Sun.Aug 08, 2021

article thumbnail

The Case for Establishing a Digital Geneva Convention

Lohrman on Security

Exponential increases in global cyber crime. Ransomware crippling governments and businesses. Nations ignoring cyber criminals operating on their soil. The time for international cooperation on cybersecurity is now.

article thumbnail

A zero-day RCE in Cisco ADSM has yet to be fixed

Security Affairs

A remote code execution (RCE) vulnerability in the Cisco Adaptive Security Device Manager (ADSM) Launcher disclosed in July has yet to be addressed. Cisco provided an update on a remote code execution (RCE) vulnerability (CVE-2021-1585) in the Adaptive Security Device Manager (ADSM) Launcher, the IT giant confirmed that the flaw has yet to be addressed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian govt warns of escalating LockBit ransomware attacks

Bleeping Computer

The Australian Cyber Security Centre (ACSC) warns of an increase of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. [.].

article thumbnail

HackerU acquires Cybint for $50 million

CyberSecurity Insiders

HackerU that transforms lives through digital training has acquired Cybint, a cloud based company that offers education related to Cybersecurity. Although the price of the acquisition is still unknown, some sources reported that HackerU could have paid $43m to $50m to close in the deal. Specifically speaking, HackerU offers security based curriculum and programs through various universities based in Europe, United States and in Asia.

Education 128
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising

Trend Micro

We found a new social engineering-based malvertising campaign targeting Japan that delivered a malicious application. The malicious application abused sideloading vulnerabilities to load and start the Cinobi banking trojan.

Banking 128
article thumbnail

1M compromised cards available for free in the underground market

Security Affairs

Group-IB detected an unconventional post on several carding forums containing links to a file containing 1 million compromised cards. On August 2, Group-IB Threat Intelligence & Attribution system detected an unconventional post on several carding forums. A user, nicknamed AW_cards posted links to a file containing 1 million pieces of stolen payment records.

Marketing 126

More Trending

article thumbnail

RansomEXX Ransomware hits Gigabyte

CyberSecurity Insiders

A ransomware attack targeted on Taiwan-based Laptop Manufacturer Gigabyte is said to have halted the production operation of the company from the past few days. And as per a source from Bleeping Computer, the computer hardware manufacturer was hit by RansomEXX ransomware that could have led to data steal and encryption of data on a few of the critical servers used to manage the IT Infrastructure of the Motherboard manufacturing company.

article thumbnail

Windows 11 is coming soon, but users want these features back

Bleeping Computer

When Microsoft released the first preview build of Windows 11, it was met with praise by many, but also disappointment that many features users have to come to love were suddenly missing. Below we have compiled the most requested features and changes that users want in Windows 11 through the reports in the Feedback Hub. [.].

115
115
article thumbnail

Threat actors are probing Microsoft Exchange servers for ProxyShell flaws

Security Affairs

Threat actors are actively scanning for the Microsoft Exchange ProxyShell RCE flaws after technical details were released at the Black Hat conference. Threat actors started actively scanning for the Microsoft Exchange ProxyShell remote code execution flaws after researchers released technical details at the Black Hat hacking conference. ProxyShell is the name of three vulnerabilities that could be chained by an unauthenticated remote attacker to gain code execution on Microsoft Exchange servers.

Hacking 116
article thumbnail

Security BSides Athens 2021 – Talk 14: Michalis Michalos’ ‘Cyber Resilience: Awareness Is Not Enough’

Security Boulevard

Our thanks to Security BSides Athens for publishing their outstanding Security BSides Athens 2021 Conference videos on the groups' YouTube channel. Permalink. The post Security BSides Athens 2021 – Talk 14: Michalis Michalos’ ‘Cyber Resilience: Awareness Is Not Enough’ appeared first on Security Boulevard.

Education 109
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Remember a Polaroid? Why This Matters and How Tripwire Keeps this Tradition Alive

The State of Security

We’re going to talk about state versus change. For the purposes of our discussion, you need to know that Tripwire Enterprise offers something called TE Commander. Many enterprise applications lack a native command line interface. This can be a challenge if you want to automate and integrate basic operations, which is a necessary function in […]… Read More.

105
105
article thumbnail

Security Affairs newsletter Round 326

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. GhostEmperor, a new Chinese-speaking threat actor targets Southeast Asia WordPress Download Manager Plugin was affected by two flaws China-linked APT groups target telecom companies in Southeast Asia Cisco fixed Remote Code Execution issue in Firepower Device Manager

VPN 100
article thumbnail

What You Should Know About the Google Play Store Changes

WIRED Threat Level

With the first updates kicking in this month, Android apps should be more streamlined and lightweight. Google is also getting a greater level of control.

94
article thumbnail

A zero-day RCE in Cisco ASDM has yet to be fixed

Security Affairs

A remote code execution (RCE) vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher disclosed in July has yet to be addressed. Cisco provided an update on a remote code execution (RCE) vulnerability (CVE-2021-1585) in the Adaptive Security Device Manager (ASDM) Launcher, the IT giant confirmed that the flaw has yet to be addressed.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

S3 Ep44: Unreported holes, retro computing, and tech support for malware [Podcast]

Naked Security

Latest episode - listen now!

Malware 131
article thumbnail

Ask Chloé: Reducing Biased Language in Job Descriptions

Security Boulevard

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé discusses the need to change job description language to be more welcoming to women and marginalized groups in tech. Dear Chloé, I’ve been told. The post Ask Chloé: Reducing Biased Language in Job Descriptions appeared first on Security Boulevard.

article thumbnail

DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk

The Security Ledger

A demonstration at DEF CON of glaring flaws in software by agricultural equipment giants John Deere and Case IH raise the specter of remote, software-based attacks that could cripple farms and impact US food production. The post DEF CON: Security Holes in Deere, Case IH Shine Spotlight on Agriculture Cyber Risk appeared first on The Security. Read the whole entry. » Related Stories Deere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, Equipment Episode 218: Denial

article thumbnail

Managing Entitlements and Access in the Cloud is a Leading Security Risk

Security Boulevard

Public cloud environments offer a flexible way for organizations to provision resources, spin up containers based on ever-changing requirements, and more. Public cloud deployments can quickly turn into a complicated highway of interconnected machines, users, applications, services, containers and microservices. The huge undertaking of keeping track, evaluating risks and defining access policies and permissions for […].

Risk 62
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Best LastPass Alternatives: Compare Password Managers

eSecurity Planet

Password managers play an important role in maintaining a strong security profile, and LastPass is certainly on our list of Best Password Managers & Tools for 2021. However, LastPass isn’t a perfect solution for everyone. Alternative password managers offer a number of advantages over LastPass depending on your business needs. Jump to: About LastPass Top LastPass alternatives 1Password Dashlane Bitwarden Keeper Compare top password managers.

article thumbnail

XKCD ‘Abandonment Function’

Security Boulevard

via the comic artistry and dry wit of Randall Munroe , resident at XKCD ! Permalink. The post XKCD ‘Abandonment Function’ appeared first on Security Boulevard.

62
article thumbnail

Remember a Polaroid? Why This Matters and How Tripwire Keeps this Tradition Alive

Security Boulevard

We’re going to talk about state versus change. For the purposes of our discussion, you need to know that Tripwire Enterprise offers something called TE Commander. Many enterprise applications lack a native command line interface. This can be a challenge if you want to automate and integrate basic operations, which is a necessary function in […]… Read More.

57
article thumbnail

CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

Security Boulevard

CISA announces the new Joint Cyber Defense Collaborative (JCDC), the controversy over Apple scanning devices for child sexual abuse material, and Amazon offers you a $10 credit if you enroll your biometric data in their palm print recognition system. ** Links mentioned on the show ** CISA to partner with Amazon, Google, Microsoft, Verizon, AT&T […].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Security BSides Athens 2021 – Talk 13: Avinash Jain’s ‘Shift Left With Devsecops: Scanning Every Single Code Change’

Security Boulevard

Our thanks to Security BSides Athens for publishing their outstanding Security BSides Athens 2021 Conference videos on the groups' YouTube channel. Permalink. The post Security BSides Athens 2021 – Talk 13: Avinash Jain’s ‘Shift Left With Devsecops: Scanning Every Single Code Change’ appeared first on Security Boulevard.