Sat.Jun 05, 2021

article thumbnail

Weekly Update 246

Troy Hunt

This week has been absolutely dominated by code contributions to Pwned Passwords. This is such an awesome, humbling experience that so many people have wanted to contribute their time to something that makes online life better for all of us. The challenge I have now is, as expected, managing the pull requests, reviewing code and ensuring the project heads in the right direction as support for ingesting the FBI -provided passwords is built out.

Passwords 352
article thumbnail

GitHub's new policies allow removal of PoC exploits used in attacks

Bleeping Computer

GitHub announced on Friday their updated community guidelines that explain how the company will deal with exploits and malware samples hosted on their service. [.].

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TikTok Quietly Updated Its Privacy Policy to Collect Users' Biometric Data

The Hacker News

Popular short-form video-sharing service TikTok quietly revised its privacy policy in the U.S., allowing it to automatically collect biometric information such as faceprints and voiceprints from the content its users post on the platform. The policy change, first spotted by TechCrunch, went into effect on June 2. TikTok users who reside in the European Economic Area (EEA), the U.K.

129
129
article thumbnail

Microsoft starts autoupdating Windows 10 2004 to Windows 10 21H1

Bleeping Computer

Microsoft has started training their machine learning algorithms by automatically updating Windows 10 2004 devices to the recently released Windows 10 21H1, the May 2021 feature update. [.].

125
125
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

BlackCocaine Ransomware, a new malware in the threat landscape

Security Affairs

Cyble researchers investigated a recent attack on an India-based IT firm that was hit by the BlackCocaine Ransomware gang. Recently Cyber researchers for Cyble investigated an attack suffered by on May 30, 2021, by Nucleus Software, an India-based IT company in the Banking and Financial Services sector. The company reported the security breach to the Bombay Stock Exchange (BSE) and the National Stock Exchange of India (NSEI).

article thumbnail

Microsoft hints of upcoming Windows 11 reveal later this month

Bleeping Computer

Since 2015, Microsoft has stated that Windows 10 is the last version of the Windows operating, but what is being seen as hints dropped by Microsoft could mean that Windows 11 is around the corner. [.].

117
117

More Trending

article thumbnail

Hacker's guide to deep-learning side-channel attacks: code walkthrough

Elie

Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.

118
118
article thumbnail

Watch out: These online casino emails never pay what they promise

Bleeping Computer

Spammers are abusing affiliate programs to promote online casinos, such as Raging Bull Casino, Sports and Casino, Ducky Luck, and Royal Ace Casino, with misleading emails. [.].

114
114
article thumbnail

US arrested Latvian woman who developed part of Trickbot malware

Security Affairs

The US Department of Justice (DOJ) announced the arrest of a Latvian woman for her alleged role in the development of the Trickbot malware. The US Department of Justice (DOJ) announced the arrest of Alla Witte (aka Max), a Latvian woman that was charged for her alleged role in the development of the Trickbot malware. Alla Witte was arrested on February 6 in Miami, Florida, she has been charged with 19 counts of a 47-count indictment. “Alla Witte, aka Max, 55, is charged in 19 counts of a

Malware 114
article thumbnail

A Swarm of Ransomware Attacks Highlights the Need for High-Quality Threat Detection at the Start of the Attack Chain

Security Boulevard

Ransomware is insidious. It’s a treacherous and crafty way to terrorize individuals, communities, and businesses. It’s also an industry with multiple players, each playing a part in a chain that results in a big payday. Ransomware-as-a-Service (RaaS) groups like DarkSide, REvil, and others use automation, personal information, and the low cost of computing to gather […].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

ALERT: Critical RCE Bug in VMware vCenter Server Under Active Attack

The Hacker News

Malicious actors are actively mass scanning the internet for vulnerable VMware vCenter servers that are unpatched against a critical remote code execution flaw, which the company addressed late last month. The ongoing activity was detected by Bad Packets on June 3 and corroborated yesterday by security researcher Kevin Beaumont. "Mass scanning activity detected from 104.40.252.

Internet 101
article thumbnail

US CISA published a guide to better use the MITRE ATT&CK framework

Security Affairs

The U.S. CISA announced the availability of a new guide for cyber threat intelligence experts on the use of the MITRE ATT&CK framework. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week released a new guide for cyber threat intelligence experts on the use of the MITRE ATT&CK framework. In 2018, MITRE announced the MITRE ATT&CK , a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

article thumbnail

GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks

The Hacker News

Code-hosting platform GitHub Friday officially announced a series of updates to the site's policies that delve into how the company deals with malware and exploit code uploaded to its service. "We explicitly permit dual-use security technologies and content related to research into vulnerabilities, malware, and exploits," the Microsoft-owned company said.

Malware 101
article thumbnail

DoJ: Investigations into ransomware attacks must have similar priority as terrorism

Security Affairs

The U.S. Department of Justice was to assign investigation on ransomware attacks the same priority as terrorism in the wake of the Colonial Pipeline hack. The U.S. Department of Justice plans to equate investigations into ransomware attacks with investigations into terrorism in the wake of the Colonial Pipeline hack. Colonial Pipeline before, and recently the JBS attack, demonstrated that allegedly financially motivated ransomware attack could have a dramatic impact on the targeted organizations

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Break Into Ethical Hacking With 18 Training Courses For Just $42.99

The Hacker News

It is predicted that 3.5 million jobs will be unfilled in the field of cybersecurity by the end of this year. Several of these jobs pay very well, and in most cases, you don't even need a college degree to get hired. The most important thing is to have the skills and certifications.

Hacking 100
article thumbnail

The Joy of Tech® ‘Google’s Hiding Privacy Settings!’

Security Boulevard

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® ! Permalink. The post The Joy of Tech® ‘Google’s Hiding Privacy Settings!’ appeared first on Security Boulevard.

80
article thumbnail

The Safest Way to Store and Share Your Nudes

WIRED Threat Level

Listen, if you’re going to take them, follow these precautions so they don’t go anywhere you don’t intend them to.

92
article thumbnail

Security BSides Dublin 2021 – Matthias Wilson’s ‘Using SOCMINT In Threat Intelligence’

Security Boulevard

Our thanks to Security BSides Dublin for publishing their outstanding videos on the organization's YouTube channel. Enjoy! Permalink. The post Security BSides Dublin 2021 – Matthias Wilson’s ‘Using SOCMINT In Threat Intelligence’ appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The FBI’s Director Compares Ransomware Threat to 9/11

WIRED Threat Level

Plus, a Supreme Court decision on a controversial anti-hacking law, a WhatsApp walk-back, and more of the week’s top security news.

article thumbnail

Hackers Exploit Zero-day in the Fancy Product Designer Plugin

Security Boulevard

Are you one of those who fancy using WordPress plugins? Or are you using the Fancy Product Designer plugin? If yes, then you might be in trouble… Fancy Product Designer, a WordPress plugin is one of the best visual product configurator plugins for WordPress, Shopify, and WooCommerce. It is famous for creating a unique page […]. The post Hackers Exploit Zero-day in the Fancy Product Designer Plugin appeared first on Kratikal Blogs.

article thumbnail

Hacker's guide to deep-learning side-channel attacks: code walkthrough

Elie

Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.

62
article thumbnail

Security BSides Dublin 2021 – Chintan Shah’s ‘Digging The Attack Surface Of Microsoft Rich Text Format Files – An OLE Perspective’

Security Boulevard

Our thanks to Security BSides Dublin for publishing their outstanding videos on the organization's YouTube channel. Enjoy! Permalink. The post Security BSides Dublin 2021 – Chintan Shah’s ‘Digging The Attack Surface Of Microsoft Rich Text Format Files – An OLE Perspective’ appeared first on Security Boulevard.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.