Sun.May 22, 2022

article thumbnail

What’s the Latest on Cyber Talent and Staffing Shortages?

Lohrman on Security

The topic of cyber staffing shortages is a hot issue that has grown hotter during the pandemic. So what are some of the latest trends, newer perspectives and opportunities available?

167
167
article thumbnail

North Korea-linked Lazarus APT uses Log4J to target VMware servers

Security Affairs

North Korea-linked Lazarus APT is exploiting the Log4J remote code execution (RCE) in attacks aimed at VMware Horizon servers. North Korea-linked group Lazarus is exploiting the Log4J RCE vulnerability ( CVE-2021-44228 ) to compromise VMware Horizon servers. Multiple threat actors are exploiting this flaw since January, in January VMware urged customers to patch critical Log4j security vulnerabilities impacting Internet-exposed VMware Horizon servers targeted in ongoing attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google: Predator spyware infected Android devices using zero-days

Bleeping Computer

Google's Threat Analysis Group (TAG) says that state-backed threat actors used five zero-day vulnerabilities to install Predator spyware developed by commercial surveillance developer Cytrox. [.].

Spyware 143
article thumbnail

Threat actors target the infoSec community with fake PoC exploits

Security Affairs

Researchers uncovered a malware campaign targeting the infoSec community with fake Proof Of Concept to deliver a Cobalt Strike beacon. Researchers from threat intelligence firm Cyble uncovered a malware campaign targeting the infoSec community. The expert discovered a post where a researcher were sharing a fake Proof of Concept (POC) exploit code for an RPC Runtime Library Remote Code Execution flaw ( CVE-2022-26809 CVSS 9.8).

InfoSec 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Elon Musk deep fakes promote new BitVex cryptocurrency scam

Bleeping Computer

Cryptocurrency scammers are using deep fake videos of Elon Musk and other prominent cryptocurrency advocates to promote a BitVex trading platform scam that steals deposited currency. [.].

article thumbnail

The Pwn2Own Vancouver 2022: Trend Micro and ZDI awarded $1,155,000

Security Affairs

The Pwn2Own Vancouver 2022 hacking contest ended, Trend Micro and ZDI awarded a total of $1,155,000 for successful attempts! During the third day of the Pwn2Own Vancouver 2022 hacking competition, white hat hackers demonstrated a working exploit against Microsoft Windows 11 OS. nghiadt12 from Viettel Cyber Security demonstrated an exploit for an escalation of privilege via Integer Overflow on Microsoft Windows 11.

Hacking 134

More Trending

article thumbnail

What is cryptography? How algorithms keep information secret and safe

CSO Magazine

Cryptography definition. Cryptography is the art of keeping information secure by transforming it into form that unintended recipients cannot understand. In cryptography, an original human readable message, referred to as plaintext, is changed by means of an algorithm, or series of mathematical operations, into something that to an uninformed observer would look like gibberish; this gibberish is called ciphertext.

article thumbnail

What’s the Latest on Cyber Talent and Staffing Shortages?

Security Boulevard

The topic of cyber staffing shortages is a hot issue that has grown hotter during the pandemic. So what are some of the latest trends, newer perspectives and opportunities available? The post What’s the Latest on Cyber Talent and Staffing Shortages? appeared first on Security Boulevard.

130
130
article thumbnail

Kaspersky confirms SMBs are sureshot targets for Hackers

CyberSecurity Insiders

Recent research conducted by Kaspersky has confirmed that Small and Medium Scale businesses are becoming Sureshot targets for cybercriminals, than larger enterprises. In a study conducted between January 2021 to April 2022, researchers have identified that small-scale businesses were three times more likely to be hit by a cyber attack than large business counterparts.

article thumbnail

Why the Cybersecurity Industry Needs to Change Its Siloed Perception

Security Boulevard

As high-profile data theft incidents continue to rise and become more sophisticated, there is a greater-than-ever need for emerging businesses to take their cybersecurity seriously. So, why do many entrepreneurs and “startup unicorns” consider it the turf of large-scale organizations only, even after some of the world’s largest corporations have fallen prey to cybercrime?

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Goodwill Ransomware making victims donate to poor

CyberSecurity Insiders

There seems to be a Robinhood among those spreading ransomware crime, as according to a study conducted by digital threat monitoring firm CloudSEK, a new ransomware variant is asking victims to donate the demanded ransom to the poor and destitute. Yes, a novel ransomware variant named ‘Goodwill Ransomware’ is asking its targets to make donations to organizations that feed the poor and destitute.

article thumbnail

Chinese "Twisted Panda" Hackers Caught Spying on Russian Defense Institutes

The Hacker News

At least two research institutes located in Russia and a third likely target in Belarus have been at the receiving end of an espionage attack by a Chinese nation-state advanced persistent threat (APT).

100
100
article thumbnail

What is DevSecOps and how should it work?

Acunetix

DevSecOps stands for development, security, and operations. Similar to DevOps or SecOps, it is a concept that joins two previously separate roles into a unified environment. DevSecOps teams are responsible for providing conditions for continuous secure software development. Being a newer concept than DevOps, DevSecOps. Read more. The post What is DevSecOps and how should it work?

article thumbnail

BSides Prishtina 2022 – Arian Sheremeti’s ‘Understanding Cyber Security Threats And Challenges In Protecting Critical Infrastructure’

Security Boulevard

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. Permalink. The post BSides Prishtina 2022 – Arian Sheremeti’s ‘Understanding Cyber Security Threats And Challenges In Protecting Critical Infrastructure’ appeared first on Security Boulevard.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Security Affairs newsletter Round 366 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for free in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Asian media company Nikkei suffered a ransomware attack Russia-linked Sandworm continues to conduct attacks against Ukraine Cisco fixes an IOS XR flaw actively exploited in the wild QNAP warns of a new wave of DeadBolt ransomware attacks against its NA

article thumbnail

Microsoft tests new Windows 11 Desktop search that only works with Edge

Bleeping Computer

Microsoft is testing a new feature in the latest Windows 11 preview build that displays an Internet search box directly on the desktop. The problem is that it does not honor your default browser and only uses Bing and Microsoft Edge instead. [.].

article thumbnail

Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?

Security Boulevard

What is Apple Mail Privacy Protection and how does it hide your IP address, so senders can’t link it to your online activity or determine your location, government authorities such as the FBI and NSA have released a list of top attack vectors used to gain initial access by attackers, and how more companies are […]. The post Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?

article thumbnail

How to Limit Who Can Contact You on Facebook

WIRED Threat Level

You don't want just anyone in your inbox. Here's how to take control.

82
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

#TripwireBookClub – Go H*ck Yourself

Security Boulevard

After a busy start to the year, we were finally able to settle down and take a look at a new book. This time around, we’re looking at Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense by Bryson Payne. The No Starch Press page describes the book as “an eye-opening, hands-on introduction […]… Read More. The post #TripwireBookClub – Go H*ck Yourself appeared first on The State of Security.

article thumbnail

How do Red Team Exercises help CISO to Validate the Security Controls Effectively?

Security Boulevard

Red Team Exercises are one of the best ways for CISOs to validate the security controls effectively. By simulating a real-world attack, Red Team exercises help organizations identify their vulnerabilities and determine how well their security controls stand up against […]. The post How do Red Team Exercises help CISO to Validate the Security Controls Effectively?

CISO 57
article thumbnail

Joy Of Tech® ‘Elon Can Be Such A Dodo’

Security Boulevard

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® ! Permalink. The post Joy Of Tech® ‘Elon Can Be Such A Dodo’ appeared first on Security Boulevard.

57
article thumbnail

BSides Prishtina 2022 – Megi Bashi’s, Ryan Dinnan’s, Jacob Abraham’s, Joshua Pardhe’s ‘Hacking Back Scammers’

Security Boulevard

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. Permalink. The post BSides Prishtina 2022 – Megi Bashi’s, Ryan Dinnan’s, Jacob Abraham’s, Joshua Pardhe’s ‘Hacking Back Scammers’ appeared first on Security Boulevard.

Hacking 51
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.