Fri.Mar 17, 2023

article thumbnail

Feds Charge NY Man as BreachForums Boss “Pompompurin”

Krebs on Security

The U.S. Federal Bureau of Investigation (FBI) this week arrested a New York man on suspicion of running BreachForums , a popular English-language cybercrime forum where some of the world biggest hacked databases routinely show up for sale. The forum’s administrator “ Pompompurin ” has been a thorn in the side of the FBI for years, and BreachForums is widely considered a reincarnation of RaidForums , a remarkably similar crime forum that the FBI infiltrated and dismantled in 20

article thumbnail

How to prevent data theft by existing and departing employees

Tech Republic Security

Some 12% of employees take customer details, health records, sales contracts and other confidential data when leaving a company, according to DTEX. The post How to prevent data theft by existing and departing employees appeared first on TechRepublic.

Risk 153
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hitachi becomes the next victim after a ransomware attack on GoAnywhere software

CyberSecurity Insiders

After Rubrik, Hitachi Energy issued a public statement that some of its customer accounts might have been compromised, after a ransomware attack took place on a third-party software called Fortra GoAnywhere MFT. Clop ransomware gang is the company that managed to infiltrate the servers and siphon data and a portion of employee data might have been compromised.

Software 136
article thumbnail

Android phones can be hacked just by someone knowing your phone number

Graham Cluley

Well, this isn’t good. Google has issued a warning that some Android phones can be hacked remotely, without the intended victim having to click on anything.

Hacking 145
article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

Security Boulevard

Federal Communications Commission rules to block illegal text messages. What took you so long? The post FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work? appeared first on Security Boulevard.

Scams 131
article thumbnail

NBA alerts fans of a data breach exposing personal information

Bleeping Computer

The NBA (National Basketball Association) is notifying fans of a data breach after some of their personal information, "held" by a third-party newsletter service, was stolen. [.

More Trending

article thumbnail

SVB’s collapse is a scammer’s dream: Don’t get caught out

We Live Security

How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense The post SVB’s collapse is a scammer’s dream: Don’t get caught out appeared first on WeLiveSecurity

Banking 116
article thumbnail

Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu

Security Boulevard

Unlock the power of Cybersecurity Mesh Architecture (CSMA) to enhance SaaS security. Discover how it can improve compliance and protect your organization. The post Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu appeared first on Security Boulevard.

article thumbnail

Microsoft is testing a built-in crypto wallet in Microsoft Edge

Bleeping Computer

Microsoft is working on a non-custodial built-in Ethereum crypto wallet for Microsoft Edge to allow users to send and receive cryptocurrency and NFTs. [.

article thumbnail

Two Patch Tuesday flaws you should fix right now

CSO Magazine

Microsoft released its monthly security bulletin this week, covering patches for over 80 vulnerabilities across its products. However, two of them had already been used by attackers before patches were released. One vulnerability affects all supported versions of Outlook for Windows and allows attackers to steal Net-NTLMv2 hashes and then use them in NTLM (New Technology LAN Manager) relay attacks against other systems.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Will Consumers Punish Vendors That Suffer a Data Breach?

Security Boulevard

If a new survey from API and application protection vendor ThreatX is accurate, a majority of U.S. consumers are less likely to work with a company following a data breach. At least, they claim that they are. The ThreatX survey highlighted consumers’ evolving attitudes toward data breach concerns and their purported willingness to pay more. The post Will Consumers Punish Vendors That Suffer a Data Breach?

article thumbnail

Alleged BreachForums owner ‘Pompompurin’ arrested on cybercrime charges

Bleeping Computer

U.S. law enforcement arrested on Wednesday a New York man believed to be Pompompurin, the owner of the BreachForums hacking forum. [.

article thumbnail

Free decryptor released for Conti-based ransomware following data leak

Graham Cluley

Security researchers have released a new decryption tool which should come to the rescue of some victims of a modified version of the Conti ransomware, helping them to recover their encrypted data for free. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Friday Five: Hackers Capitalizing on a Bank Failure, More Concerns Over TikTok, and Pig Butchering Scams on the Rise

Digital Guardian

Hackers are taking advantage of SVB’s failure, scammers are leveraging psychological manipulation to empty victims’ crypto wallets, and TikTok may be in jeopardy in the U.S. Catch up on these stories and more in this week’s Friday Five!

Banking 98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities

Security Boulevard

Today, an organization’s brand and reputation are intrinsically tied to its data security and privacy protections. Years ago, we couldn’t foresee the potential impact of digital technology innovations on brand stability. Network connectivity and digital transformation are a double-edged sword that holds the key to brand promotion and protection while also exposing companies to great.

article thumbnail

Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York

The Hacker News

U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online alias "Pompompurin." The development, first reported by Bloomberg Law, comes after News 12 Westchester, earlier this week, said that federal investigators "spent hours inside and outside of a home in Peekskill.

Hacking 97
article thumbnail

The Ethics of Network and Security Monitoring

Dark Reading

The chances of getting hacked are no longer low. Companies need to rethink their data collection and monitoring strategies to protect employee privacy and corporate integrity.

article thumbnail

Hitachi Energy confirms data breach after Clop GoAnywhere attacks

Bleeping Computer

Hitachi Energy confirmed it suffered a data breach after the Clop ransomware gang stole data using a zero-day GoAnyway zero-day vulnerability. [.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

HinataBot, a new Go-Based DDoS botnet in the threat landscape

Security Affairs

A new Golang-based DDoS botnet, tracked as HinataBot, targets routers and servers by exploiting known vulnerabilities. Akamai researchers spotted a new DDoS Golang-based botnet, dubbed HinataBot, which has been observed exploiting known flaws to compromise routers and servers. The experts reported that the HinataBot bot was seen being distributed since the beginning of 2023 and its operators are actively updating it.

DDOS 94
article thumbnail

Makop Ransomware: The Arsenal of Cybercriminals Becomes Known

Heimadal Security

In operation since 2020, the Makop ransomware gang is classified as a tier-B ransomware gang. The threat actor has successfully targeted companies in Europe and Italy with its hybrid arsenal of custom-developed and off-the-shelf software tools despite its low classification. The Makop ransomware operators started their criminal business back in 2020, leveraging a new variant […] The post Makop Ransomware: The Arsenal of Cybercriminals Becomes Known appeared first on Heimdal Security Blog.

article thumbnail

New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks

The Hacker News

A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use them to stage distributed denial-of-service (DDoS) attacks.

DDOS 93
article thumbnail

RAT developer arrested for infecting 10,000 PCs with malware

Bleeping Computer

Ukraine's cyberpolice has arrested the developer of a remote access trojan (RAT) malware that infected over 10,000 computers while posing as game applications. [.

Malware 97
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Hitachi Energy breached by Clop gang through GoAnywhere Zero-Day exploitation

Security Affairs

Hitachi Energy disclosed a data breach, the Clop ransomware gang stole the company data by exploiting the recent GoAnywhere zero-day flaw. Hitachi Energy disclosed a data breach, the company was hacked by the Clop ransomware gang that stole its data by exploiting the recently disclosed zero-day vulnerability in the GoAnywhere MFT (Managed File Transfer).

article thumbnail

DDoS-as-a-service Attacks. What Are They and How Do They Work?

Heimadal Security

This is the time to remind you again that online threats are always changing and so should your cybersecurity strategy. You know all the major types of cyberattacks that could impact your organization, but hackers took everything to another level with the cybercrime-as-a-service model. Today we talk about DDoS-as-a-service, a practice that combines DDoS (Distributed […] The post DDoS-as-a-service Attacks.

DDOS 91
article thumbnail

Dangerous Android phone 0-day bugs revealed – patch or work around them now!

Naked Security

Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs semi-secret due to likely ease of exploitation.

Mobile 108
article thumbnail

What Is Stack Smashing?

Heimadal Security

Stack smashing is a type of vulnerability that can lead to serious security breaches. This vulnerability occurs when a hacker exploits a flaw in a program’s memory allocation, causing the program to crash or execute arbitrary code. In this article, we will explore what stack smashing is, how it works, and what you can do […] The post What Is Stack Smashing?

88
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps

The Hacker News

An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South Korean users under the guise of over 20 popular financial apps. "FakeCalls malware possesses the functionality of a Swiss army knife, able not only to conduct its primary aim but also to extract private data from the victim's device," cybersecurity firm Check Point said.

Malware 88
article thumbnail

Meta Proposes Revamped Approach to Online Kill Chain Frameworks

Dark Reading

A more holistic model beyond MITRE et al is needed to help defenders better identify and understand commonalities in different online threat campaigns, the Facebook parent company says.

87
article thumbnail

LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions

The Hacker News

U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.

article thumbnail

Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug

Dark Reading

Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means almost business user could be a victim.

108
108
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?