Mon.Sep 14, 2020

article thumbnail

Due Diligence That Money Can’t Buy

Krebs on Security

Most of us automatically put our guard up when someone we don’t know promises something too good to be true. But when the too-good-to-be-true thing starts as our idea, sometimes that instinct fails to kick in. Here’s the story of how companies searching for investors to believe in their ideas can run into trouble. Nick is an investment banker who runs a firm that helps raise capital for its clients (Nick is not his real name, and like other investment brokers interviewed in this stor

Scams 302
article thumbnail

Interesting Attack on the EMV Smartcard Payment Standard

Schneier on Security

It’s complicated , but it’s basically a man-in-the-middle attack that involves two smartphones. The first phone reads the actual smartcard, and then forwards the required information to a second phone. That second phone actually conducts the transaction on the POS terminal. That second phone is able to convince the POS terminal to conduct the transaction without requiring the normally required PIN.

Mobile 281
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Staples discloses data breach exposing customer order data

Security Affairs

Giant office retail company Staples disclosed a data breach, threat actors accessed some of its customers’ order data. Staples, the office retail giant, disclosed a data breach, it notified its customers that their order data have been accessed by threat actors without authorization. The office retail giant sent out a data breach notification letter to the impacted customers, the incident took place around September 2.

article thumbnail

How to restrict Nextcloud logins to IP addresses

Tech Republic Security

If you want to lock down your Nextcloud instance so only certain computers can log in, follow these steps.

127
127
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CIRWA Project tracks ransomware attacks on critical infrastructure

Security Affairs

Researchers from Temple University have been tracking ransomware attacks on critical infrastructure all over the world. A team of researchers at Temple University in Philadelphia has presented a project named CIRWA (repository of critical infrastructure ransomware attacks) that aims at tracking ransomware attacks on critical infrastructure worldwide.

article thumbnail

How to install Infection Monkey for breach and attack simulations on your network

Tech Republic Security

Have you tested your network using a breach and attack simulator? If not, Jack Wallen shows you how with Infection Monkey.

110
110

More Trending

article thumbnail

Cloud Leak Exposes 320M Dating-Site Records

Threatpost

A misconfigured, Mailfire-owned Elasticsearch server impacted 70 dating and e-commerce sites, exposing PII and details such as romantic preferences.

InfoSec 108
article thumbnail

More Printers Could Mean Security Problems for Home-Bound Workers

Dark Reading

Tricked-out home offices have led to an influx in printers, many of which have not been set up securely, leaving workers and their companies vulnerable.

105
105
article thumbnail

Magecart Attack Impacts More Than 10K Online Shoppers

Threatpost

Close to 2,000 e-commerce sites were infected over the weekend with a payment-card skimmer, maybe the result of a zero-day exploit.

Hacking 112
article thumbnail

Popular Marketing Tool exposes data of users of dating sites

Security Affairs

Personal details of hundreds of users of dating sites were exposed online earlier this month. An Elasticsearch server containing personal details of hundreds of thousands of dating site users were exposed online without authentication. The unsecured database was discovered by security researchers from vpnMentor at the end of August. “ vpnMentor’s research team recently received a report from an anonymous ethical hacker about a massive data leak exposing users of over 70 adult dating and

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Researchers, Companies Slam Mobile Voting Firm Voatz for 'Bad Faith' Attacks

Dark Reading

In a letter, almost 70 different security firms and individual researchers criticize Voatz for misrepresenting to the US Supreme Court widely accepted security research practices.

Mobile 120
article thumbnail

Zerologon attack lets hackers to completely compromise a Windows domain

Security Affairs

Zerologon attack allows threat actors to take over enterprise networks by exploiting the CVE-2020-1472 patched in the August 2020 Patch Tuesday. Administrators of enterprise Windows Servers have to install the August 2020 Patch Tuesday as soon as possible to protect their systems from Zerologon attack that exploits the CVE-2020-1472. The CVE-2020-1472 flaw is an elevation of privilege that resides in the Netlogon.

article thumbnail

Boosting Impact for Profit: Evolving Ransomware Techniques for Targeted Attacks

Trend Micro

A closer look at ransomware: Their changing techniques, targets, best practices, and solutions to defend and mitigate against them.

article thumbnail

TikTok Fixes Flaws That Opened Android App to Compromise

Threatpost

The flaws are disclosed as Oracle reportedly partners with TikTok as concerns in the U.S. over spying continue.

Mobile 104
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Virginia's Largest School System Hit With Ransomware

Dark Reading

Fairfax County Public Schools has launched an investigation following a ransomware attack on some of its technology systems.

article thumbnail

Feds Warn Nation-State Hackers are Actively Exploiting Unpatched Microsoft Exchange, F5, VPN Bugs

Threatpost

Monday's CISA advisory is a staunch reminder for federal government and private sector entities to apply patches for flaws in F5 BIG-IP devices, Citrix VPNs, Pulse Secure VPNs and Microsoft Exchange servers.

VPN 76
article thumbnail

E-Commerce Sites Hit With New Attack on Magento

Dark Reading

The campaign targeted sites running Magento Version 1, a version of the e-commerce software that is past end-of-life.

Software 131
article thumbnail

43% of Orgs Think DevOps Integration Is Critical to AppSec Success

Veracode Security

It???s no secret that the rapid speed of modern software development means an increased likelihood of risky flaws and vulnerabilities in your code. Developers are working fast to hit tight deadlines and create innovative applications, but without the right security solutions integrated into your processes, it???s easy to hit security roadblocks or let flaws slip through the cracks.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Open Source Security's Top Threat and What To Do About It

Dark Reading

With open source developers regularly churning out new tools, the risk landscape has become too fragmented to properly monitor.

Risk 125
article thumbnail

1H 2020 Cyber Security Defined by Covid-19 Pandemic

Trend Micro

Malicious actors have always taken advantage of big news to use as lures for socially engineered threats, but these events tend to be fairly short news cycles. When Covid-19 started making headlines in early 2020, we started seeing new threats using this in the attacks.

article thumbnail

Large Cloud Providers Much Less Likely Than Enterprises to Get Breached

Dark Reading

Pen-test results also show a majority of organizations have few protections against attackers already on the network.

98
article thumbnail

Staff Spotlight: NIST Post-Quantum Cryptography

NSTIC

In July, NIST announced the third-round candidates for the Post Quantum Cryptography (PQC) Standardization Project, intended to determine the best algorithms to help form the first post-quantum cryptography standard. For decades, NIST has been actively involved in cryptography, and NIST mathematicians like Dr. Angela Robinson predict future quantum computers could break the current public-key cryptography tools.

41
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Security Through an Economics Lens: A Guide for CISOs

Dark Reading

An expert in economics and cybersecurity applies opportunity cost and other concepts of the "dismal science" to infosec roles.

InfoSec 77
article thumbnail

Thousands of Magento stores hacked in a few days in largest-ever skimming campaign

Security Affairs

Thousands of Magento online stores have been hacked over the past few days as part of the largest ever skimming campaign. Security experts from cybersecurity firm Sansec reported that nearly 2,000 Magento online stores have been hacked over the past few days as part of the largest ever Magecart-style campaign. Most of the hacked sites were running Magento 1 version, but in some cases, the compromised stores were running Magento 2.

Hacking 97