Fri.Aug 20, 2021

article thumbnail

More on Appleā€™s iPhone Backdoor

Schneier on Security

In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here. Apple says that hash collisions in its CSAM detection system were expected, and not a concern. I’m not convinced that this secondary system was originally part of the design, since it wasn’t discussed in the original specification.

article thumbnail

Great Resignation hits IT departments and companies are switching strategies

Tech Republic Security

To ensure business continuity amid high turnover, many CIOs are planning to alter their strategies to make the company "less dependent on employee institutional knowledge," says PwC.

206
206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybercrime Group Asking Insiders for Help in Planting Ransomware

The Hacker News

A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies' networks as part of an insider threat scheme.

article thumbnail

How to protect your T-Mobile account in light of the latest data breach

Tech Republic Security

In response to a breach that compromised the personal data of millions of subscribers, T-Mobile customers should change their password and PIN and set up two-step verification.

Mobile 195
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldnā€™t hand those out too freely. You have stuff thatā€™s worth protectingā€”and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

AT&T denies data breach after hacker auctions 70 million user database

Bleeping Computer

AT&T says that they did not suffer a data breach after a well-known threat actor claimed to be selling a database containing the personal information of 70 million customers. [.].

article thumbnail

ShadowPad Malware is Becoming a Favorite Choice of Chinese Espionage Groups

The Hacker News

ShadowPad, an infamous Windows backdoor that allows attackers to download further malicious modules or steal data, has been put to use by five different Chinese threat clusters since 2017.

Malware 145

More Trending

article thumbnail

New variant of Konni malware used in campaign targetting Russia

Malwarebytes

This blog post was authored by Hossein Jazi. In late July 2021, we identified an ongoing spear phishing campaign pushing Konni Rat to target Russia. Konni was first observed in the wild in 2014 and has been potentially linked to the North Korean APT group named APT37. We discovered two documents written in Russian language and weaponized with the same malicious macro.

Malware 144
article thumbnail

Hackers swipe almost $100 million from major cryptocurrency exchange

We Live Security

Japanese cryptocurrency exchange Liquid suspends cryptocurrency deposits and withdrawals and moves its assets into cold storage. The post Hackers swipe almost $100 million from major cryptocurrency exchange appeared first on WeLiveSecurity.

article thumbnail

Largest DDoS attack ever reported gets hoovered up by Cloudflare

Malwarebytes

On the Cloudflare blog , the American web infrastructure behemoth that provides content delivery network (CDN) and DDoS mitigation services reports that it detected and mitigated a 17.2 million request-per-second (rps) DDoS attack. To put that number in perspective. The company reports that this is three times as large as anything it has seen before.

DDOS 143
article thumbnail

China passes new automobile data security law

CyberSecurity Insiders

China has made some amendments to the existing laws and passed a new document that discloses several provisions on how automobile companies need to collect their user data as per the stated stipulations. According to a media update released by the Cyberspace Administration of China (CAC) the new law called the Personal Information Protection Law(PIPL) will come into force from October 26th,2021 and will aim to standardize solutions pertaining to data security risks in automobile sector.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The Week in Ransomware - August 20th 2021 - Exploiting Windows

Bleeping Computer

Ransomware gangs continue to attack schools, companies, and even hospitals worldwide with little sign of letting up. Below we have tracked some of the ransomware stories that we are following this week. [.].

article thumbnail

Cloudflare mitigated one of the largest DDoS attack involving 17.2 million rps

The Hacker News

Web infrastructure and website security company Cloudflare on Thursday disclosed that it mitigated the largest ever volumetric distributed denial of service (DDoS) attack recorded to date. The attack, launched via a Mirai botnet, is said to have targeted an unnamed customer in the financial industry last month.

DDOS 128
article thumbnail

T-Mobile data breach just got worse ā€” now at 54 million customers

Bleeping Computer

The T-Mobile data breach keeps getting worse as an update to their investigation now reveals that cyberattack exposed over 54 million individuals' data. [.].

article thumbnail

China Personal Information Protection Law Adopted

TrustArc

On Friday, 20 August 2021, the National Peopleā€™s Congress of China adopted the Personal Information Protection Law (PIPL). This was reported by the website NPC Reporter. The final version of the law has been released in Chinese; an informal English translation will likely follow in the coming days. The new law will enter into force […].

124
124
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Pegasus iPhone hacks used as lure in extortion scheme

Bleeping Computer

A new extortion scam is underway that attempts to capitalize on the recent Pegasus iOS spyware attacks to scare people into paying a blackmail demand. [.].

Spyware 144
article thumbnail

Return on Investment in Software Composition Analysis?

Security Boulevard

Today, drawing from customer feedback on real user experiences, we look at how SCA means less overall risk, money, and effort with Sonatypeā€™s Nexus Lifecycle and Nexus Firewall. Our third in this series, we started with the importance of data quality and then detailed the benefits to individual developers and dev teams. The post Return on Investment in Software Composition Analysis?

Software 124
article thumbnail

Who else wants to undervalue women?

Jane Frankland

There’s a message women need to hear now and it’s this: meritocracy is a myth. The faster women understand this, the better. Unfortunately, many people in the workplace genuinely believe itā€™s a reality, especially men in tech companies. Ironically, big data proves its dysfunction ā€“ that believing in meritocracy makes people more selfish, less self-critical and more prone to introducing bias and behaving in a discriminatory way.

Big data 100
article thumbnail

SynAck ransomware decryptor lets victims recover files for free

Bleeping Computer

Emsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. [.].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Identify Critical Security Vulnerabilities With IAST

Security Boulevard

Vulnerabilities in production code continue to increase, including vulnerabilities in open source codebases. According to a recent report from Synopsys, the number of open source vulnerabilities increased over the past year to a record 84%. Part of this increase may be attributed to the need for organizations to get their applications to production quickly to.

article thumbnail

Cloudflare mitigated the largest ever volumetric DDoS attack to date

Security Affairs

Web infrastructure and website security company Cloudflare announced to have mitigated the largest ever volumetric DDoS attack to date. Cloudflare, the web infrastructure and website security company, announced that it has mitigated the largest ever volumetric distributed denial of service (DDoS) attack to date. Volumetric DDoS attacks are designed to overwhelm internal network capacity and even centralized DDoS mitigation scrubbing facilities with significantly high volumes of malicious traffic

DDOS 119
article thumbnail

Cyber Liability Insurance and MFA on both internal and remote access

Security Boulevard

Cyber insurance is driving a long overdue improvement in user access security. Multi-factor authentication (MFA) is fast becoming a requirement for all privilege and non-privilege accounts, whether users are working on the internal network or remotely. Not a requirement in previous cyber insurance renewals, cyber insurers are demanding firms have MFA.

Insurance 116
article thumbnail

HTTP DDoS attacks reach unprecedented 17 million requests per second

Bleeping Computer

A distributed denial-of-service (DDoS) attack earlier this year takes the top spot for the largest such incident, peaking at 17.2 million requests per second (rps). [.].

DDOS 117
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Week in security with Tony Anscombe

We Live Security

Who is actually paying the ransom demand? ā€“ Be careful about what you throw away ā€“ Records from a terrorist watchlist exposed online. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity.

115
115
article thumbnail

Emsisoft releases free SynAck ransomware decryptor

Security Affairs

Emsisoft researchers have released a decryptor for the SynAck Ransomware that could allow victims of the gang to decrypt their files for free. Emsisoft has released a free decryptor for SynAck Ransomware that can allow victims of the gang to decrypt their encrypted files. <gwmw style=”display:none;”>. Last week, the SynAck ransomware gang released the master decryption keys to allow victims to decrypt their files for free.

article thumbnail

Dissatisfied Employees Are Now Solicited to Deploy Ransomware

Heimadal Security

Apparently, the LockBit ransomware gangā€™s new technique of ā€œhiringā€ employees and other insiders in order to help them breach and encrypt corporate networks more easily has opened a whole new world of opportunities for hackers. On August 12, 2021, cloud email security platform Abnormal Security noticed certain emails received by their customers where they were […].

article thumbnail

Lojas Renner, Brazilian largest clothing store chain, was hit by ransomware

Security Affairs

Lojas Renner, the largest Brazilian department stores clothing company, suffered a ransomware attack that impacted its IT infrastructure. Lojas Renner, the largest Brazilian department stores clothing company, announced to have suffered a ransomware attack that impacted its IT infrastructure. According to Brazilian news outlets, the company was forced to shut down all its physical stores across the country in response to the attack, but Lojas Renner denied having closed the stores and pointed ou

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, ā€œDo you know whatā€™s in your software?

article thumbnail

Mozi IoT Botnet Now Also Targets Netgear, Huawei, and ZTE Network Gateways

The Hacker News

Mozi, a peer-to-peer (P2P) botnet known to target IoT devices, has gained new capabilities that allow it to achieve persistence on network gateways manufactured by Netgear, Huawei, and ZTE, according to new findings.

IoT 103
article thumbnail

637 flaws in industrial control system (ICS) products were published in H1 2021

Security Affairs

During the first half of 2021, 637 vulnerabilities affecting industrial control system (ICS) products were published, affecting products from 76 vendors. Industrial cybersecurity firm Claroty published its third Biannual ICS Risk & Vulnerability Report that analyzes the vulnerability landscape relevant to leading automation products used across the ICS domain.

Firmware 104
article thumbnail

Japanese cryptocoin exchange robbed of $100,000,000

Naked Security

Another week, another cryptocurrency catastrophe. This time, it's "only" $100 million's worth.

article thumbnail

Internet Systems Consortium (ISC) fixes High-Severity DoS flaw in BIND DNS Software

Security Affairs

The Internet Systems Consortium (ISC) addressed a high-severity denial-of-service (DoS) flaw (CVE-2021-25218) affecting the BIND DNS software. The Internet Systems Consortium (ISC) has released security updates to address a high-severity denial-of-service (DoS) vulnerability, tracked as CVE-2021-25218 , that affects its BIND DNS software. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.

DNS 103
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about ā€œcompliance and security," most companies want to ensure that steps are being taken to protect what they value most ā€“ people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and itā€™s more important than ever that safeguards are in place. Letā€™s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.