Mon.Oct 23, 2023

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Cisco’s $28 billion acquisition of Splunk comes at an inflection point of security teams beginning to adopt to working with modern, cloud-native data lakes. Related: Dasera launches new Snowflake platform For years, Splunk has been the workhorse SIEM for many enterprise Security Operation Centers (SOCs). However, security teams have challenges with Splunk’s steeply rising costs.

article thumbnail

Child Exploitation and the Crypto Wars

Schneier on Security

Susan Landau published an excellent essay on the current justification for the government breaking end-to-end-encryption: child sexual abuse and exploitation (CSAE). She puts the debate into historical context, discusses the problem of CSAE, and explains why breaking encryption isn’t the solution.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NJ Man Hired Online to Firebomb, Shoot at Homes Gets 13 Years in Prison

Krebs on Security

A 22-year-old New Jersey man has been sentenced to more than 13 years in prison for participating in a firebombing and a shooting at homes in Pennsylvania last year. Patrick McGovern-Allen was the subject of a Sept. 4, 2022 story here about the emergence of “violence-as-a-service” offerings, where random people from the Internet hire themselves out to perform a variety of local, physical attacks, including firebombing a home, “bricking” windows, slashing tires, or perform

Internet 247
article thumbnail

How to Enable Passkeys For Your Google Account

Tech Republic Security

Enable passkeys today for fast and secure access to your Google accounts. And Google Workspace administrators may allow people in their organization to use passkeys, too.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

1Password discloses security incident linked to Okta breach

Bleeping Computer

1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant. [.

article thumbnail

Get a Lifetime Subscription of FastestVPN for just $30

Tech Republic Security

In the market for a new VPN? The top-rated FastestVPN has been reduced to just $29.97 for a lifetime subscription if you get it by October 23rd.

VPN 159

More Trending

article thumbnail

Gartner’s Top 10 Strategic Technology Trends for 2024

Tech Republic Security

Artificial intelligence garners the spotlight, taking the top three positions.

article thumbnail

One login to rule them all: Should you sign in with Google or Facebook on other websites?

We Live Security

Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?

article thumbnail

PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web

Security Affairs

Hundreds of millions of PII records belonging to Indian residents, including Aadhaar cards, are being offered for sale on the Dark Web. PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web In early October, Resecurity’s HUNTER (HUMINT) unit identified hundreds of millions of personally identifiable information (PII) records belonging to Indian residents, including Aadhaar cards, being offered for sale on the Dark Web.

article thumbnail

1Password Detects Suspicious Activity Following Okta Support Breach

The Hacker News

Popular password management solution 1Password said it detected suspicious activity on its Okta instance on September 29 following the support system breach, but reiterated that no user data was accessed.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

US energy firm shares how Akira ransomware hacked its systems

Bleeping Computer

In a rare display of transparency, US energy services firm BHI Energy details how the Akira ransomware operation breached their networks and stole the data during the attack. [.

article thumbnail

Backdoor Implant on Hacked Cisco Devices Modified to Evade Detection

The Hacker News

The backdoor implanted on Cisco devices by exploiting a pair of zero-day flaws in IOS XE software has been modified by the threat actor so as to escape visibility via previous fingerprinting methods. "Investigated network traffic to a compromised device has shown that the threat actor has upgraded the implant to do an extra header check," NCC Group's Fox-IT team said.

Hacking 125
article thumbnail

Citrix warns admins to patch NetScaler CVE-2023-4966 bug immediately

Bleeping Computer

Citrix warned admins today to secure all NetScaler ADC and Gateway appliances immediately against ongoing attacks exploiting the CVE-2023-4966 vulnerability. [.

132
132
article thumbnail

Don’t use AI-based apps, Philippine defense ordered its personnel

Security Affairs

The Philippine defense ordered its personnel to stop using AI-based applications to generate personal portraits. The Philippine defense warned of the risks of using AI-based applications to generate personal portraits and ordered its personnel to stop using them. On October 14, Defense Secretary Gilberto Teodoro Jr. issued the directive to ban the AI-based applications. “Defense Secretary Gilberto Teodoro Jr. issued the order in an Oct. 14 memorandum, as Philippine forces have been working

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Spain arrests 34 cybercriminals who stole data of 4 million people

Bleeping Computer

The Spanish National Police have dismantled a cybercriminal organization that carried out a variety of computer scams to steal and monetize the data of over four million people. [.

Scams 118
article thumbnail

SolarWinds fixed three critical RCE flaws in its Access Rights Manager product

Security Affairs

Researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. Security researchers discovered three critical remote code execution vulnerabilities in the SolarWinds Access Rights Manager (ARM) product. SolarWinds Access Rights Manager (ARM) is a software solution developed by IT management and monitoring software provider SolarWinds, it was designed to help organizations manage and monitor user access and permissions in their I

article thumbnail

Quasar RAT Leverages DLL Side-Loading to Fly Under the Radar

The Hacker News

The open-source remote access trojan known as Quasar RAT has been observed leveraging DLL side-loading to fly under the radar and stealthily siphon data from compromised Windows hosts.

119
119
article thumbnail

Cisco warns of a second IOS XE zero-day used to infect devices worldwide

Security Affairs

Cisco found a second IOS XE zero-day vulnerability, tracked as CVE-2023-20273, which is actively exploited in attacks in the wild. Cisco last week warned customers of a zero-day vulnerability, tracked as CVE-2023-20198 (CVSS score 10), in its IOS XE Software that is actively exploited in attacks. The IT giant found the vulnerability during the resolution of multiple Technical Assistance Center (TAC) support cases.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Network Data Loss Prevention (nDLP) - How Does it Differ from Endpoint Data Loss Prevention (eDLP)?

Digital Guardian

Looking for a nDLP vs. eDLP cheat sheet? In this blog, we break down how network data loss prevention (nDLP) differs from endpoint data loss prevention (eDLP) and vice versa.

119
119
article thumbnail

University of Michigan employee, student data stolen in cyberattack

Bleeping Computer

The University of Michigan says in a statement today that they suffered a data breach after hackers broke into its network in August and accessed systems with information belonging to students, applicants, alumni, donors, employees, patients, and research study participants. [.

article thumbnail

The outstanding stealth of Operation Triangulation

SecureList

Introduction In our previous blogpost on Triangulation , we discussed the details of TriangleDB, the main implant used in this campaign, its C2 protocol and the commands it can receive. We mentioned, among other things, that it is able to execute additional modules. We also mentioned that this operation was quite stealthy. This article details one important aspect of this attack – the stealth that was exercised by the threat actor behind it.

article thumbnail

Block Ads for a Special Price of Just $10/Year

Tech Republic Security

Block ads with a dual 3-year subscription plan of AdGuard VPN and AdGuard Ad Blocker, now available for just $29.97 through October 23.

VPN 121
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

City of Philadelphia suffers a data breach

Security Affairs

The City of Philadelphia discloses a data breach that resulted from a cyber attack that took place on May 24 and that compromised City email accounts. The City of Philadelphia announced it is investigating a data breach after attackers that threat actors broke some of City email accounts containing personal and protected health information. The incident was discovered on May 24, but further investigation revealed that threat actors have had access to the compromised email accounts at least since

article thumbnail

How to Remove an Apple ID from an iPhone

Tech Republic Security

Learn how to remove an Apple ID from your iPhone easily with this step-by-step guide.

Mobile 142
article thumbnail

CISA adds second Cisco IOS XE flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added the vulnerability CVE-2023-20273 in Cisco IOS XE to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability CVE-2023-20273 in Cisco IOS XE to its Known Exploited Vulnerabilities catalog. The vulnerability is an unspecified issue in the web user interface.

Passwords 109
article thumbnail

Malicious Apps Spoof Israeli Attack Detectors: Conflict Goes Mobile

Dark Reading

A spoofed version of an Israeli rocket-attack alerting app is targeting Android devices, in a campaign that shows how cyber-espionage attacks are shifting to individual, everyday citizens.

Mobile 108
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Securing Kubernetes Ingress Controllers with SSL / TLS Certificates

GlobalSign

Increased adoption of Kubernetes controllers requires the right security measures. Let’s explore securing Kubernetes plug-ins with SSL / TLS.

117
117
article thumbnail

1Password reports security incident after breach at Okta

Malwarebytes

Password manager 1Password says it’s been affected by a breach at Okta , but it reports no user data has been stolen. In a security incident report , 1Password says that a member of its IT team received an unexpected email suggesting they had initiated an Okta report of a list of admins. They hadn't requested it so they reported the email to the security department.

article thumbnail

International Authorities Take Down Ragnar Locker Ransomware Group

SecureWorld News

Law enforcement authorities from 11 countries last week conducted a coordinated takedown of the Ragnar Locker ransomware group, delivering a major blow to one of the most dangerous ransomware operations of recent years. The operation was led by Europol and Eurojust, with searches conducted in Czechia, Spain, and Latvia. The main perpetrator, suspected to be a developer of the Ragnar group, was arrested in Paris, while his home in Czechia was searched.

article thumbnail

Tips to Help Avoid Internet Fraud

Identity IQ

Tips to Help Avoid Internet Fraud IdentityIQ Today, where the internet plays a crucial role in our daily lives, it is essential to be vigilant and proactive in helping protect yourself from internet fraud. Online scams and fraudulent activities continue to evolve, targeting unsuspecting individuals and causing substantial financial and personal harm.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.