Thu.Jun 24, 2021

article thumbnail

Gaming industry under siege from cyberattacks during pandemic

We Live Security

Cyberattacks targeting the gaming industry skyrocket, with web attacks more than tripling year-on-year in 2020. The post Gaming industry under siege from cyberattacks during pandemic appeared first on WeLiveSecurity.

article thumbnail

Dell SupportAssist bugs put over 30 million PCs at risk

Bleeping Computer

Security researchers have found four major security vulnerabilities in the BIOSConnect feature of Dell SupportAssist, allowing attackers to remotely execute code within the BIOS of impacted devices. [.].

Risk 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Role of 5G in Defining Cybersecurity Strategies

Security Boulevard

Increased availability and adoption of 5G technology means a more connected world, which in turn means more users with a greater variety of devices. While this means that IT security teams will have more to manage, many of the leading security vendors have been planning for 5G for years. Organizations should be doing all of. The post The Role of 5G in Defining Cybersecurity Strategies appeared first on Security Boulevard.

article thumbnail

Remote Access Trojan now targeting schools with ransomware

Tech Republic Security

Dubbed ChaChi by researchers at BlackBerry, the RAT has recently shifted its focus from government agencies to schools in the US.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft publishes the Windows 11 system requirements

Bleeping Computer

Microsoft has announced the hardware requirements for Windows 11 needed to properly install the operating system and get access to early preview builds. [.].

143
143
article thumbnail

Google Shares Format for Open Source Vulnerability Data

Security Boulevard

Google, in collaboration with several open source communities, today unveiled a schema for describing vulnerabilities in open source software that will make it easier to for developers to track security issues that impact their applications. Dan Lorenc, a staff software engineer for Google, said the vulnerability interchange schema defines a standard format that all vulnerability.

More Trending

article thumbnail

30M Dell Devices at Risk for Remote BIOS Attacks, RCE

Threatpost

Four separate security bugs would give attackers almost complete control and persistence over targeted devices, thanks to a faulty update mechanism.

Risk 144
article thumbnail

A mid-year update for Cybersecurity – 4 trends to watch

CyberSecurity Insiders

This blog was written by an independent guest blogger. It is nearing the mid-year point of 2021, and already it can be characterized as” the year of the breach.” Many companies and institutions saw their security perimeters pierced by hackers including the mega-breaches of Solar Winds and the Colonial Pipeline. The scale of penetration and exfiltration of data by hackers and the implications are emblematic of the urgency for stronger cybersecurity.

article thumbnail

Securing Single-Page Web Applications

Security Boulevard

Single-page web apps are massively growing in popularity. Sites such as Airbnb, Pinterest and LinkedIn represent a new approach to designing and building web sites. The single-page app (SPA) is a next-gen web app and offers a faster and cleaner user experience than a traditional web app. It is, as the name suggests, one page, The post Securing Single-Page Web Applications appeared first on Security Boulevard.

Mobile 129
article thumbnail

WD My Book NAS devices are being remotely wiped clean worldwide

Bleeping Computer

Western Digital My Book NAS owners worldwide are finding that their devices have been mysteriously factory reset and all of their files deleted. [.].

132
132
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

In Memoriam: John McAfee, 1945–2021. R.I.P.

Security Boulevard

John David McAfee took his own life yesterday, in a Spanish prison. The post In Memoriam: John McAfee, 1945–2021. R.I.P. appeared first on Security Boulevard.

article thumbnail

BIOS Disconnect: New High-Severity Bugs Affect 128 Dell PC and Tablet Models

The Hacker News

Cybersecurity researchers on Thursday disclosed a chain of vulnerabilities affecting the BIOSConnect feature within Dell Client BIOS that could be abused by a privileged network adversary to gain arbitrary code execution at the BIOS/UEFI level of the affected device.

article thumbnail

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

Security Affairs

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence spotted a new RAT written in the Go programming language, dubbed ChaChi, which has been used by PYSA (aka Mespinoza ) operators to target victims globally.

article thumbnail

JumpCloud Survey: Remote Work Taking a Security Toll

Security Boulevard

A survey of 400 IT professionals from small to medium enterprises published this week found three quarters of respondents concluded remote work makes it harder for employees to follow good security practices, with two-thirds (66%) admitting they are overwhelmed by the challenge of managing remote work. More than half (56%) of respondents to the survey, The post JumpCloud Survey: Remote Work Taking a Security Toll appeared first on Security Boulevard.

Passwords 117
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Windows 11: The new features coming to Microsoft's next-gen OS

Bleeping Computer

Microsoft has released the next version of Windows called "Windows 11" and it is coming later this year. Windows 11 is the successor to Windows 10 and it's a big update with tons of new features, redesigned Start Menu, and more. [.].

Software 114
article thumbnail

Complicated Active Directory setups are undermining security

Malwarebytes

Security researchers and technical architects from SpecterOps have found that almost every Active Directory installation they have looked at over the last decade has had some kind of misconfiguration issue. And misconfigurations can lead to security issues, such as privilege escalation methods. The researchers have written a paper (pdf) about Active Directory Certificate Services (AD CS) to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, wi

article thumbnail

Microsoft announces Windows 11: Here is what you need to know

Bleeping Computer

Microsoft has officially unveiled the eagerly anticipated next version of Windows, and it is called Windows 11. [.].

143
143
article thumbnail

Cybersecurity industry reacts as antivirus pioneer John McAfee found dead

CSO Magazine

antivirus pioneer John McAfee was found dead in a Spanish prison cell on Wednesday June 25, 2021. According to Spanish authorities, the cause of the 75-year-old’s death was suicide. [ Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. | Sign up for CSO newsletters. ]. The British-born, outspoken millionaire was being held in Barcelona after being arrested in October 2020 on charges of US tax evasion.

Antivirus 113
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Critical Auth Bypass Bug Affects VMware Carbon Black App Control

The Hacker News

VMware has rolled out security updates to resolve a critical flaw affecting Carbon Black App Control that could be exploited to bypass authentication and take control of vulnerable systems. The vulnerability, identified as CVE-2021-21998, is rated 9.4 out of 10 in severity by the industry-standard Common Vulnerability Scoring System (CVSS) and affects App Control (AppC) versions 8.0.x, 8.1.

article thumbnail

Windows 11 will let you run Android apps directly on the desktop

Bleeping Computer

With Microsoft's announcement of Windows 11 today, they also revealed that users would soon be able to run Android apps directly on the desktop. [.].

123
123
article thumbnail

Flaws in Dell's over-the-air device recovery and update impacts millions of devices

CSO Magazine

The over-the-internet firmware update and OS recovery feature present in 128 Dell computer models suffers from certificate validation and other flaws that could allow man-in-the-middle (MitM) attackers to compromise the devices at the firmware level and deploy malicious implants. The vulnerabilities were discovered by researchers from Eclypsium, a company that specializes in hardware and firmware security, and will be fully disclosed during a presentation in August at the DEF CON security confer

Firmware 111
article thumbnail

Binance exchange helped track down Clop ransomware money launderers

Bleeping Computer

Cryptocurrency exchange service Binance played an important part in the recent arrests of Clop ransomware group members, helping law enforcement in their effort to identify, and ultimately detain the suspects. [.].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Confidential Computing Consortium Adds End User Advisory Council

Security Boulevard

Being able to encrypt data while it’s actually being used has always been a challenge. After all, people and systems need to see information in order to use it. For years, security vendors and enterprises alike have sought ways to encrypt such active data, but it has proven to be a significant challenge. The Confidential. The post Confidential Computing Consortium Adds End User Advisory Council appeared first on Security Boulevard.

article thumbnail

Zyxel warns customers of attacks on its enterprise firewall and VPN devices

Security Affairs

Networking equipment giant Zyxel warns customers of a series of attacks that have been targeting some of its enterprise firewall and VPN devices. Networking equipment vendor Zyxel warned its customers of a series of attacks that have been targeting some of its enterprise firewall and VPN server solutions. The threat actors are targeting the USG, ZyWALL, USG FLEX, ATP, and VPN series running on-premise ZLD firmware.

VPN 113
article thumbnail

5 Signs It’s Time for A Web Application Penetration Test

Security Boulevard

Penetration Testing is a potent tool in any organization’s security arsenal. By simulating real cyberattacks under secure conditions, pen-tests throw light on unknown vulnerabilities (including zero-days, logical vulnerabilities, and business. The post 5 Signs It’s Time for A Web Application Penetration Test appeared first on Indusface. The post 5 Signs It’s Time for A Web Application Penetration Test appeared first on Security Boulevard.

article thumbnail

Cybersecurity industry reacts as anti-virus pioneer John McAfee found dead

CSO Magazine

Anti-virus pioneer John McAfee was found dead in a Spanish prison cell on Wednesday June 25, 2021. According to Spanish authorities, the cause of the 75-year-old’s death was suicide. [ Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. | Sign up for CSO newsletters. ]. The British-born, outspoken millionaire was being held in Barcelona after being arrested in October 2020 on charges of US tax evasion.

CSO 108
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

After Van Buren, are Data Scraping Cases Barred?

Security Boulevard

The federal computer crime law makes it both a criminal offense and a civil offense (you can sue for damages or loss) for someone to “access a computer without authorization” or to “exceed authorized access” to a computer, and then do certain proscribed things. But the meaning of the terms “access without authorization” and “exceed. The post After Van Buren, are Data Scraping Cases Barred?

Risk 108
article thumbnail

Meet Jackware that is 10 times more dangerous than Ransomware

CyberSecurity Insiders

All these days we have seen Ransomware locking down access to systems through encryption until a ransom is paid. However, security analysts have discovered a new kind of malware named ‘Jackware’ that is 10 times more dangerous than the usual file-encrypting malware aka Ransomware. Going by the details, we are nowadays using many connecting devices that have tiny computers installed in them such as cars, smart doors, smart appliances, security cameras, healthcare-related devices such as a BP moni

article thumbnail

Phishing attack's unusual file attachment is a double-edged sword

Bleeping Computer

A threat actor uses an unusual attachment to bypass security software that is a double-edged sword that may work against them. [.].

Phishing 126
article thumbnail

5 Effective Strategies for Robust Cyber Security

Security Boulevard

Cyber security strategies an organization needs to protect against prevailing cyber threats! Today large companies are taking a step forward in securing their IT infrastructure against cyber criminals by implementing new methodologies and adopting advanced technological cyber security tools. Now, what could this mean for small businesses? It means they become easy targets for cyber […].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.