Fri.Nov 27, 2020

article thumbnail

Canon publicly confirms August ransomware attack and data breach

Security Affairs

Canon finally confirmed that it has suffered a ransomware attack in early August that resulted in the theft of data from its servers. Canon has finally confirmed that it was the victim of a ransomware attack in early August and that the threat actors also stole data from its servers. In August, ZDNet first revealed the ransomware attack after it has obtained an internal memo that confirmed the outage suffered by Canon a few days before was caused by a ransomware attack.

article thumbnail

My Top 5 Blogs of the Year

Javvad Malik

I saw Cygenta posted their top 5 blogs of the year on Twitter and thought that it was a wonderful idea to rip off / borrow / be inspired by. So, I proudly present, my top 5 read blogs during the course of 2020. From my blog that is. I’ve written many other articles on other sites this year, and I’m sure some of them have been read more. Anyhow – on to the list. 5: Writing better risk statements Do you struggle to articulate security risks?

InfoSec 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Signs Someone Might be Taking Advantage of Your Security Goodness

Dark Reading

Not everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.

122
122
article thumbnail

A week later, Manchester United has yet to recover after a cyberattack

Security Affairs

Manchester United is still facing problems after the cyber attack that suffered last week, it has yet to fully restore its systems. Last week Manchester United was hit by a sophisticated cyber attack , the attack took place on Friday evening and the football club shut down its systems to prevent the malware from spreading within. “Manchester United can confirm that the club has experienced a cyber attack on our systems.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Staying safe while gaming: how to ensure your children don’t become victims of financial fraud

Quick Heal Antivirus

If you’re a parent and haven’t been in touch with gaming for a while, you’d be surprised at. The post Staying safe while gaming: how to ensure your children don’t become victims of financial fraud appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

article thumbnail

Drupal emergency updates fix critical arbitrary PHP code execution

Security Affairs

Drupal has released emergency security updates to fix a critical flaw with known exploits that could allow for arbitrary PHP code execution. Drupal has released emergency security updates to address a critical vulnerability with known exploits that could be exploited to achieve arbitrary PHP code execution on some CMS versions. The Drupal project uses the PEAR Archive_Tar library that was recently updated to address the CVE-2020-28948 and CVE-2020-28949.

Hacking 93

More Trending

article thumbnail

Failing Toward Zero: Why Your Security Needs to Fail to Get Better

Dark Reading

Each security incident should lead to a successive reduction in future incidences of the same type. Organizations that fail toward zero embrace failure and learn from their mistakes.

127
127
article thumbnail

Details of 16 million Brazilian COVID-19 patients exposed online

Security Affairs

The personal and health details of more than 16 million Brazilian COVID-19 patients, including Government representatives, have been exposed online. Personal and health details of more than 16 million Brazilian COVID-19 patients has been accidentally exposed online due to an error of an employee of a Brazilian hospital. An employee of Albert Einstein Hospital in Sao Paolo has uploaded a spreadsheet containing usernames, passwords, and access keys to sensitive government systems on GitHub.

article thumbnail

Week in security with Tony Anscombe

We Live Security

Is your smart doorbell putting you at risk of cyberattacks? – Spotify accounts hijacked en masse – Staying safe from SIM swapping. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity.

article thumbnail

North Korean hackers allegedly behind cyberattacks on AstraZeneca

Security Affairs

The Reuters agency revealed in an exclusive that the COVID vaccine maker AstraZeneca was targeted by alleged North Korea-linked hackers. According to a report published by Reuters, suspected North Korea-linked hackers targeted AstraZeneca, one of the companies that are developing a COVID vaccine. The attack attempts took place in recent weeks, two people with knowledge of the matter told Reuters.

Hacking 86
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

TurkeyBombing Puts New Twist on Zoom Abuse

Threatpost

Threat actors already stole nearly 4,000 credentials before the holiday was even over, according to report.

Phishing 108
article thumbnail

Test

Dark Reading

A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.

100
100
article thumbnail

Europol and partners thwart massive credit card fraud scheme

We Live Security

The operation was carried out against fraudsters trying to monetize stolen credit card data on the internet’s seedy underbelly. The post Europol and partners thwart massive credit card fraud scheme appeared first on WeLiveSecurity.

article thumbnail

Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes

Threatpost

While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense.

Hacking 113
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

The global impact of the Fortinet 50.000 VPN leak posted online

Security Affairs

The global impact of the Fortinet 50.000 VPN leak posted online, with many countries impacted, including Portugal. A compilation of one-line exploit tracked as CVE-2018-13379 and that could be used to steal VPN credentials from nearly 50.000 Fortinet VPN devices has posted online. This vulnerability resides in an improper limitation of a pathname to a restricted directory (“Path Traversal”) in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an

VPN 135
article thumbnail

Friday Squid Blogging: Diplomoceras Maximum

Schneier on Security

Diplomoceras maximum is an ancient squid-like creature. It lived about 68 million years ago, looked kind of like a giant paperclip, and may have had a lifespan of 200 years. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

185
185
article thumbnail

Trump’s Election Attack Ends December 14—Whether He Knows It or Not

WIRED Threat Level

Despite the Trump campaign’s fight to overturn the election, the wheels of American democracy keep turning.

118
118
article thumbnail

Undermining Democracy

Schneier on Security

Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer, Sidney Powell, argued that Mr. Trump won in a landslide, the entire election in swing states should be overturned and the legislatures should make sure that the electors are selected for the president. The Republican National Committee swung in to support her false claim that Mr.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.