Sat.Sep 25, 2021

article thumbnail

Bitcoin.org hackers steal $17,000 in 'double your cash' scam

Bleeping Computer

This week, threat actors hijacked Bitcoin.org, the authentic website of the Bitcoin project, and altered parts of the website to push a cryptocurrency giveaway scam that unfortunately some users fell for. Although the hack lasted for less than a day, hackers seem to have walked away with a little over $17,000. [.].

Scams 136
article thumbnail

GSS, one of the major European call center providers, suffered a ransomware attack

Security Affairs

The customer care and call center provider GSS has suffered a ransomware attack that crippled its systems and impacted its Spanish-speaking customers. GSS customer care and call center provider has suffered a ransomware attack that crippled its system and paralyzed call centers serving its Spanish-speaking customers. GSS is the Spanish and Latin America division of Covisian, a European giant of customer care and call center providers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Windows 10 emergency update resolves KB5005565 app freezes, crashes

Bleeping Computer

Microsoft has released an emergency fix for freezing and crashing app issues caused by September's KB5005565 and KB5005101 cumulative updates. [.].

145
145
article thumbnail

Google addressed the eleventh Chrome zero-day flaw this year

Security Affairs

Google released a Chrome emergency update for Windows, Mac, and Linux that addresses a high-severity zero-day flaw exploited in the wild. Google has released Chrome 94.0.4606.61 for Windows, Mac, and Linux that addresses a high-severity zero-day vulnerability (CVE-2021-37973) exploited in the wild. An attacker can exploit this flaw to execute arbitrary code on systems running vulnerable Chrome versions.

Hacking 82
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft WPBT flaw lets hackers install rootkits on Windows devices

Bleeping Computer

Security researchers have found a flaw in the Microsoft Windows Platform Binary Table (WPBT) that could be exploited in easy attacks to install rootkits on all Windows computers shipped since 2012. [.].

116
116
article thumbnail

Even the CIA and NSA Use Ad Blockers to Stay Safe Online

WIRED Threat Level

Plus: The ransomware scourge continues, a massive botnet gets wounded, and more of the week’s top security news.

More Trending

article thumbnail

Designing Toxic Content Classification for a Diversity of Perspectives

Elie

This large-scale study demonstrates, by surveying 17280 participants, that existing toxicity classifiers fail to generalize to the diverse concerns of Internet users.

article thumbnail

DEF CON 29 Cloud Village – Michael Raggo’s ‘Identifying Toxic Combinations Of Permissions’

Security Boulevard

Our thanks to DEFCON for publishing their tremendous DEFCON Conference Cloud Village videos on the groups' YouTube channel. Permalink. The post DEF CON 29 Cloud Village – Michael Raggo’s ‘Identifying Toxic Combinations Of Permissions’ appeared first on Security Boulevard.

article thumbnail

Designing Toxic Content Classification for a Diversity of Perspectives

Elie

This large-scale study demonstrates, by surveying 17280 participants, that existing toxicity classifiers fail to generalize to the diverse concerns of Internet users.

article thumbnail

The Joy of Tech® ‘The Facebook Files’

Security Boulevard

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® ! Permalink. The post The Joy of Tech® ‘The Facebook Files’ appeared first on Security Boulevard.

62
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Bad Actor Using New Method to Avert Detection, Google Discovers

SecureWorld News

Whether it is ransomware, other types of malware, or any number of cyberattacks, threat actors keep inventing new techniques to cause disruption. Google recently landed on one of these techniques while tracking hackers in this ongoing game of cat-and-mouse. In a blog post, Neel Mehta, Information Security lead for Google, explains how a hacker has managed to break certificate code parsing to invade email inboxes and infect users with malware.

Malware 62
article thumbnail

Weekly Update 262

Troy Hunt

5 years of weekly updates, wow. It's not like anything of much significance has happened in that time, right?! I've done these videos every single week without fail, through high and lows and no matter where I was in the world. As I say early on, they've helped keep me focused and whilst it hasn't always been easy to sit here and create them each week, I'm very glad I've done it.

article thumbnail

Threat actors are attempting to exploit VMware vCenter CVE-2021-22005 flaw

Security Affairs

Immediately after the public release of the exploit code for the VMware vCenter CVE-2021-22005 flaw threat actors started using it. Researchers warn that immediately after the release of the exploit code for the recently addressed CVE-2021-22005 flaw in VMware vCenter threat actors started using it. The CVE-2021-22005 issue is a critical arbitrary file upload vulnerability that impacts appliances running default vCenter Server 6.7 and 7.0 deployments. vCenter Server is the centralized management

article thumbnail

Pentera Named a 2021 SINET16 Innovator

CyberSecurity Insiders

BOSTON & TEL AVIV, Israel–( BUSINESS WIRE )– Pentera (formerly Pcysys), the leader in Automated Security Validation, today announced it has been named a 2021 SINET16 Innovator Award winner. The highly renowned program recognizes the 16 most innovative and compelling cybersecurity companies in the world. Pentera disrupts traditional approaches to vulnerability management by showing CISOs exactly how attackers and ransomware threats can exploit their network and infrastructure.

CISO 64
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

European Union formally blames Russia for the GhostWriter operation

Security Affairs

European Union representatives formally accused Russia of attempting to target the elections and political systems of several EU states. European Union has formally accused Russia of meddling in the elections and political systems of several EU states. EU high representative said that Russia-linked threat actors were behind a recent operation tracked as Ghostwriter.