Sun.Sep 19, 2021

article thumbnail

For Gov Tech Cyber Best Practices, See the 2021 NASCIO Awards

Lohrman on Security

For decades, NASCIO has provided best practices for governments to learn from. This year is no different, and three finalists offer lessons for all public-sector agencies.

article thumbnail

Why Edward Snowden is urging users to stop using ExpressVPN?

Security Affairs

The popular whistleblower Edward Snowden recommends customers of ExpressVPN VPN service to stop using it. Last week the Israeli cybersecurity firm Kape Technologies has acquired the industry’s leading virtual private networks ExpressVPN, as part of a $936 million deal. Kape announced that the acquisition will more than double its overall customer base, from almost 3 million customers to more than 6 million.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attacks Growing More Sophisticated

Security Boulevard

Cybercriminals attacked with gusto in the first half of 2021 and attacks show no signs of slowing down. In just the first half of the year, malicious actors exploited dangerous vulnerabilities across different types of devices and operating systems, leading to major attacks that shut down fuel networks and extracted millions from enterprises. These were.

article thumbnail

New "Elon Musk Club" crypto giveaway scam promoted via email

Bleeping Computer

A new Elon Musk-themed cryptocurrency giveaway scam called the "Elon Musk Mutual Aid Fund" or "Elon Musk Club" is being promoted through spam email campaigns that started over the past few weeks. [.].

Scams 140
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Learn dance from Artificial Intelligence AI based Robots

CyberSecurity Insiders

All these days we have seen robots driving cars, manufacturing goods and automobiles and some doing day-to-day household chores. In coming years, we will see robots based on Artificial Intelligence teaching dance to those interested. Yes, a team of researchers led by Prof. Brian Magerko has started work on a project that focuses on teaching AI based robots the art to dance.

article thumbnail

AT&T lost $200M in seven years to illegal phone unlocking scheme

Bleeping Computer

A Pakistani fraudster was sentenced earlier this week to 12 years in prison after AT&T, the world's largest telecommunications company, lost over $200 million after he and his co-conspirators coordinated a seven year scheme that led to the fraudulent unlocking of almost 2 million phones. [.].

More Trending

article thumbnail

Pakistani man sentenced to 12 years of prison for his role in AT&T hacking scheme

Security Affairs

A Pakistani national has been sentenced to 12 years of prison in the US for his role in a hacking scheme against the telecom giant AT&T. The Pakistani national Muhammad Fahd (35) was sentenced to 12 years of prison in the United States for his primary role in a seven-year scheme to illegally unlock nearly 2 million AT&T phones. Fahd was the mind behind a criminal scheme that begun in 2012 and that caused more than $200 million in losses to the company, according to DoJ, he continued his

Hacking 110
article thumbnail

Numando: A New Banking Trojan Targeting Latin American Users

The Hacker News

A newly spotted banking trojan has been caught leveraging legitimate platforms like YouTube and Pastebin to store its encrypted, remote configuration and commandeer infected Windows systems, making it the latest to join the long list of malware targeting Latin America (LATAM) after Guildma, Javali, Melcoz, Grandoreiro, Mekotio, Casbaneiro, Amavaldo, Vadokrist, and Janeleiro.

Banking 104
article thumbnail

NIST SP800-53 Revision 5, One Year Later

Security Boulevard

It will be one year since NIST released their final version of SP800-53 Revision 5 on September 23, 2020. As a quick reminder SP800-53 is the document issued by NIST that specifies the Security and Privacy Controls that need to be used by agencies of the Federal government. . The post NIST SP800-53 Revision 5, One Year Later appeared first on K2io.

article thumbnail

Numando, a new banking Trojan that abuses YouTube for remote configuration

Security Affairs

Numando, a new banking Trojan that abuses YouTube, Pastebin, and other public platforms as C2 infrastructure and to spread. ESET researchers spotted a new LATAM banking trojan, tracked as Numando, that abuses YouTube, Pastebin, and other public platforms as C2 infrastructure and to spread. The threat actor behind this banking Trojan has been active since at least 2018, it focuses almost exclusively on Brazil but experts spotted rare attacks against users in Mexico and Spain.

Banking 103
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Water Basilisk Uses New HCrypt Variant to Flood Victims with RAT Payloads

Trend Micro

In this blog entry we look into a fileless campaign that used a new HCrypt variant to distribute numerous remote access trojans (RATs) in victim systems. This new variant also uses an updated obfuscation mechanism which we detail.

Malware 102
article thumbnail

Serious vulnerability in HP Omen gaming PCs discovered

CyberSecurity Insiders

HP Omen PCs that assist in high-end gaming are hitting the news headlines for all wrong reasons. Teams of security researchers from SentinelLabs claim that they have discovered a vulnerability in the HP Omen Gaming Hub that can allow hackers to exploit the kernel mode privileges on an Omen PC that could cause disabling of security products, overwrite of system components, corruption of Operating System and use of the targeted device in other malicious cyber campaigns.

article thumbnail

DEF CON 29 Cloud Village – Magno Logan’s ‘Workshop Kubernetes Security 101 Best Practices’

Security Boulevard

Our thanks to DEFCON for publishing their tremendous DEFCON Conference Cloud Village videos on the groups' YouTube channel. Permalink. The post DEF CON 29 Cloud Village – Magno Logan’s ‘Workshop Kubernetes Security 101 Best Practices’ appeared first on Security Boulevard.

article thumbnail

How to Set Up a NAS to Securely Share Files

WIRED Threat Level

From file backups to movie streaming, network attached storage drives offer plenty of functions and features.

Backups 94
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed

Security Boulevard

The latest on the iMessage Zero-Click exploit that affects Apple iOS, MacOS and WatchOS devices (update your Apple devices now!), the names and home addresses of 111,000 British firearm owners have been dumped online, and details on over 60 million fitness tracking records exposed via an unsecured database. ** Links mentioned on the show ** […]. The post iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed appeared first on The Shared Security

article thumbnail

Security Affairs newsletter Round 332

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. The Biden administration plans to target exchanges supporting ransomware operations with sanctions Threat actor has been targeting the aviation industry since at least 2018 Expert discloses details and PoC code for Netgear Seventh Inferno bug CVE-2021-26333 AMD Chipset Driver flaw allows obtaining sensitive data Experts warn that Mirai Botnet

article thumbnail

CommitStrip ‘Coding Maturity’

Security Boulevard

via the textual amusements of Thomas Gx , along with the Illustration talents of Etienne Issartia and superb translation skillset of Mark Nightingale - the creators of CommitStrip ! Permalink. The post CommitStrip ‘Coding Maturity’ appeared first on Security Boulevard.

62
article thumbnail

DEF CON 29 Blockchain Village – Yaz Khoury’s ‘Surviving 51 Percent Attacks’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON Conference Blockchain Village Videos on the groups' YouTube channel. Permalink. The post DEF CON 29 Blockchain Village – Yaz Khoury’s ‘Surviving 51 Percent Attacks’ appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

For Gov Tech Cyber Best Practices, See the 2021 NASCIO Awards

Security Boulevard

For decades, NASCIO has provided best practices for governments to learn from. This year is no different, and three finalists offer lessons for all public-sector agencies. The post For Gov Tech Cyber Best Practices, See the 2021 NASCIO Awards appeared first on Security Boulevard.

article thumbnail

Everything You Need to Know about Cyber Crisis Tabletop Exercises

Security Boulevard

Cybersecurity has become a critical concern in every business sector nowadays due to organizations’ growing dependency on technologies. Research by Immersive Lab reported that in 2019 there were more than 20,000 new vulnerabilities. Not only that, TechRepublic reported that global companies experienced a 148% spike in ransomware attacks after COVID-19 hit the world.

article thumbnail

The Digital Pandemic – Ransomware

Security Boulevard

In 2021, there are two words that can send a cold chill down the spine of any Cybersecurity professional and business leader; Phishing and Ransomware. Research carried out by the Data Analytics and training company CybSafe, identified that 22% of all cyber incidents reported in the first quarter of 2021 were ransomware attacks. According to […]… Read More.