Fri.Mar 17, 2023

article thumbnail

Feds Charge NY Man as BreachForums Boss “Pompompurin”

Krebs on Security

The U.S. Federal Bureau of Investigation (FBI) this week arrested a New York man on suspicion of running BreachForums , a popular English-language cybercrime forum where some of the world biggest hacked databases routinely show up for sale. The forum’s administrator “ Pompompurin ” has been a thorn in the side of the FBI for years, and BreachForums is widely considered a reincarnation of RaidForums , a remarkably similar crime forum that the FBI infiltrated and dismantled in 20

article thumbnail

Weekly Update 339

Troy Hunt

Why can't I audio right? It's my 339th video and I still make mistakes 🙂 But it came good and we got a decent show out of it with lots of interesting engagement even though doing this a lot later in the day than usual. I found the discussion around IoT door locks especially interesting as it's a real nexus of security, usability and a bit of critical thinking about real world risks.

IoT 54
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to prevent data theft by existing and departing employees

Tech Republic Security

Some 12% of employees take customer details, health records, sales contracts and other confidential data when leaving a company, according to DTEX. The post How to prevent data theft by existing and departing employees appeared first on TechRepublic.

Risk 190
article thumbnail

Android phones can be hacked just by someone knowing your phone number

Graham Cluley

Well, this isn’t good. Google has issued a warning that some Android phones can be hacked remotely, without the intended victim having to click on anything.

Hacking 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Turbocharge your IT career with cybersecurity training for just $50

Tech Republic Security

Whether you have one year or ten years of IT experience, you'll have an edge when applying to the best cybersecurity positions by preparing for certifications with this e-learning bundle. The post Turbocharge your IT career with cybersecurity training for just $50 appeared first on TechRepublic.

article thumbnail

Hitachi becomes the next victim after a ransomware attack on GoAnywhere software

CyberSecurity Insiders

After Rubrik, Hitachi Energy issued a public statement that some of its customer accounts might have been compromised, after a ransomware attack took place on a third-party software called Fortra GoAnywhere MFT. Clop ransomware gang is the company that managed to infiltrate the servers and siphon data and a portion of employee data might have been compromised.

Software 136

LifeWorks

More Trending

article thumbnail

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

Security Boulevard

Federal Communications Commission rules to block illegal text messages. What took you so long? The post FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work? appeared first on Security Boulevard.

Scams 131
article thumbnail

Microsoft is testing a built-in crypto wallet in Microsoft Edge

Bleeping Computer

Microsoft is working on a non-custodial built-in Ethereum crypto wallet for Microsoft Edge to allow users to send and receive cryptocurrency and NFTs. [.

article thumbnail

Microsoft Azure Warns on Killnet's Growing DDoS Onslaught Against Healthcare

Dark Reading

DDoS cyberattack campaigns from the pro-Russian group have spiked significantly.

DDOS 126
article thumbnail

NBA alerts fans of a data breach exposing personal information

Bleeping Computer

The NBA (National Basketball Association) is notifying fans of a data breach after some of their personal information, "held" by a third-party newsletter service, was stolen. [.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

The Small Business Fallacy – Why You Need Cybersecurity and Insurance More Than Ever

Security Boulevard

A common misconception of small business owners is that they can fly under the radar when it comes to ransomware, social engineering, and other cyberattacks. But it turns out that the opposite is true. The post The Small Business Fallacy – Why You Need Cybersecurity and Insurance More Than Ever appeared first on Security Boulevard.

article thumbnail

34 Most Common Types of Network Security Protections

eSecurity Planet

Whether you’re operating a global enterprise network or a small family business, your network’s security needs to be optimized with tools, teams, and processes to protect customer data and valuable business assets. Network security is an umbrella term for all facets of your network’s cybersecurity posture, with an emphasis on developing and using policies, procedures, best practices and tools that safeguard every piece of your network’s overall infrastructure.

article thumbnail

SVB’s collapse is a scammer’s dream: Don’t get caught out

We Live Security

How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense The post SVB’s collapse is a scammer’s dream: Don’t get caught out appeared first on WeLiveSecurity

Banking 120
article thumbnail

Should Your Organization Be Worried About Insider Threats?

IT Security Guru

When you think of cybersecurity threats, what comes to mind? If you pictured faceless criminals (or a team of them) in a dimly-lit headquarters working tirelessly to steal your most precious digital assets, you’re not alone. Yet, cybercrime doesn’t always look like a scene from a Hollywood movie. Sometimes, cyber threats are closer to home, making them all the more surprising (and frustrating) for many organizations.

Risk 117
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Hitachi Energy confirms data breach after Clop GoAnywhere attacks

Bleeping Computer

Hitachi Energy confirmed it suffered a data breach after the Clop ransomware gang stole data using a zero-day GoAnyway zero-day vulnerability. [.

article thumbnail

Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu

Security Boulevard

Unlock the power of Cybersecurity Mesh Architecture (CSMA) to enhance SaaS security. Discover how it can improve compliance and protect your organization. The post Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu appeared first on Security Boulevard.

article thumbnail

Two Patch Tuesday flaws you should fix right now

CSO Magazine

Microsoft released its monthly security bulletin this week, covering patches for over 80 vulnerabilities across its products. However, two of them had already been used by attackers before patches were released. One vulnerability affects all supported versions of Outlook for Windows and allows attackers to steal Net-NTLMv2 hashes and then use them in NTLM (New Technology LAN Manager) relay attacks against other systems.

article thumbnail

Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York

The Hacker News

U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online alias "Pompompurin." The development, first reported by Bloomberg Law, comes after News 12 Westchester, earlier this week, said that federal investigators "spent hours inside and outside of a home in Peekskill.

Hacking 112
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Free decryptor released for Conti-based ransomware following data leak

Graham Cluley

Security researchers have released a new decryption tool which should come to the rescue of some victims of a modified version of the Conti ransomware, helping them to recover their encrypted data for free. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Will Consumers Punish Vendors That Suffer a Data Breach?

Security Boulevard

If a new survey from API and application protection vendor ThreatX is accurate, a majority of U.S. consumers are less likely to work with a company following a data breach. At least, they claim that they are. The ThreatX survey highlighted consumers’ evolving attitudes toward data breach concerns and their purported willingness to pay more. The post Will Consumers Punish Vendors That Suffer a Data Breach?

article thumbnail

FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps

The Hacker News

An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South Korean users under the guise of over 20 popular financial apps. "FakeCalls malware possesses the functionality of a Swiss army knife, able not only to conduct its primary aim but also to extract private data from the victim's device," cybersecurity firm Check Point said.

Malware 111
article thumbnail

Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug

Dark Reading

Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means almost business user could be a victim.

108
108
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Dangerous Android phone 0-day bugs revealed – patch or work around them now!

Naked Security

Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs semi-secret due to likely ease of exploitation.

Mobile 108
article thumbnail

RAT developer arrested for infecting 10,000 PCs with malware

Bleeping Computer

Ukraine's cyberpolice has arrested the developer of a remote access trojan (RAT) malware that infected over 10,000 computers while posing as game applications. [.

Malware 107
article thumbnail

LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions

The Hacker News

U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.

article thumbnail

Makop Ransomware: The Arsenal of Cybercriminals Becomes Known

Heimadal Security

In operation since 2020, the Makop ransomware gang is classified as a tier-B ransomware gang. The threat actor has successfully targeted companies in Europe and Italy with its hybrid arsenal of custom-developed and off-the-shelf software tools despite its low classification. The Makop ransomware operators started their criminal business back in 2020, leveraging a new variant […] The post Makop Ransomware: The Arsenal of Cybercriminals Becomes Known appeared first on Heimdal Security Blog.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Making the digital world safer, one Tesla at a time

Trend Micro

Contestants gather at Pwn2Own Vancouver to showcase their skills and uncover vulnerabilities

article thumbnail

What Is Stack Smashing?

Heimadal Security

Stack smashing is a type of vulnerability that can lead to serious security breaches. This vulnerability occurs when a hacker exploits a flaw in a program’s memory allocation, causing the program to crash or execute arbitrary code. In this article, we will explore what stack smashing is, how it works, and what you can do […] The post What Is Stack Smashing?

105
105
article thumbnail

Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe

We Live Security

Scammers are looking to cash in on the chaos that has set in following the startling meltdowns of Silicon Valley Bank and Signature Bank and the crisis at Credit Suisse The post Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe appeared first on WeLiveSecurity

Banking 99
article thumbnail

New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks

The Hacker News

A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use them to stage distributed denial-of-service (DDoS) attacks.

DDOS 99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!