thumbnail

Ubiquiti All But Confirms Breach Response Iniquity

Krebs on Security

For four days this past week, Internet-of-Things giant Ubiquiti did not respond to requests for comment on a whistleblower’s allegations the company had massively downplayed a “catastrophic” two-month breach ending in January to save its stock price, and that Ubiquiti’s insinuation that a third-party was to blame was a fabrication.

article thumbnail

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 323’

Security Boulevard

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink. The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 323’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Security Affairs newsletter Round 308

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to receive the complete weekly Security Affairs Newsletter for free, including the international press, subscribe here. Experts found two flaws in Facebook for WordPress Plugin Hackers disrupted live broadcasts at Channel Nine.

article thumbnail

CERIAS – Caroline Wong’s ‘Security Industry Context’

Security Boulevard

Many thanks to CERIAS Purdue University for publishing their outstanding videos on the organization's YouTube channel. Enjoy and Be Educated Simultaneously! Permalink. The post CERIAS – Caroline Wong’s ‘Security Industry Context’ appeared first on Security Boulevard.

article thumbnail

r77 Rootkit v1.5.1 releases: single file installer and fileless persistence that hides processes, files, network connections

Penetration Testing

r77 Rootkit Ring 3 rootkit r77 is a ring 3 Rootkit that hides the following entities from all processes: Files, directories, named pipes, scheduled tasks Processes CPU usage Registry keys & values TCP &... The post r77 Rootkit v1.5.1 releases: single file installer and fileless persistence that hides processes, files, network connections appeared first on Penetration Testing.

article thumbnail

Best of Episode: Interview with Rachel Tobac

Security Boulevard

This week is a best of episode with special guest Rachel Tobac, CEO of Social Proof Security. In this episode we discuss social engineering, how to get more women in cybersecurity, and of course Rachel’s favorite David Lynch movies. This is one previous episode you don’t want to miss! ** Links mentioned on the show […]. The post Best of Episode: Interview with Rachel Tobac appeared first on The Shared Security Show.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

CERIAS – Levi Lloyd’s ‘Securing The Software Supply Chain’

Security Boulevard

Many thanks to CERIAS Purdue University for publishing their outstanding videos on the organization's YouTube channel. Enjoy and Be Educated Simultaneously! Permalink. The post CERIAS – Levi Lloyd’s ‘Securing The Software Supply Chain’ appeared first on Security Boulevard.