Fri.Aug 12, 2022

article thumbnail

Twitter Exposes Personal Information for 5.4 Million Accounts

Schneier on Security

Twitter accidentally exposed the personal information—including phone numbers and email addresses—for 5.4 million accounts. And someone was trying to sell this information. In January 2022, we received a report through our bug bounty program of a vulnerability in Twitter’s systems. As a result of the vulnerability, if someone submitted an email address or phone number to Twitter’s systems, Twitter’s systems would tell the person what Twitter account the submitted em

article thumbnail

Weekly Update 308

Troy Hunt

It was all a bit last minute today after travel, office works and then a quick rebuild of desk and PC before doing this livestream (didn't even have time to comb my hair!) So yes, I took a shortcut with the description of this video, but it all worked out well in the end IMHO with plenty of content that wasn't entirely data breach related, but yeah, that does seem to be a bit of a recurring theme in these vids.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Taxonomy of Access Control

Schneier on Security

My personal definition of a brilliant idea is one that is immediately obvious once it’s explained, but no one has thought of it before. I can’t believe that no one has described this taxonomy of access control before Ittay Eyal laid it out in this paper. The paper is about cryptocurrency wallet design, but the ideas are more general. Ittay points out that a key—or an account, or anything similar—can be in one of four states: safe Only the user has access, loss No one has

article thumbnail

Almost 2,000 data breaches reported for the first half of 2022

Tech Republic Security

Though the number of breaches reported in the first half of 2022 were lower than those for the same period in 2021, Flashpoint expects the final numbers to be similar. The post Almost 2,000 data breaches reported for the first half of 2022 appeared first on TechRepublic.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

UK NHS Hit with Ransomware Attack

Heimadal Security

There are concerns that patient data may have been the target of a ransomware attack on a software supplier that affected the NHS throughout the UK. The UK business Advanced, which was the target of the attack last week, announced that it was cooperating with law enforcement in the wake of the event, including the […]. The post UK NHS Hit with Ransomware Attack appeared first on Heimdal Security Blog.

article thumbnail

Best penetration testing tools: 2022 buyer’s guide

Tech Republic Security

Security professionals need penetration testing tools to understand the security posture of every software environment. Check out our list of the best penetration testing tools in 2022. The post Best penetration testing tools: 2022 buyer’s guide appeared first on TechRepublic.

More Trending

article thumbnail

Intel increases its arsenal against physical hardware attacks

Tech Republic Security

Intel introduced at Black Hat USA, a Tunable Replica Circuit to help protect against certain types of physical fault injection attacks without requiring any interaction with the computer owner. The post Intel increases its arsenal against physical hardware attacks appeared first on TechRepublic.

article thumbnail

Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

The State of Security

Ransomware is to blame for the closure of all 175 7-Eleven stores in Denmark on Monday. The retailer closed all of its stores in Denmark after its cash registers and payment systems were brought down in the attack. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face

Security Boulevard

Cisco got hacked by a ransomware gang—a broker for the UNC2447 threat actor, which has “a nexus to Russia.”. The post Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face appeared first on Security Boulevard.

article thumbnail

Black Hat 2022? Cyberdefense in a global threats era

We Live Security

Our Security evangelist's take on this first day of Black Hat 2022, where cyberdefense was on every mind. The post Black Hat 2022‑ Cyberdefense in a global threats era appeared first on WeLiveSecurity.

102
102
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

What is Magento? Everything You Need To Know

SecureBlitz

In the modern world of e-commerce, there are a huge number of different online platforms for every taste. But if. Read more. The post What is Magento? Everything You Need To Know appeared first on SecureBlitz Cybersecurity.

article thumbnail

Patch Madness: Vendor Bug Advisories Are Broken, So Broken

Dark Reading

Duston Childs and Brian Gorenc of ZDI take the opportunity at Black Hat USA to break down the many vulnerability disclosure issues making patch prioritization a nightmare scenario for many orgs.

99
article thumbnail

Anonymous poop gifting site hacked, customers exposed

Bleeping Computer

ShitExpress, a web service that lets you send a box of feces along with a personalized message to friends and enemies, has been breached after a "customer" spotted a vulnerability. [.].

Hacking 99
article thumbnail

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

The Hacker News

A security feature bypass vulnerability has been uncovered in three signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypass of the UEFI Secure Boot feature.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass

Bleeping Computer

Some signed third-party bootloaders for the Unified Extensible Firmware Interface (UEFI) used by Windows could allow attackers to execute unauthorized code in an early stage of the boot process, before the operating system loads. [.].

article thumbnail

Researchers found one-click exploits in Discord and Teams

Malwarebytes

A group of security researchers have discovered a series of vulnerabilities in Electron, the software underlying popular apps like Discord, Microsoft Teams, and many others, used by tens of millions of people all over the world. Electron is a framework that allows developers to create desktop applications using the languages used to build websites: HTML5, CSS, and JavaScript.

article thumbnail

Cowbell Cyber Allies With Swiss Re on AWS Cyberinsurance

Security Boulevard

Cowbell Cyber this week allied with Swiss Re to provide cybersecurity insurance to organizations with up to $750 million in revenue that deploy applications on the Amazon Web Services (AWS) cloud. The two companies have also integrated the risk assessment tools created by Cowbell and risk monitoring technology developed by Swiss Re. Cowbell’s Cowbell Factors.

article thumbnail

Experts warn of mass exploitation of an RCE flaw in Zimbra Collaboration Suite

Security Affairs

Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass affecting Zimbra Collaboration Suite, tracked as CVE-2022-27925, is actively exploited to hack ZCS email servers worldwide. Zimbra is an email and collaboration platform used by more than 200,000 businesses from over 140 countries.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cybersecurity News Round-Up: Week of August 8, 2022

Security Boulevard

The UK feeling pained following a ransomware attack on the NHS, 18 tech & cyber companies launch new security standard for sharing cybersecurity information. The post Cybersecurity News Round-Up: Week of August 8, 2022 appeared first on Security Boulevard.

article thumbnail

Friday Five 8/12

Digital Guardian

Twitter’s latest security incident, ransomware gangs, and state-sponsored hackers have taken over the news this past week. Catch up on all the latest with this week’s Friday Five!

article thumbnail

Pay with just your palm at Whole Foods

Security Boulevard

Amazon is rolling out its Amazon One payment service to 65 Whole Foods stores in California. The service uses high-tech checkout devices that allow customers to pay simply by scanning their palms. Customers sign up for Amazon One by registering their palmprint with a connected credit card and phone number at special kiosks in participating stores. Once registered, customers can pay for their groceries by hovering their bare hand above the checkout device.

article thumbnail

Chinese hackers backdoor chat app with new Linux, macOS malware

Bleeping Computer

Versions of a cross-platform instant messenger application focused on the Chinese market known as 'MiMi' have been trojanized to deliver a new backdoor (dubbed rshell) that can be used to steal data from Linux and macOS systems. [.].

Malware 96
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Why You Need to Automate Your Onboarding & Offboarding Process

Security Boulevard

The growing threat landscape has made organizations rethink the way they handle business processes like onboarding and offboarding. These processes can& be tedious and time-consuming for an enterprise – and the risk is real. Insider threats from disgruntled departing employees are more than an IT issue. They're a business issue. And enterprise leaders see the importance of cybersecurity in situations like.

Risk 98
article thumbnail

Xiaomi phones with MediaTek chips vulnerable to forged payments

Bleeping Computer

Security analysts have found weaknesses in the implementation of the trusted execution environment (TEE) in MediaTek-powered Xiaomi smartphones, which could enable third-party unprivileged apps to disable the payment system or forge payments. [.].

Mobile 96
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 8/12

Security Boulevard

Insight #1. "Penetration testing and vulnerability scanning are two different things. Penetration testing will give you information about exploiting vulnerabilities whereas a vulnerability scan will just provide you with potential avenues for exploitation. These two should be used in tandem as one of the many tools in your security toolbox to find and fix true positive vulnerabilities.". .

CISO 97
article thumbnail

Xiaomi Phones with MediaTek Chips Found Vulnerable to Forged Payments

The Hacker News

Security flaws have been identified in Xiaomi Redmi Note 9T and Redmi Note 11 models, which could be exploited to disable the mobile payment mechanism and even forge transactions via a rogue Android app installed on the devices.

Mobile 96
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Lowering Cyberinsurance Premiums with Managed Security Services

Security Boulevard

A range of factors, driven in part by the COVID-19 pandemic, accelerated by the work-from-home (WFH) trend and exacerbated by the Russia-Ukraine conflict, has caused midmarket organizations to grapple with a high number of cyberattacks that put every organization at great risk. As a result, a greater number of IT professionals are apprehensive as the.

Risk 97
article thumbnail

The US offers a $10M rewards for info on the Conti ransomware gang’s members

Security Affairs

The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The U.S. State Department announced a $10 million reward for information on five prominent members of the Conti ransomware gang. The government will also reward people that will provide details about Conti and its affiliated groups TrickBot and Wizard Spider.

article thumbnail

API Security Requires Everyone’s Support

Security Boulevard

If you leave cybersecurity responsibilities only to the security team, your organization is setting itself up for a major cybersecurity incident. Security teams are already battling conditions that leave them ripe for burnout. But when non-security staff isn’t held responsible for keeping up with even the most minor security steps, it opens the door for.

article thumbnail

Facebook Testing Default End-to-End Encryption and Encrypted Backup in Messenger

The Hacker News

Social media company Meta said it will begin testing end-to-end encryption (E2EE) on its Messenger platform this week for select users as the default option, as the company continues to slowly add security layers to its various chat services.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.