Mon.Oct 04, 2021

article thumbnail

What Happened to Facebook, Instagram, & WhatsApp?

Krebs on Security

Facebook and its sister properties Instagram and WhatsApp are suffering from ongoing, global outages. We don’t yet know why this happened, but the how is clear: Earlier this morning, something inside Facebook caused the company to revoke key digital records that tell computers and other Internet-enabled devices how to find these destinations online.

Internet 357
article thumbnail

Cybersecurity Awareness Month: Time For Improved Education, Better Practices, and Some Nice Give Aways

Joseph Steinberg

Cybersecurity Awareness Month is Here! In October, people across America commemorate Cybersecurity Awareness Month, a national observance jointly established in 2004 by the U.S. Department of Homeland Security (DHS) and the National Cyber Security Alliance. This year, I will be honoring our nation’s commitment to improving cybersecurity throughout the land by. — GIVING AWAY 20 COPIES OF MY BOOK, CyberSecurity For Dummies , courtesy of Netscout. — When CyberSecurity Awareness month wa

Education 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: What it will take to train the next generation of cybersecurity analysts

The Last Watchdog

It is no secret that there is, and has been for some time, a shortage of trained cyber security professionals in corporate IT Security teams. The Wharton School of the University of Pennsylvania observed that “nowhere is the workforce-skills gap more pronounced than in cybersecurity.”. Related: Deploying ‘human’ sensors’ According to data gathered by CyberSeek under a Commerce Department grant, there are currently nearly 465,000 unfilled cyber jobs across the US alone.

article thumbnail

Human vs. Artificial Intelligence in Autonomous Systems

Security Boulevard

A common goal, as we see in many articles on AI (artificial intelligence) and ML (machine learning), is to make AI/ML systems more like humans. Some claim that humans are much better at driving road vehicles than self-driving software, even though the accident statistics appear to contradict this view. Perhaps we have it backwards! Maybe […]. The post Human vs.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Why today’s cybersecurity threats are more dangerous

CSO Magazine

Over the past two years, the rise of big-ticket ransomware attacks and revelations of harmful software supply chain infections have elevated cybersecurity to the top of the government's agenda. At the same time, corporate America and even the general public have awakened to the new array of digital dangers posed by nation-state actors and criminal organizations. [ Learn the The 5 types of cyberattack you're most likely to face. | Get the latest from CSO by signing up for our newsletters.

CSO 141
article thumbnail

Facebook, WhatsApp, and Instagram down due to DNS outage

Bleeping Computer

Users around the world are reporting that they are unable to access Facebook, Instagram, and WhatsApp instead seeing errors that the sites can't be reached. [.].

DNS 145

More Trending

article thumbnail

Ransomware operators behind hundreds of attacks arrested in Ukraine

Bleeping Computer

Europol has announced the arrest of two men in Ukraine, said to be members of a prolific ransomware operation that extorted victims with ransom demands ranging between €5 to €70 million. [.].

article thumbnail

BrandPost: Think You Are Prepared for Ransomware? You’re Probably Not.

CSO Magazine

Ransomware has increased nearly 1100% over the last year according to FortiGuard Labs research , impacting organizations of all sizes and across all market sectors. And according to Fortinet’s State of Ransomware survey , 96% of organizations indicate that they are concerned about the threat of a ransomware attack, with 85% reporting that they are more worried about a ransomware attack than any other cyber threat.

article thumbnail

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

eSecurity Planet

A surprising 91.5 percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent of such organizations that lack processes for decrypting and scanning HTTPS traffic for threats. WatchGuard, which sells network security , intelligence and endpoint protection solutions, included that finding in its recently-released Internet Security Report , which is based on data coming in from t

article thumbnail

4 steps to protect the C-suite from business email compromise attacks

CSO Magazine

The damage from executive email account takeovers can run into millions of dollars, as recent examples show. In 2019, Toyota Boshoku Corporation lost $37 million after the information in a payment direction from a third-party was changed, sending millions to the fraudsters. The recent SolarWinds attack was bad enough, and now Nobelium, the group responsible, has since launched a campaign of email attacks appearing to originate from USAID after its Constant Contact email account was compromised.

CSO 131
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Largest mobile SMS routing firm discloses five-year-long breach

Bleeping Computer

Syniverse, a service provider for most telecommunications companies, disclosed that hackers had access to its databases over the past five years and compromised login credentials belonging to hundreds of customers. [.].

article thumbnail

The Pandora Papers is the Panama Papers turned up to 11

Graham Cluley

It's bad news for billionaires, world leaders, politicians, celebrities, fraudsters and royal family members who wanted to keep their tax-dodging activities secret.

article thumbnail

Facebook October 2021 downtime could result from a revolting Cyber Attack

CyberSecurity Insiders

Facebook (FB) issued a press update on Monday October 4th, 2021, stating that all its online services across the world were down because of a configuration error that couldn’t be fixed on time as most of its staff were working from home. However, some media resources such as UK’s Daily Mail claim that the downtime could result from a sophisticated cyber attack that could have been launched by supporters of Frances Haugen, the lady who whistle blew the social media giant’s data dealing business e

article thumbnail

Facebook, Instagram, and WhatsApp back online after BGP fix

Bleeping Computer

Facebook, Instagram, and WhatsApp are starting to come back online after a BGP routing issue caused an over five-hour worldwide outage. [.].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Does Cybersecurity Awareness Month actually improve security?

Malwarebytes

October is Cybersecurity Awareness Month , formerly known as National Cybersecurity Awareness Month. The idea is to raise awareness about cybersecurity, and provide resources for people to feel safer and more secure online. The month is a collaboration between the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) and it focusses on four themes, in turn: “Be Cyber Smart”, “Phight the Phish”, “Explore.

article thumbnail

UK plans to invest ÂŁ5 billion in retaliatory cyber-attacks

Bleeping Computer

The United Kingdom has revealed plans to invest ÂŁ5 billion in bolstering national cybersecurity that includes creating a "Cyber Force" unit to perform retaliatory attacks. [.].

article thumbnail

LockBit 2.0 ransomware hit Israeli defense firm E.M.I.T. Aviation Consulting

Security Affairs

Israeli Aerospace & Defense firm E.M.I.T. Aviation Consulting Ltd. was hit by LockBit 2.0 ransomware, operators will leak files on 07 Oct, 2021. LockBit 2.0 ransomware operators hit the Israeli aerospace and defense firm E.M.I.T. Aviation Consulting Ltd, threat actors claim to have stolen data from the company and are threatening to leak them on the dark web leak site of the group in case the company will not pay the ransom.

article thumbnail

Don’t Warn Your Co-Workers About That Phishing Test

The State of Security

It is October 2021, and another Cybersecurity Awareness Month is upon us. With so much having occurred over the last year, we should all be experts in personal cybersecurity protection. After all, when our homes became our primary business location, it all became very personal. I once worked at a company that prohibited me from offering personal […]… Read More.

Phishing 115
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

7 deadly sins of Salesforce security

CSO Magazine

Marketing technology, or 'martech', keeps getting more complex and more vital to the way companies do business. For many enterprises, the Salesforce cloud-based customer relationship management (CRM) platform is a centerpiece of the martech strategy. Salesforce is the CRM market leader by a wide margin, with 19.8% market share, according to research firm IDC.

Marketing 113
article thumbnail

Top 5 Skills Modern SOC Teams Need to Succeed

Dark Reading

From basic coding to threat hunting, here are five skills modern SOC teams need to successfully navigate the future of high-scale detection and response.

121
121
article thumbnail

BrandPost: How to Automate Configuration Review

CSO Magazine

Configuration management can be challenging. IT teams can become overwhelmed by the need to address various standards, compliance requirements, and security options. As the popularity of remote work grows, so does the complexity of implementing secure configurations. Thankfully, there are consensus-developed security recommendations and tools available to help automate the process.

112
112
article thumbnail

Facebook, WhatsApp, and Instagram are down worldwide, it’s panic online

Security Affairs

Users worldwide are experiencing problems while accessing Facebook services, including Instagram and WhatsApp. Users worldwide are not able to access Facebook, Instagram, and WhatsApp services due to a BGP problems. Users attempting to visit the above services are displaying “DNS_PROBE_FINISHED_NXDOMAIN.” The mobile applications of the social network giant and its Tor hidden services are also not working.

DNS 116
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems

The Hacker News

A newly discovered data exfiltration mechanism employs Ethernet cables as a "transmitting antenna" to stealthily siphon highly-sensitive data from air-gapped systems, according to the latest research. "It's interesting that the wires that came to protect the air-gap become the vulnerability of the air gap in this attack," Dr.

Wireless 108
article thumbnail

Windows 11 is released: What you need to know and new features

Bleeping Computer

Microsoft has released Windows 11 worldwide, and it is now rolling it out via Windows Update on devices with compatible hardware and the latest updates. [.].

121
121
article thumbnail

Two ransomware operators were arrested in Kyiv with EUROPOL’s support

Security Affairs

Two ransomware operators arrested in Kyiv, Ukraine, that are suspected to have attacked more than 100 companies causing more than $150M in damages. A joint international law enforcement operation led to the arrest of the ransomware operators in Kyiv, Ukraine on September 28. The operation was conducted by the Ukrainian National Police, with the support of Europol, the FBI, Interpol, and French Gendarmerie. “On 28 September, a coordinated strike between the French National Gendarmerie (Gend

article thumbnail

McAfee and FireEye $2 billion merger details

CyberSecurity Insiders

Cybersecurity firms McAfee and FireEye will reportedly be merged to form a $2 billion business by early 2022. And the 40,000 customers (of both firms) and 5000 employees will soon work together to create a benchmark in security business from then on. Highly placed sources reporting to Cybersecurity Insiders have reported that Bryan Palma, the former President of Blackberry and Cisco, will lead the newly merged company.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

New APT Group Mimic Colonial Pipeline Attackers, Others

Security Boulevard

Government servers and Russian energy and aviation industries seem to be the primary targets of a new advanced persistent threat (APT) group that has attacked organizations in 10 countries, using the supply chain to move laterally. The ChamelGang, discovered by researchers at Positive Technologies, has been exploiting ProxyShell flaws to infect Microsoft Exchange.

article thumbnail

This Week’s Trends in Privacy with Nymity Research – October 4, 2021

TrustArc

Below are snapshots of recent global updates courtesy of Nymity Research. Best Practices: ADGM on Data Subjects’ Rights Data subjects have various rights under the Regulations (such as access rights, right to be notified that personal data is being processed, right to rectification and erasure); ensure these rights are complied with unless an exception applies, […].

104
104
article thumbnail

Yale’s Disturbing Ties to Slavery

Security Boulevard

Yale itself published an expose in 2014 about Yale’s terrible reputation: The evidence establishing Yale’s involvement in the slave trade is clear and compelling. There were many interesting points made in an excellent write-up, yet the most interesting one for me was this: Historians have long pointed out that Yale (the University) is deeply implicated … Continue reading Yale’s Disturbing Ties to Slavery ?.

103
103
article thumbnail

Details of Pandora Papers data leak

CyberSecurity Insiders

On October 3rd, 2021, the International Consortium of Investigative Journalists (ICIJ) published the financial details related to Pandora Papers containing sensitive information related to celebrities, politicians, and individuals living across the world. Thus, the Pandora Papers leak of over 11.9 million records has created a political storm among the rich across the world as they contain images, emails, spreadsheets, and documents of over 14 financial service companies in nations such as Panam

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.