Tue.Oct 20, 2020

article thumbnail

Cybersecurity Visuals

Schneier on Security

The Hewlett Foundation just announced its top five ideas in its Cybersecurity Visuals Challenge. The problem Hewlett is trying to solve is the dearth of good visuals for cybersecurity. A Google Images Search demonstrates the problem: locks, fingerprints, hands on laptops, scary looking hackers in black hoodies. Hewlett wanted to go beyond those tropes.

article thumbnail

Homebrew: How to install reconnaissance tools on macOS

Tech Republic Security

We'll guide you through the process of using Homebrew package manager to install security tools on macOS to perform reconnaissance, discovery, and fingerprinting of the devices on your network.

155
155
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nefilim ransomware gang published Luxottica data on its leak site

Security Affairs

The Nefilim ransomware operators have posted a long list of files that appear to belong to Italian eyewear and eyecare giant Luxottica. Luxottica Group S.p.A. is an Italian eyewear conglomerate and the world’s largest company in the eyewear industry. As a vertically integrated company, Luxottica designs, manufactures, distributes and retails its eyewear brands, including LensCrafters, Sunglass Hut, Apex by Sunglass Hut, Pearle Vision, Target Optical, Eyemed vision care plan, and Glasses.com.

article thumbnail

Ransomware Attacks Show Little Sign of Slowing in 2021

Dark Reading

Attackers have little motivation to stop when businesses are paying increasingly larger ransoms, say security experts who foresee a rise in attacks.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Facebook: A Top Launching Pad For Phishing Attacks

Threatpost

Amazon, Apple, Netflix, Facebook and WhatsApp are top brands leveraged by cybercriminals in phishing and fraud attacks - including a recent strike on a half-million Facebook users.

Phishing 104
article thumbnail

The Cybersecurity Maturity Model Certification: Are You in Compliance?

Dark Reading

Not only can this framework help companies remain solvent, but it will also protect critical information from getting into the wrong hands.

More Trending

article thumbnail

NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers

Dark Reading

Officials urge organizations to patch the vulnerabilities most commonly scanned for, and exploited by, Chinese attackers.

128
128
article thumbnail

Google’s Waze Can Allow Hackers to Identify and Track Users

Threatpost

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it.

Mobile 120
article thumbnail

NSA details top 25 flaws exploited by China-linked hackers

Security Affairs

The US National Security Agency (NSA) has shared the list of top 25 vulnerabilities exploited by Chinese state-sponsored hacking groups in attacks in the wild. The US National Security Agency (NSA) has published a report that includes details of the top 25 vulnerabilities that are currently being exploited by China-linked APT groups in attacks in the wild.

Hacking 101
article thumbnail

Mobile Browser Bugs Open Safari, Opera Users to Malware

Threatpost

A set of address-spoofing bugs affect users of six different types of mobile browsers, with some remaining unpatched.

Mobile 124
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Automation can help you in Managing Data Privacy

Security Affairs

The global data privacy landscape is changing and everyday we can see new regulations emerge. These regulations are encouraging organizations to be better custodians of the consumers data and create a healthier space for data privacy. In order to do so organizations will need to rework their operations and revamp their processes in order to comply with these regulations.

article thumbnail

Confronting Data Risk in the New World of Work

Threatpost

With Stanford research showing that nearly half of the U.S. labor force is now working from home full-time, insider threats are a much more difficult problem.

Risk 104
article thumbnail

Trickbot Tenacity Shows Infrastructure Resistant to Takedowns

Dark Reading

Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot -- but with only a short-term impact.

132
132
article thumbnail

Ransomware Group Makes Splashy $20K Donation to Charities

Threatpost

Cybercriminal gang Darkside sent $20K in donations to charities in a ‘Robin Hood’ effort that’s likely intended to draw attention to future data dumps, according to experts.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Building the Human Firewall

Dark Reading

Cybersecurity was a challenge before COVID-19 sent millions of employees home to work from their own devices and networks. Now what?

article thumbnail

Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts

Threatpost

Hundreds of medical patients taking cancer drugs, Premarin, Lyrica and more are now vulnerable to phishing, malware and identity fraud.

Phishing 106
article thumbnail

Businesses Rethink Endpoint Security for 2021

Dark Reading

The mass movement to remote work has forced organizations to rethink their long-term plans for endpoint security. How will things look different next year?

81
article thumbnail

Office 365 OAuth Attack Targets Coinbase Users

Threatpost

Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Do Standards Exist That Certify Secure IoT Systems?

Dark Reading

The IoT industry remains fragmented with a lot of players, big and small, churning out a lot of products.

IoT 86
article thumbnail

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

They are all members of Unit 74455 of the Russian Main Intelligence Directorate (GRU). A grand jury in Pittsburgh, Pennsylvania, just indicted 6 members of this Russian military unit for unleashing some of the most widespread and damaging cyberattacks ever seen. Russian officers charged in NotPetya cyberattack. The NotPetya cyberattack crashed networks around the globe, doing billions in damage.

Malware 61
article thumbnail

Farsight Labs Launched as Security Collaboration Platform

Dark Reading

Farsight Security's platform will offer no-cost access to certain tools and services.

93
article thumbnail

Pay it safe: Group-IB aids Paxful in repelling a series of web-bot attacks

Security Affairs

Group-IB assisted Paxful, an international peer-to-peer cryptocurrency marketplace, in countering web-bot and social engineering attacks. Group-IB , a global threat hunting and intelligence company headquartered in Singapore, has assisted Paxful , an international peer-to-peer cryptocurrency marketplace, in countering a wave of web-bot and social engineering attacks, and customer account takeovers.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

VPN Security: How VPNs Work and How to Buy the Best One

eSecurity Planet

Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options.

VPN 67
article thumbnail

Adobe Fixes 16 Critical Code-Execution Bugs Across Portfolio

Threatpost

The out-of-band patches follow a lighter-than-usual Patch Tuesday update earlier this month.

Media 79
article thumbnail

Data-Centric Security for the Cloud, Zero Trust or Advanced Adaptive Trust?

McAfee

Over the last few months, Zero Trust Architecture (ZTA) conversations have been top-of-mind across the DoD. We have been hearing the chatter during industry events all while sharing conflicting interpretations and using various definitions. In a sense, there is an uncertainty around how the security model can and should work. From the chatter, one thing is clear – we need more time.

article thumbnail

NSA Warns: China Is Using These Vulnerabilities for Attacks

SecureWorld News

If you are looking to defend your agency or organization from Chinese Nation-State cyberattacks, you have your work cut out for you. The United States National Security Agency (NSA) sums up the threat for Chinese hacking targets and targeted networks: "These networks often undergo a full array of tactics and techniques used by Chinese state-sponsored cyber actors to exploit computer networks of interest that hold sensitive intellectual property, economic, political, and military information.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Your AST Guide for the Disenchanted: Part 5

ForAllSecure

In a previous post of AST Guide for the Disenchanted , we identified the minimum appsec risks that need to be addressed as a part of your DevSecOps pipeline. The two risks are: known and unknown vulnerabilities. In today’s post, we’ll focus on how fuzz testing can help you address those unknown vulnerabilities. To let coders do what they do best, code, they need a solution that reduces false-positives.

Risk 52
article thumbnail

Cybersecurity Awareness Month: What's New at NIST on IOT Security?

NSTIC

Here’s a one-question multiple-choice test: What's new at NIST on Internet of Things (IoT) security?

IoT 76
article thumbnail

Your AST Guide for the Disenchanted: Part 5

ForAllSecure

In a previous post of AST Guide for the Disenchanted , we identified the minimum appsec risks that need to be addressed as a part of your DevSecOps pipeline. The two risks are: known and unknown vulnerabilities. In today’s post, we’ll focus on how fuzz testing can help you address those unknown vulnerabilities. To let coders do what they do best, code, they need a solution that reduces false-positives.

Risk 52
article thumbnail

MMO game Street Mobster leaking data of 1.9 million users due to critical vulnerability

Security Affairs

Researchers discovered that MMO game Street Mobster is leaking data of 1.9 million users due to SQL Injection critical vulnerability. Attackers could exploit the SQL Injection flaw to compromise the game’s database and steal user data. Original Post: [link]. The CyberNews.com Investigation team discovered a critical vulnerability in Street Mobster, a browser-based massively multiplayer online game created by Bulgarian development company BigMage Studios.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.