Sun.Mar 28, 2021

article thumbnail

No, I Did Not Hack Your MS Exchange Server

Krebs on Security

New data suggests someone has compromised more than 21,000 Microsoft Exchange Server email systems worldwide and infected them with malware that invokes both KrebsOnSecurity and Yours Truly by name. Let’s just get this out of the way right now: It wasn’t me. The Shadowserver Foundation , a nonprofit that helps network owners identify and fix security threats , says it has found 21,248 different Exchange servers which appear to be compromised by a backdoor and communicating with brian

Hacking 346
article thumbnail

Should Technology Product Training Be Free?

Lohrman on Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical netmask networking bug impacts thousands of applications

Bleeping Computer

Popular npm component netmask has a critical networking vulnerability, CVE-2021-28918. netmask is frequently used by hundreds of thousands of applications to parse IPv4 addresses and CIDR blocks or compare them. The component gets over 3 million weekly downloads, and as of today, has scored over 238 million total downloads. [.].

145
145
article thumbnail

FatFace pays out $2 million to Conti ransomware gang

Graham Cluley

UK fashion retailer FatFace, which made headlines this week by appearing to ask its customers to keep its cyber attack “strictly private and confidential”, has reportedly paid a $2 million ransom to the criminals responsible.

Retail 144
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CompuCom MSP expects over $20M in losses after ransomware attack

Bleeping Computer

American managed service provider CompuCom is expecting losses of over $20 million following this month's DarkSide ransomware attack that took down most of its systems. [.].

article thumbnail

No, I Did Not Hack Your MS Exchange Server

Security Boulevard

New data suggests someone has compromised more than 21,000 Microsoft Exchange Server email systems worldwide and infected them with malware that invokes both KrebsOnSecurity and Yours Truly by name. Let's just get this out of the way right now: It wasn't me. The post No, I Did Not Hack Your MS Exchange Server appeared first on Security Boulevard.

Hacking 139

More Trending

article thumbnail

Ransomware admin is refunding victims their ransom payments

Bleeping Computer

After recently announcing the end of the operation, the administrator of Ziggy ransomware is now stating that they will also give the money back. [.].

article thumbnail

Zero Trust for Data

Security Boulevard

Encryption has been around for a long time. It is the holy grail in data security because data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Zero trust is a security model based on the [.]. The post Zero Trust for Data appeared first on TechSpective.

article thumbnail

Alex Salmond’s Alba party website leaks data in IDOR foul-up

Graham Cluley

It's just two days since former SNP leader Alex Salmond launched a brand new political party to campaign for an independent Scotland. And already it has suffered a data breach.

article thumbnail

Microsoft Azure Checklist: Expert Advice on Security

Security Boulevard

Key takeaways from our recent webinar on Microsoft Azure cloud security As we discussed in a recent webinar on Microsoft Azure security […]. The post Microsoft Azure Checklist: Expert Advice on Security appeared first on Sonrai Security. The post Microsoft Azure Checklist: Expert Advice on Security appeared first on Security Boulevard.

123
123
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

Security Affairs

A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live broadcasts causing the disruption of its operations. The broadcaster was unable to air its Sunday morning news program, which runs from 7:00 am to 1:00 pm from Sidney. .

article thumbnail

CISO Career In Tech | Avast

Security Boulevard

Jaya Baloo, Avast’s Chief Information Security Officer, never meant to work in tech. Born in India on International Women’s Day , Baloo moved to the US at age four when her parents started working for the United Nations in New York City. That’s where she had her first exposure to computers. The post CISO Career In Tech | Avast appeared first on Security Boulevard.

CISO 102
article thumbnail

New Windows 10 File Explore icons favor design over function

Bleeping Computer

Microsoft has updated the icons used in File Explorer to be the new Fluent icons, and while they look great, there is a tradeoff between design and functionality. [.].

100
100
article thumbnail

QNAP urges users to take action to protect devices against Brute-Force attacks

Security Affairs

Taiwanese manufacturer QNAP published an alert urging its customers to secure their devices after a growing number of users reported that their devices have been hit by brute-force attacks. This week the Taiwanese vendor QNAP has published an alert urging users to secure their devices after a growing number of users reported that their devices have been hit by brute-force attacks. “With increasing reports of brute-force attacks, QNAP urges its users to take immediate action to enhance the

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

NIST SP 800-172 (Formerly SP 800-171B) Release Couldn’t Come at a Better Time

Security Boulevard

NIST’s timely new release of Special Publication (SP) 800-172 (formerly referred to in draft form as 800-171B) provides exactly what its title says, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST SP 800-171. Yet it goes a step further to protect controlled unclassified information (CUI) specifically from APTs.

Risk 91
article thumbnail

How to Keep Nearby Strangers from Sending You Files

WIRED Threat Level

Sharing is caring—except when it's an unwelcome photo from a rando on the subway. Here's how to lock down your phone and computer.

95
article thumbnail

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 322’

Security Boulevard

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink. The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 322’ appeared first on Security Boulevard.

article thumbnail

Serious Security: OpenSSL fixes two high-severity crypto bugs

Naked Security

The bug that broke security when you turned STRICT mode on.

129
129
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Top 3 Privacy Tips for Travel

Security Boulevard

This week, co-host Tom Eston shares his top 3 tips to stay more private when you travel this year on vacation. ** Links mentioned on the show ** Smartphone privacy screens (Amazon) [link] Laptop privacy screens (Amazon) [link] ** Watch this episode on YouTube ** [link] ** Thank you to our sponsors! ** Silent Pocket […]. The post Top 3 Privacy Tips for Travel appeared first on The Shared Security Show.

article thumbnail

Beware of this malicious Android system update

CyberSecurity Insiders

Cybersecurity firm Zimperium has uncovered a latest mobile security threat as a critical system update that is actually a sophisticated malware that steals data and conduct espionage on targeted smart phones. Zimperium zLabs says that the malware has capability of sending images, videos, contacts, messages and documents from the targeted device to remote servers and might also allow the cyber crooks to take control of the android smartphone after few weeks.

article thumbnail

Should Technology Product Training Be Free?

Security Boulevard

“If I buy your product, I don’t want to pay more to learn how to use your product,” said Mark Eggleston, who is CISO, chief privacy officer and vice president at Health Partners Plans. This was an excerpt that came from a CISO podcast series with several respected security and technology industry leaders, like David. The post Should Technology Product Training Be Free?

article thumbnail

Australia Channel 9 TV Ransomware Cyber Attack

CyberSecurity Insiders

Channel Nine, an Australian free to air TV network, was reportedly hit by a cyber attack that sources confirm could be of ransomware variant. The Melbourne based company that is co-owned by Nine Entertainment Co, confirmed that it cannot host a popular weekend television show titled ‘NRL Sunday Footy Show’ as the digital attack has impacted the broadcast services of Channel Nine content deeply.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’

Security Boulevard

Permalink. The post The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’ appeared first on Security Boulevard.

article thumbnail

Take control of Windows 10 feature updates using these settings

Bleeping Computer

In this article, we're highlighting two group policies that you can try to take control over Windows 10 feature updates. [.].

article thumbnail

Experts found two flaws in Facebook for WordPress Plugin

Security Affairs

A critical flaw in the official Facebook for WordPress plugin could be abused exploited for remote code execution attacks. Researchers at Wordfence have discovered two vulnerabilities in the Facebook for WordPress plugin, which has more than 500,000 active installations. The plugin allows administrators to capture the actions people take while interacting with their page, such as Lead, ViewContent, AddToCart, InitiateCheckout and Purchase events. “On December 22, 2020, our Threat Intellige

article thumbnail

USENIX Enigma 2021 – Marcus Botacin’s ‘Does Your Threat Model Consider Country And Culture? A Case Study Of Brazilian Internet Banking Security To Show That It Should!’

Security Boulevard

Many thanks to USENIX Enigma 2021 for publishing these outstanding conference videos on the YouTube USENIX Channel ; don't miss this erudite 27 video information & cybersecurity event. Permalink. The post USENIX Enigma 2021 – Marcus Botacin’s ‘Does Your Threat Model Consider Country And Culture? A Case Study Of Brazilian Internet Banking Security To Show That It Should!

Banking 57
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

New Purple Fox version includes Rootkit and implements wormable propagation

Security Affairs

Researchers from Guardicore have spotted a new variant of the Purple Fox Windows malware that implements worm-like propagation capabilities. Researchers from Guardicore have discovered a new version of the Purple Fox Windows malware that implements worm-like propagation capabilities.Up until recently, Purple Fox’s operators infected machines by using exploit kits and phishing emails.

Malware 57
article thumbnail

Brian Krebs: No, I didn’t hack your Microsoft Exchange server

Zero Day

The KrebsOnSecurity name is, once again, being abused by cyberattackers.

Hacking 84
article thumbnail

Security Affairs newsletter Round 307

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. CISA releases CHIRP, a tool to detect SolarWinds malicious activity Microsoft Defender can now protect servers against ProxyLogon attacks Swiss expert Till Kottmann indicted for conspiracy, wire fraud, and aggravated identity theft Abusing distance learning software t

article thumbnail

emba v1.3.2 releases: analyzer for Linux-based firmware of embedded devices

Penetration Testing

emba, an analyzer for Linux-based firmware of embedded devices Why? emba is being developed as a firmware scanner that analyses already-extracted Linux-based firmware images. It should help you to identify and focus on the interesting... The post emba v1.3.2 releases: analyzer for Linux-based firmware of embedded devices appeared first on Penetration Testing.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.