Sun.May 29, 2022

article thumbnail

Can Privacy, Security and Ease of Use Work Together?

Lohrman on Security

In this interview with Washington state Chief Privacy Officer Katy Ruckle, we explore the role of data privacy in providing government services.

article thumbnail

Pro-Russian hacker group KillNet plans to attack Italy on May 30

Security Affairs

Pro-Russian hacker group KillNet is threatening again Italy, it announced a massive and unprecedented attack on May 30. Pro-Russian hacker group KillNet is threatening again Italy, it announced a massive and unprecedented attack on May 30. Pro-Russian ‘hacktivist’ group Killnet is one of the most active non-state actors operating since the beginning of the Russian invasion of Ukraine.

Banking 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Yorker imprisoned for role in carding group behind $568M damages

Bleeping Computer

John Telusma, a 37-year-old man from New York, was sentenced to four years in prison for selling and using stolen and compromised credit cards on the Infraud carding portal operated by the transnational cybercrime organization with the same name. [.].

article thumbnail

Follina?—?a Microsoft Office code execution vulnerability

DoublePulsar

Two days ago, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus: Continue reading on DoublePulsar ».

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Mobile trojan detections rise as malware distribution level declines

Bleeping Computer

Kaspersky's quarterly report on mobile malware distribution records a downward trend that started at the end of 2020, detecting one-third of the malicious installations reported in Q1 2021, and about 85% of those counted in Q4 2021. [.].

Mobile 136
article thumbnail

Why Managed Detection and Response (MDR) is your most important security investment

CyberSecurity Insiders

Ed Williams, EMEA Director of SpiderLabs,? Trustwave. After years of a severe skills drought, the availability of security professionals appears to be gradually improving. The global shortfall in security professionals dropped from 3.12 million to 2.72 million last year. However, although this is notable progress, it is not taking place fast enough.

Risk 130

More Trending

article thumbnail

US man sentenced to 4 years in prison for his role in Infraud scheme

Security Affairs

A man from New York was sentenced to four years in prison for trading stolen credit card data and assisting the Infraud Organization. John Telusma (aka ‘Peterelliot’), a New York man from New York (37), was sentenced this week to four years in prison for purchasing stolen or compromised credit cards and assisting the Infraud Organization in monetizing their criminal activity fraudulent activity.

article thumbnail

Britain hospitals to be cyber attacked by Russian Sleeper cells

CyberSecurity Insiders

Dr. Melanie Garson, an international security specialist working for the University College of London, expressed her deep concerns about national security while interacting with a news web resource. She said that hospital infrastructure was on the verge of being cyber-attacked by Russian sleeper cells, whose aim is to disrupt the healthcare infrastructure and to create panic among patients and their near & dear.

article thumbnail

New 'GoodWill' Ransomware Forces Victims to Donate Money and Clothes to the Poor

The Hacker News

Cybersecurity researchers have disclosed a new ransomware strain called GoodWill that compels victims into donating for social causes and provide financial assistance to people in need. "The ransomware group propagates very unusual demands in exchange for the decryption key," researchers from CloudSEK said in a report published last week.

article thumbnail

Do we really need 5G?

Security Boulevard

As I mentioned in a previous blog post, 4G is really pretty good. It makes quite a few useful things possible: fast general Internet access (on the order of DSL) download and even upload of high-resolution video always-on behavior (with batteries lasting the entire day) apps relying on location and identity (technically a smartphone feature). The post Do we really need 5G?

IoT 117
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Security Affairs newsletter Round 367 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for free in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks The strange link between Industrial Spy and the Cuba ransomware operation Reuters: Russia-linked APT behind Brexit leak website GitHub: Nearly 100,000 NPM Users’ credenti

InfoSec 99
article thumbnail

Increasing Threat Of Ransomware to Online Business

Security Boulevard

Ransomware /?rans(?)mw??/ a type of malicious software aimed to hinder access to a computer system until a sum of money is paid. In a ransomware attack, victims receive an unsuspicious email attached with a malware. Upon opening the email(which might […]. The post Increasing Threat Of Ransomware to Online Business appeared first on WeSecureApp :: Simplifying Enterprise Security!

article thumbnail

Penetration testing vs vulnerability scanning

Acunetix

Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious of cybersecurity must include both these activities in their business processes and make sure that they work in unison. Missing out on one of them greatly decreases. Read more. The post Penetration testing vs vulnerability scanning appeared first on Acunetix.

article thumbnail

FBI Warns About Hackers Selling VPN Credentials for U.S. College Networks

The Hacker News

Network credentials and virtual private network (VPN) access for colleges and universities based in the U.S. are being advertised for sale on underground and public criminal marketplaces. "This exposure of sensitive credential and network access information, especially privileged user accounts, could lead to subsequent cyber attacks against individual users or affiliated organizations," the U.S.

VPN 97
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Protecting Against Bad Chemistry (with Cybersecurity)

The State of Security

Do you recall one of the first really fun chemistry experiment you performed as a child? If your school followed the usual curriculum, then you probably made a model volcano and then added some baking soda to the opening, followed by the addition of vinegar. A variation of this experiment was to add the ingredients […]… Read More. The post Protecting Against Bad Chemistry (with Cybersecurity) appeared first on The State of Security.

article thumbnail

The State of Application Security with Tanya Janca

Security Boulevard

Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current state and future of Application Security. In this episode we discuss what Tanya’s been up to, what’s changed in AppSec over the last […]. The post The State of Application Security with Tanya Janca appeared first on The Shared Security Show.

Hacking 85
article thumbnail

Tripwire Patch Priority Index for May 2022

The State of Security

Tripwire’s May 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority list this month are 2 remote code execution vulnerabilities for Excel and a security feature bypass vulnerability for Office. Up next are patches that affect components of the Windows operating systems. These patches resolve over 40 vulnerabilities, […]… Read More.

78
article thumbnail

Zero Day Initiative’s Pwn2Own Vancouver 2022 – Billy Jheng Bing-Jhong’s, Muhammad Alifa Ramdhan’s And Nguy?n Hoàng Th?ch’s ‘STARLabs Vs. Oracle VirtualBox’

Security Boulevard

Our thanks to Zero Day Initiative for publishing their outstanding Pwn2Own Vancouver 2022 videos on the organization’s’ YouTube channel. Permalink. The post Zero Day Initiative’s Pwn2Own Vancouver 2022 – Billy Jheng Bing-Jhong’s, Muhammad Alifa Ramdhan’s And Nguy?n Hoàng Th?ch’s ‘STARLabs Vs. Oracle VirtualBox’ appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The disruptive impact of EU digital ID wallets

CyberSecurity Insiders

By Lokke Moerel, Senior Of Counsel, Morrison & Foerster (Brussels). Europe is one of the most digitalized societies in the world, and this has only been accelerated by the COVID?19 pandemic. Within no time, people started working from home and children were being schooled online. According to a 2020 report by McKinsey , the pandemic accelerated digital adoption by seven years.

Marketing 121
article thumbnail

Zero Day Initiative’s Pwn2Own Vancouver 2022 – ‘Masato Kinugawa Vs. Microsoft Teams’

Security Boulevard

Our thanks to Zero Day Initiative for publishing their outstanding Pwn2Own Vancouver 2022 videos on the organization’s’ YouTube channel. Permalink. The post Zero Day Initiative’s Pwn2Own Vancouver 2022 – ‘Masato Kinugawa Vs. Microsoft Teams’ appeared first on Security Boulevard.

article thumbnail

Hackers pay a $5000 monthly fee to gain fraudulent access to banking apps

CyberSecurity Insiders

A research group from ESET has discovered that cyber-crooks are paying a monthly fee of $5000 to gain fraudulent access to 467 android apps to steal banking-related details. Information is out that the campaign has been running for quite some time and is aiming to siphon cryptocurrencies along with fiat. Dubbed an ERMAC banking Trojan, the malware is seen impersonating android users in Poland and has now spread slowly to New Zealand.

Banking 99
article thumbnail

Can Privacy, Security and Ease of Use Work Together?

Security Boulevard

In this interview with Washington state Chief Privacy Officer Katy Ruckle, we explore the role of data privacy in providing government services. . The post Can Privacy, Security and Ease of Use Work Together? appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

XKCD ‘Field Topology’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Field Topology’ appeared first on Security Boulevard.

62
article thumbnail

Tripwire Patch Priority Index for May 2022

Security Boulevard

Tripwire’s May 2022 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the patch priority list this month are 2 remote code execution vulnerabilities for Excel and a security feature bypass vulnerability for Office. Up next are patches that affect components of the Windows operating systems. These patches resolve over 40 vulnerabilities, […]… Read More.

52
article thumbnail

Protecting Against Bad Chemistry (with Cybersecurity)

Security Boulevard

Do you recall one of the first really fun chemistry experiment you performed as a child? If your school followed the usual curriculum, then you probably made a model volcano and then added some baking soda to the opening, followed by the addition of vinegar. A variation of this experiment was to add the ingredients […]… Read More. The post Protecting Against Bad Chemistry (with Cybersecurity) appeared first on The State of Security.