Sun.May 30, 2021

article thumbnail

Are DHS Pipeline Breach Reporting Mandates Just the Beginning?

Lohrman on Security

The Department of Homeland Security is mandating that pipeline companies report cyber breaches to federal authorities within 12 hours of an incident, and the list of organizations who must do the same will likely grow.

186
186
article thumbnail

Interpol intercepts $83 million fighting financial cyber crime

Bleeping Computer

The INTERPOL (short for International Criminal Police Organisation) has intercepted $83 million belonging to victims of online financial crime from being transferred to the accounts of their attackers. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Suspected Ransomware attack shuts down JBS Meat Processing

CyberSecurity Insiders

Meat processing and distribution came to a standstill due to a cyber attack on the servers of JBS Beef and reports are in that the disruption could cause protein deficiency in countries like Australia, the United States, Canada, and some parts of Europe. . Unconfirmed sources reporting to Cybersecurity Insiders have reported that the attack was of ransomware variant and could take days for the meat processing company to find a resolution. .

article thumbnail

Interpol has intercepted $83 million from financial cyber crimes

Security Affairs

Interpol has intercepted $83 million in illicit funds transferred from victims to the accounts used by crooks. An operation conducted by Interpol, codenamed HAECHI-I, conducted by more than 40 officers in the Asia Pacific region over six months period allowed to intercept a total of USD 83 million in illicit funds transferred from victims to the cybercriminals.

Banking 129
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A Road to a Consistent Encryption Strategy

Security Boulevard

Unlike the rest of the world, adoption of enterprise-wide encryption strategies has not grown in the Middle East, in fact. The post A Road to a Consistent Encryption Strategy appeared first on Entrust Blog. The post A Road to a Consistent Encryption Strategy appeared first on Security Boulevard.

article thumbnail

Watch out: These unsubscribe emails only lead to further spam

Bleeping Computer

Scammers use fake 'unsubscribe' spam emails to confirm valid email accounts to be used in future phishing and spam campaigns. [.].

Phishing 144

More Trending

article thumbnail

Memorial Day Weekend Plans?

Security Boulevard

Behold: Dave Granlund' s superb editorial cartoonery, courtesy of PoliticalCartoons, via on Cagle Post. The post Memorial Day Weekend Plans? appeared first on Security Boulevard.

107
107
article thumbnail

Facefish Backdoor delivers rootkits to Linux x64 systems

Security Affairs

Qihoo 360 NETLAB spotted a new backdoor dubbed Facefish that could allow attackers to take over Linux systems and steal sensitive data. Cybersecurity experts from Qihoo 360 NETLAB published details about a new backdoor, dubbed Facefish, which can be used by threat actors to steal login credentials and executing arbitrary commands on Linux systems. The malware was also analyzed by Juniper researchers who observed the use of an exploit against the Control Web Panel (CWP) server administration we

article thumbnail

BSides Canberra 2021 – Jayden Rivers’ ‘Attacking The TCache In GLibc 2.32’

Security Boulevard

Thanks to BSides Canberra for publishing their outstanding videos on the organization's YouTube channel. Enjoy! Permalink. The post BSides Canberra 2021 – Jayden Rivers’ ‘Attacking The TCache In GLibc 2.32’ appeared first on Security Boulevard.

Education 107
article thumbnail

Microsoft teases next generation of Windows 10 — What to expect

Bleeping Computer

CEO Satya Nadella has confirmed that Microsoft is working on the next generation of Windows, which features a new design language internally codenamed "Sun Valley" and is reportedly launching later this year. [.].

Software 103
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hi-5 With A CISO Mário Fernandes, Banco BPI

Security Boulevard

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 years and has been fulfilling dedicated security roles in the cybersecurity space for over 11 years. After serving as a navy officer and […].

CISO 104
article thumbnail

COVID-19 – Phishing attacks target employees that come back to the office

Security Affairs

Hackers are attempting to exploit the return to the “new normal” after the governments are removing restrictions imposed in response to COVID-19. The number of COVID-19 infections are decreasing in many countries and some governments are reducing the restrictions for their citizens. Workers are going back to offices after months of remote working and crooks are attempting to exploit the situation by conducting spear-phishing attacks against their organizations.

Phishing 100
article thumbnail

Microsoft warns against the new Russian Cyber Attacks that targeted 150 US firms

CyberSecurity Insiders

A Russian Hacking group dubbed Nobelium has reportedly targeted more than 3000 Exchange Email server accounts from Microsoft operating across 150 US firms says a report released by Tom Burt, Corporate Vice President and Customer Security & Trust, Microsoft. . Microsoft report specifies that the threat actors are showing interest in only government agencies, think tanks, consultants, and NGOs working across North America and in some parts of Europe and have sidelined small and medium scale b

article thumbnail

Exposing Protonmail and Tutanota’s Illicit Abuse by Ransomware Gangs – A Compilation of Currently Active Ransomware-Themed Email Addresses – Part Two

Security Boulevard

Dear blog readers, I've decided to continue the " Exposing Protonmail and Tutanota's Illicit Abuse by Ransomware Gangs - A Compilation of Currently Active Ransomware-Themed Email Addresses " blog post series and offer an in-depth tactical and actionable threat intelligence on some of the currently active Protonmail and Tutanota email accounts known to have been involved in currently active ransomware campaigns.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Apple's M1 Chip Has a Fascinating Flaw

WIRED Threat Level

The covert channel bug demonstrates a fundamental fact of CPUs: even new ones have vulnerabilities.

96
article thumbnail

Lest We Forget, All Gave Some, Some Gave All

Security Boulevard

The post Lest We Forget, All Gave Some, Some Gave All appeared first on Security Boulevard.

130
130
article thumbnail

Security Affairs newsletter Round 316

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. A malware attack hit the Alaska Health Department CVE-2021-31166 Windows HTTP flaw also impacts WinRM servers Zeppelin ransomware gang is back after a temporary pause 13 flaws in Nagios IT Monitoring Software pose serious risk to orgs Anker fixed an issue that caused access to Eufy video camera feeds to random users French intel found flaws in

VPN 72
article thumbnail

BSides Canberra 2021 – Sean Yeoh’s, Patrick Mortensen’s, Michael Gianarakis’ And Shubham Shah’s ‘Context Aware Content Discovery: The Natural Evolution’

Security Boulevard

Thanks to BSides Canberra for publishing their outstanding videos on the organization's YouTube channel. Enjoy! Permalink. The post BSides Canberra 2021 – Sean Yeoh’s, Patrick Mortensen’s, Michael Gianarakis’ And Shubham Shah’s ‘Context Aware Content Discovery: The Natural Evolution’ appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.