Sun.Aug 21, 2022

article thumbnail

Hacktivism and DDOS Attacks Rise Dramatically in 2022

Lohrman on Security

2022 has brought a surge in distributed denial-of-service attacks as well as a dramatic rise in patriotic hacktivism. What’s ahead for these trends as the year continues?

DDOS 355
article thumbnail

Google blocks worlds largest DDoS Cyber Attacks

CyberSecurity Insiders

Google has released a formal statement that it has one of the largest Distributed Denial of Service attack (DDoS) for one its customers, thus avoiding large scale disruption and downtime that could have lasted for days. “It was a Layer 7 DDoS attack and was observed to have been 76% larger than the previous one that was recorded last year”, said Google.

DDOS 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Grandoreiro banking malware targets Mexico and Spain

Security Affairs

A new Grandoreiro banking malware campaign is targeting organizations in Mexico and Spain, Zscaler reported. Zscaler ThreatLabz researchers observed a Grandoreiro banking malware campaign targeting organizations in the Spanish-speaking nations of Mexico and Spain. Grandoreiro is a modular backdoor that supports the following capabilities: Keylogging Auto-Updation for newer versions and modules Web-Injects and restricting access to specific websites Command execution Manipulating windows Guiding

Banking 100
article thumbnail

An encrypted ZIP file can have two correct passwords — here's why

Bleeping Computer

Password-protected ZIP archives are common means of compressing and sharing sets of files—from sensitive documents to malware samples to even malware (phishing "invoices" in emails). But, did you know it is possible for an encrypted ZIP file to have two correct passwords, with both producing the same outcome on extraction? [.].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Donot Team cyberespionage group updates its Windows malware framework

Security Affairs

The Donot Team threat actor, aka APT-C-35 , has added new capabilities to its Jaca Windows malware framework. The Donot Team has been active since 2016, it focuses on government and military organizations, ministries of foreign affairs, and embassies in India, Pakistan, Sri Lanka, Bangladesh, and other South Asian countries. In October 2021, a report released by the Amnesty International revealed that the Donot Team group employed Android applications posing as secure chat application and mali

Malware 99
article thumbnail

Email and cybersecurity: Fraudsters are knocking

Security Boulevard

Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without their email server for “about a month before it becomes a problem”. Can you imagine that now? A month without email? Emails are […]… Read More. The post Email and cybersecurity: Fraudsters are knocking appeared first on The State of Security.

More Trending

article thumbnail

Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser

Security Boulevard

A Cisco employee was compromised by a ransomware gang using a technique called multi-factor authentication fatigue, an attack on the Signal messenger app’s SMS service Twilio potentially disclosed the phone numbers of 1,900 users, and details on how Facebook and Instagram track what you click on including your web browsing history by using their in-app […].

article thumbnail

White hat hackers broadcasted talks and hacker movies through a decommissioned satellite

Security Affairs

Hackers took control of a decommissioned satellite and broadcasted hacking conference talks and hacker movies. . During the latest edition of the DEF CON hacking conference held in Las Vegas, the group of white hat hackers Shadytel demonstrated how to take control of a satellite in geostationary orbit. The group used a satellite called Anik F1R , which was dismissed in 2020.

Hacking 97
article thumbnail

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability

The Hacker News

Bitcoin ATM manufacturer General Bytes confirmed that it was a victim of a cyberattack that exploited a previously unknown flaw in its software to plunder cryptocurrency from its users.

article thumbnail

Threat actors are stealing funds from General Bytes Bitcoin ATM

Security Affairs

Threat actors have exploited a zero-day vulnerability in the General Bytes Bitcoin ATM servers to steal BTC from multiple customers. Threat actors have exploited a zero-day flaw in General Bytes Bitcoin ATM servers that allowed them to hijack transactions associated with deposits and withdrawal of funds. GENERAL BYTES is the world’s largest Bitcoin, Blockchain, and Cryptocurrency ATM manufacturer.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Janet Jackson Music video crash hard drives in laptops

CyberSecurity Insiders

Can you ever imagine a music video released by Janet Jackson in 1989 is now posing as a security threat to some laptops as it could crash them as soon as they expose themselves to the song frequencies? Yes, security researchers have now found that Janet Jackson’s Rhythm Nation Music Video can impose denial of service attacks in some laptops, prompting their hard drives to crash or malfunction.

article thumbnail

Hackers target hotel and travel companies with fake reservations

Bleeping Computer

A hacker tracked as TA558 has upped their activity this year, running phishing campaigns that target multiple hotels and firms in the hospitality and travel space. [.].

article thumbnail

Email and cybersecurity: Fraudsters are knocking

The State of Security

Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without their email server for “about a month before it becomes a problem” Can you imagine that now? A month without email? Emails are […]… Read More.

article thumbnail

Mimecast: Mitigating Risk Across a Complex Threat Landscape

Dark Reading

Garret O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since cloud services often add complexity.

Risk 70
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

The Low Threshold for Face Recognition in New Delhi

WIRED Threat Level

Police in India's capital say they only require an 80 percent accuracy rate for matches, raising new alarm bells for civil liberty advocates.

71
article thumbnail

More Password Cracking Tips: A Defcon 2022 Crack Me If You Can Roundup

Security Boulevard

“We do not learn from experience. we learn from reflecting on experience.” . -- John Dewey. Introduction: KoreLogic's Crack Me if You Can (CMIYC) is one of the oldest as most established password cracking competitions. Held every year at Defcon, it serves as a great way to pull together password enthusiasts from all over the world and provides a shared use-case that drives password cracking tool development throughout the rest of the year.

article thumbnail

Banyan Recommends Phased Approach When Introducing Zero Trust

Dark Reading

Banyan Security’s Jayanth Gummaraju makes the case for why zero trust is superior to VPN technology.

VPN 62
article thumbnail

Vulnerability management – we’re doing it wrong

Security Boulevard

Security professionals (and the people who measure our performance like auditors and regulators) have traditionally taken a stance that “all serious vulnerabilities should be patched”. The post Vulnerability management – we’re doing it wrong appeared first on Security Boulevard.

CSO 52
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Proven Ways to Slash Mobile App Security Costs

Appknox

Mobile app security testing is expensive, and that’s a fact. For instance, a single quality penetration test costs around $20,000-$30,000. But do you essentially have to pay this high for the service?

Mobile 144
article thumbnail

Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 235’ (2019 Repost)

Security Boulevard

via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comic (Reprinted from July 28th, 2019). Permalink. The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 235’ (2019 Repost) appeared first on Security Boulevard.

52
article thumbnail

Hacktivism and DDOS Attacks Rise Dramatically in 2022

Security Boulevard

2022 has brought a surge in distributed denial-of-service attacks as well as a dramatic rise in patriotic hacktivism. What’s ahead for these trends as the year continues? The post Hacktivism and DDOS Attacks Rise Dramatically in 2022 appeared first on Security Boulevard.

DDOS 52
article thumbnail

BSidesTLV 2022 – Amichai’s And Stav Shulman’s ‘Now You C(&C), Now You Don’t’

Security Boulevard

Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesTLV 2022 – Amichai’s And Stav Shulman’s ‘Now You C(&C), Now You Don’t’ appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

BSidesTLV 2022 – Rotem Reiss’ ‘Code C.A.I.N – Keeping Your Source Code Under Control’

Security Boulevard

Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesTLV 2022 – Rotem Reiss’ ‘Code C.A.I.N – Keeping Your Source Code Under Control’ appeared first on Security Boulevard.