Mon.Aug 17, 2020

article thumbnail

What They Don’t Tell You About Being a Bounty Hunter or Content Creator

Daniel Miessler

I have been following the bug bounty and security creator/influencer scenes since they started. And as someone in security who also creates content, I feel very close to it all. What I’ve seen in the last year has been troubling. I keep seeing friends and associates—both in conversations and in social media—crumble under the relentless pressure to produce.

Media 205
article thumbnail

Robocall Results from a Telephony Honeypot

Schneier on Security

A group of researchers set up a telephony honeypot and tracked robocall behavior : NCSU researchers said they ran 66,606 telephone lines between March 2019 and January 2020, during which time they said to have received 1,481,201 unsolicited calls -- even if they never made their phone numbers public via any source. The research team said they usually received an unsolicited call every 8.42 days, but most of the robocall traffic came in sudden surges they called "storms" that happened at regular

254
254
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The Last Watchdog

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development. Related: ‘Business logic’ hacks on the rise Consider that we began this century relying on the legacy “waterfall” software development process. This method required a linear plan, moving in one direction, that culminated in a beta deliverable by a hard and fast deadline.

Software 186
article thumbnail

Top 5 password hygiene security protocols companies should follow

Tech Republic Security

Proper password methodologies can be a challenge to master. Learn some tips from industry experts on how to streamline the process and safeguard your organization.

Passwords 201
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Technology giant Konica Minolta hit by a ransomware attack

Security Affairs

IT giant Konica Minolta was hit with a ransomware attack at the end of July, its services have been impacted for almost a week. A ransomware attack has impacted the services at the business technology giant Konica Minolta for almost a week, the attack took place at the end of July. Konica Minolta is a Japanese multinational technology company headquartered in Marunouchi, Chiyoda, Tokyo, with offices in 49 countries worldwide.

article thumbnail

AI-enabled future crimes ranked: Deepfakes, spearphishing, and more

Tech Republic Security

A study explores the possible range and risk of attacks from military robots and autonomous attack drones to AI-assisted stalking. Here are the top 5.

Risk 210

More Trending

article thumbnail

How one attack campaign steals and sells RDP credentials

Tech Republic Security

A hacker known as TrueFighter has been actively selling compromised Remote Desktop Protocol accounts on the Dark Web, says Nuspire.

article thumbnail

CISA warns of phishing attacks delivering KONNI RAT

Security Affairs

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert related to attacks delivering the KONNI remote access Trojan (RAT). The Cybersecurity and Infrastructure Security Agency (CISA) has published an alert to provide technical details on a new wave of attacks delivering the KONNI remote access Trojan (RAT). The KONNI RAT was first discovered in May 2017 by researchers from the Cisco Talos team after it was employed in attacks aimed at organizations linked to North Korea.

Phishing 121
article thumbnail

Top 5 decentralized platforms

Tech Republic Security

Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.

197
197
article thumbnail

The IT Backbone of Cybercrime

Dark Reading

Like their counterparts who run legitimate businesses, cybercriminals need hosting and cybersecurity protection, too.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Top 5 decentralized platforms

Tech Republic Security

Decentralized platforms are aiming to solve the issue of data ownership. Tom Merritt lists five platforms you should know about.

148
148
article thumbnail

REvil Ransomware Hits Jack Daniel's Manufacturer

Dark Reading

Attackers who targeted US spirits manufacturer Brown-Forman reportedly stole a terabyte of confidential data.

article thumbnail

‘EmoCrash’ Exploit Stoppered Emotet For 6 Months

Threatpost

A researcher developed a killswitch exploiting a buffer overflow in Emotet - preventing the malware from infecting systems for six months.

Malware 112
article thumbnail

Advent Completes Forescout Purchase

Dark Reading

The purchase by a private equity fund was announced in February and completed today.

140
140
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Cyberattacks Hit Thousands of Canadian Tax, Benefit Accounts

Threatpost

The Canada Revenue Agency (CRA) suspended online services after accounts were hit in a third wave of credential stuffing attacks this weekend - giving bad actors access to various government services.

article thumbnail

Cybersecurity Companies Among Smaller Firms Hit with Brand Spoofing

Dark Reading

Researchers find smaller organizations, including some in the cybersecurity space, increasingly targeted with these impersonation attacks.

article thumbnail

Jack Daniels, Ritz London Face Cyberattacks

Threatpost

The REvil ransomware and savvy phone scammers have exposed sensitive information.

article thumbnail

Firms Still Struggle to Prioritize Security Vulnerabilities

Dark Reading

Security debt continues to pile up, with 42% of organizations attributing remediation backlogs to a breach, a new study shows.

135
135
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cyber Attack Freezes Canada’s COVID Benefits

SecureWorld News

Another day, another cyberattack that preys on those effected most by COVID-19. From spoofing coronavirus relief to outright stealing from unemployment systems , cybercriminals have targeted vulnerable parties seeking aid from the beginning of the pandemic. These attacks are so prevalent that SecureWorld has a list of the top five ways cybercriminals are using COVID-19 against us.

article thumbnail

Reported Breach Count for H1 2020 Lowest in Five Years

Dark Reading

While reported breach numbers are down, a handful of "mega" breaches resulted in more data records being exposed than ever before, analysis shows.

94
article thumbnail

Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal)

Kali Linux

Its that time of year again, time for another Kali Linux release! Quarter #3 - Kali Linux 2020.3. This release has various impressive updates, all of which are ready for immediate download or updating. A quick overview of what’s new since the last release in May 2020 : New Shell - Starting the process to switch from “Bash” to “ ZSH ” The release of Win-Kex - Get ready WSL2 Automating HiDPI support - Easy switching mode Tool Icons - Every default tool now has its own

article thumbnail

Should I Segment my IoT Devices Onto Their Own Networks?

Dark Reading

Understanding the criticality and importance of the device determines the level of segmentation.

IoT 98
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.