Tue.Dec 27, 2022

article thumbnail

FIN7 threat actor updated its ransomware activity

Tech Republic Security

Researchers from PRODAFT reveal that the infamous FIN7 threat actor updated its ransomware activities and provide a unique view into the structure of the group. Learn how to protect against it. The post FIN7 threat actor updated its ransomware activity appeared first on TechRepublic.

article thumbnail

2022 in review: 10 of the year’s biggest cyberattacks

We Live Security

The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022. The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on WeLiveSecurity.

Hacking 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BlueNoroff introduces new methods bypassing MoTW

SecureList

BlueNoroff group is a financially motivated threat actor eager to profit from its cyberattack capabilities. We have published technical details of how this notorious group steals cryptocurrency before. We continue to track the group’s activities and this October we observed the adoption of new malware strains in its arsenal. The group usually takes advantage of Word documents and uses shortcut files for the initial intrusion.

Malware 132
article thumbnail

Best of 2022: Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams

Security Boulevard

If you haven't yet received phishing emails pretending to be from Amazon, you will soon. Luckily, there are a few steps that can help protect your account and data. The post Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams appeared first on Cyphere | Securing Your Cyber Sphere. The post Best of 2022: Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams appeared first on Security Boulevard.

Scams 113
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google wants its Gmail users to take these security steps in 2023

CyberSecurity Insiders

Google, the much-used search engine across the world, has disclosed some security steps to its Gmail users to stay cyber safe in the year 2023. It is urging its mail users to stay away from spam by marking mails that seem to be suspicious as spam. This not only helps the online users to stay away from malicious downloads but also helps in training the AI smart servers of Gmail to keep its inboxes clean and trouble free.

article thumbnail

BTC.com lost $3 million worth of cryptocurrency in cyberattack

Bleeping Computer

BTC.com, one of the world's largest cryptocurrency mining pools, announced it was the victim of a cyberattack that resulted in the theft of approximately $3 million worth of crypto assets belonging to both customers and the company. [.].

More Trending

article thumbnail

EarSpy attack eavesdrops on Android phones via motion sensors

Bleeping Computer

A team of researchers has developed an eavesdropping attack for Android devices that can, to various degrees, recognize the caller's gender and identity, and even discern private speech. [.].

Mobile 102
article thumbnail

Most Popular Blog Posts, 2022: Cyber Risk Data, CRQ Use Cases, Maximize GRC

Security Boulevard

Readers of the RiskLens blog dug into a wide range of topics we published this year, from the basics of FAIR quantitative analysis to revving up a GRC to reporting on risk to the board with our new portfolio capability to…risk of an asteroid crashing into earth (see #7)? . The post Most Popular Blog Posts, 2022: Cyber Risk Data, CRQ Use Cases, Maximize GRC appeared first on Security Boulevard.

article thumbnail

Hackers steal $8 million from users running trojanized BitKeep apps

Bleeping Computer

Multiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions that didn't require verification. [.].

article thumbnail

Why Attackers Target GitHub, and How You Can Secure It

Dark Reading

The unfettered collaboration of the GitHub model creates a security headache. Follow these seven principles to help relieve the pain.

115
115
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How (and Why) to Take Full Advantage of Apple’s New Advanced Data Protection Feature

Security Boulevard

With the iOS 16.2 update, Apple introduced “Advanced Data Protection,” which finally introduced end-to-end encryption (E2EE) for most items backed up or stored in iCloud. Apple has long been criticized, with good reason, over its iCloud service not providing E2EE (where the user has the decryption keys); for years, when enabled, for a good chunk of data iPhone syncs to iCloud, Apple held the decryption keys for some stored data, which included: Message backups.

article thumbnail

APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector

The Hacker News

Microsoft's decision to block Visual Basic for Applications (VBA) macros by default for Office files downloaded from the internet has led many threat actors to improvise their attack chains in recent months. Now according to Cisco Talos, advanced persistent threat (APT) actors and commodity malware families alike are increasingly using Excel add-in (.XLL) files as an initial intrusion vector.

article thumbnail

Here Comes 2023: Rezilion’s Security Predictions

Security Boulevard

It’s time for 2023 predictions about the security industry. What’s in store for cybersecurity and development teams in 2023? Making predictions for anything related to technology and business is always a bit tricky because so much can change so quickly. Nevertheless, we are forging ahead with our best guesses about what organizations and teams can. Here Comes 2023: Rezilion’s Security Predictions.

article thumbnail

BlueNoroff APT Hackers Using New Ways to Bypass Windows MotW Protection

The Hacker News

BlueNoroff, a subcluster of the notorious Lazarus Group, has been observed adopting new techniques into its playbook that enable it to bypass Windows Mark of the Web (MotW) protections. This includes the use of optical disk image (.ISO extension) and virtual hard disk (.VHD extension) file formats as part of a novel infection chain, Kaspersky disclosed in a report published today.

95
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

End of Year Bells Are Ringing: How to Balance Cyber Costs with Resilience Goals

Security Boulevard

12 Days of Cybersecurity: Day 2. This holiday season, in light of looming fears of a recession, many families may be tightening their purse strings and looking for creative alternatives to make their holiday dollars stretch further than in previous years. . The post End of Year Bells Are Ringing: How to Balance Cyber Costs with Resilience Goals appeared first on Security Boulevard.

article thumbnail

Facebook (Meta) to settle Cambridge Analytica data leak for $725M

Security Affairs

Facebook (Meta) has agreed to pay $725 million to settle the class-action lawsuit filed in 2018 over the Cambridge Analytica data leak. Facebook (Meta) has agreed to pay $725 million to settle a class-action lawsuit filed in 2018 over the Cambridge Analytica data leak. According to Reuters , the lawyers for the plaintiffs defined the proposed settlement as the largest to ever be achieved in a U.S. data privacy class action.

article thumbnail

Facebook to Pay $725 Million to Settle Lawsuit Over Data Leak

Heimadal Security

In 2018, Meta Platforms, the parent company of Facebook, Instagram, and WhatsApp, settled a long-running class-action lawsuit for $725 million. As a result of revelations that the social media giant allowed third-party apps such as Cambridge Analytica to access users’ personal information without their consent, a legal dispute arose. A federal judge in the San […].

Media 92
article thumbnail

Hackers stole $3 million worth of cryptocurrency from BTC.com

Security Affairs

The BTC.com cryptocurrency platform was the victim of a cyberattack that resulted in the theft of $3 million worth of crypto assets. BTC.com is a website that provides services for managing and transferring Bitcoin, it offers a digital wallet for storing Bitcoin, a trading interface for exchanging Bitcoin with other cryptocurrencies and fiat currencies, and a mining platform for participating in the extraction of new Bitcoin coins.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The Threat of Predictive Policing to Data Privacy and Personal Liberty

Dark Reading

Inaccurate information from data brokers can damage careers and reputations. It's time for US privacy laws to change how law enforcement and legal agencies obtain and act on data.

article thumbnail

Uncovering the link between PrivateLoader PPI service and RisePro stealer

Security Affairs

The pay-per-install (PPI) malware downloader service PrivateLoader is being used to distribute the RisePro info-stealing malware. The pay-per-install (PPI) malware downloader service PrivateLoader is being used to distribute the information-stealing malware dubbed RisePro, Flashpoint warns. Threat actors can pay the Pay-per-install PrivateLoader service to download malicious payloads onto infected systems.

article thumbnail

Securing and Improving User Experience for the Future of Hybrid Work

Dark Reading

Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.

article thumbnail

Facebook (Meta) to settle Cambridge Analytica data leak for $725M

Security Affairs

Facebook (Meta) has agreed to pay $725 million to settle the class-action lawsuit filed in 2018 over the Cambridge Analytica data leak. Facebook (Meta) has agreed to pay $725 million to settle a class-action lawsuit filed in 2018 over the Cambridge Analytica data leak. According to Reuters , the lawyers for the plaintiffs defined the proposed settlement as the largest to ever be achieved in a U.S. data privacy class action. “This historic settlement will provide meaningful relief to the cl

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Large Insurer Says Cyber Attacks Are Becoming 'Uninsurable'

SecureWorld News

Cyber is the risk to watch, according to a Financial Times article in which insurer Zurich's top executive is quoted. “What will become uninsurable is going to be cyber,” said Mario Greco, CEO at Zurich, one of Europe's biggest insurance companies, in the Dec. 26 article. “What if someone takes control of vital parts of our infrastructure, the consequences of that?”.

article thumbnail

USENIX Security ’22 – Gökçen Y?lmaz Dayan?kl?, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina ‘Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators’

Security Boulevard

Our thanks to USENIX for publishing their Presenter’s USENIX Security ’22 Conference tremendous content on the organization’s’ YouTube channel. Permalink. The post USENIX Security ’22 – Gökçen Yılmaz Dayanıklı, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina ‘Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators’ appeared first on Security Boulevard.

article thumbnail

How to Get the Most out of UEBA

Dark Reading

Security teams are considering how to get the most out of user entity behavioral analytics by taking advantage of its strengths and augmenting its limitations.

72
article thumbnail

Critical “10-out-of-10” Linux kernel SMB hole – should you worry?

Naked Security

It's serious, it's critical, and you could call it severe. but in HHGttG terminology, it's probably "mostly harmless".

87
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Hacktivism Is Back and Messier Than Ever

WIRED Threat Level

Throughout 2022, geopolitics has given rise to a new wave of politically motivated attacks with an undercurrent of state-sponsored meddling.

Hacking 70
article thumbnail

Internet AppSec Remains Abysmal & Requires Sustained Action in 2023

Dark Reading

A variety of initiatives — such as memory-safe languages and software bills of materials — promise more secure applications, but sustained improvements will require that vendors do much better, researchers agree.

article thumbnail

Recognizing and Preventing Social Engineering on Social Media

Mitnick Security

To connect with friends, family, and coworkers, it’s likely that we have all overshared our personal information on social platforms more than once. Unfortunately, the ease of access to an individual or company’s information has made social media an easy target for threat actors.

article thumbnail

Open Policy Agent with Kubernetes – Tutorial (Pt. 1)

Security Boulevard

Let's get our hands dirty with policy as code and write our first OPA policies for a Kubernetes environment. The post Open Policy Agent with Kubernetes – Tutorial (Pt. 1) appeared first on Security Boulevard.

52
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.