Fri.Oct 16, 2020

article thumbnail

Barnes & Noble Experiences Major Data Breach

Adam Levin

Barnes & Noble has confirmed a data breach following a cyberattack that took many of their services offline. . The bookseller sent an email to customers notifying them that their personal information had been exposed, but that their financial information had not been compromised. . “While we do not know if any personal information was exposed as a result of the attack, we do retain in the impacted systems your billing and shipping addresses, your email address and your telephone number if yo

article thumbnail

Weekly Update 213

Troy Hunt

The week's update comes on the back of a very long week for me, but it's good to be "out there" speaking at events even if they are just from the comfort of my own home. There's also more adventures in IoT, Chrome's experiment with URL paths in their omnibox and Apple messing around with MAC addresses on my phone and watch. Oh - and I did manage to track down what my favourite Norwegian beer is following a question from the audience: I was asked about my favourite Norwegian beer during my live s

Wireless 171
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to recover deleted files in Linux with testdisk

Tech Republic Security

If you've had files deleted by a hacker or you've accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk.

200
200
article thumbnail

An Uncommon 20 Years of Commonly Enumerating Vulns

Dark Reading

Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).

131
131
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Professor creates cybersecurity camp to inspire girls to choose STEM careers

Tech Republic Security

Teaching via Zoom has had some unexpected benefits, college professor says, though robotics class is still a challenge. Her real passion is inspiring young women and girls to go into computer science.

article thumbnail

Almost 800,000 SonicWall VPN appliances online are vulnerable to CVE-2020-5135

Security Affairs

The Tripwire VERT security team spotted almost 800,000 SonicWall VPN appliances exposed online that are vulnerable to the CVE-2020-5135 RCE flaw. Security experts from the Tripwire VERT security team have discovered 795,357 SonicWall VPN appliances that were exposed online that are vulnerable to the CVE-2020-5135 RCE flaw. “A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious reque

VPN 123

More Trending

article thumbnail

Breach at Dickey’s Barbecue Pit compromises 3 million Cards

Security Affairs

Dickey’s Barbecue Pit, the largest barbecue restaurant chain in the US, suffered a POS breach, card details for 3 Million customers were posted online. Dickey’s Barbecue Pit is a family-owned American barbecue restaurant chain, the company suffered a POS breach and card details of more than three million customers have been posted on the carding portal Joker’s Stash.

article thumbnail

5 ways to manage computers securely and remotely using PowerShell

Tech Republic Security

Being able to secure communications between remote resources is just as important as being able to access the device. Using PowerShell, IT can do both when accessing off-site devices cross-platform.

139
139
article thumbnail

Britain’s information commissioner fines British Airways for 2018 Hack

Security Affairs

Britain’s information commissioner has fined British Airways 20 million pounds for the 2018 hack that exposed data of 400,000 customers. In September 2018, British Airways suffered a data breach that exposed the personal information of 400,000 customers. The hackers potentially accessed the personal data of approximately 429,612 customers and staff.

Hacking 112
article thumbnail

Barnes & Noble restores Nook services after notifying customers about cyberattack

Tech Republic Security

Analysts point to specific clues from the company's response that show it may have been a ransomware attack.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Adobe fixes Magento flaws that can lead to code execution

Security Affairs

Adobe released a series of out-of-band security fixes to address multiple Magento vulnerabilities that lead to code execution, customer list tampering. Adobe has released a series of out-of-band security fixes to address multiple Magento vulnerabilities that lead to code execution, customer list tampering. Eight of the vulnerabilities are considered either critical or important, only one is considered a moderate-severity flaw.

article thumbnail

Fuzzing (fuzz testing) tutorial: What it is and how can it improve application security?

Tech Republic Security

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what Fuzzing is and how companies can use it to improve application security and speed up their software development life cycle.

Software 132
article thumbnail

An Uncommon 20 Years of Commonly Enumerating Vulns

Dark Reading

Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list).

104
104
article thumbnail

How to view website trackers in mobile Safari

Tech Republic Security

Learn how to use Apple's Privacy Report in Safari so you can see which websites attempted to track you on your iPhone or iPad.

Mobile 145
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Google mitigated a 2.54 Tbps DDoS attack in 2017, the largest DDoS ever seen

Security Affairs

The Google Cloud team revealed that in September 2017 it has mitigated DDoS attack that reached 2.54 Tbps, the largest DDoS attack of ever. The Google Cloud team revealed that back in September 2017 it has mitigated a powerful DDoS attack that clocked at 2.54 Tbps. This attack is the largest distributed denial of service attack recorded to date. “Our infrastructure absorbed a 2.5 Tbps DDoS in September 2017, the culmination of a six-month campaign that utilized multiple methods of attac

DDOS 100
article thumbnail

Leading more girls to STEM careers drives professor to create cybersecurity camp

Tech Republic Security

Teaching students around the world has become easier, thanks to Zoom classes, one college professor says. She's still trying to find a way to teach robotics, though.

article thumbnail

Microsoft Fixes RCE Flaws in Out-of-Band Windows Update

Threatpost

The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution.

Hacking 118
article thumbnail

Fuzzing (fuzz testing) 101: Lessons from cyber security expert Dr. David Brumley

Tech Republic Security

Dr. David Brumley, Carnegie Mellon University professor and CEO of ForAllSecure, explains what fuzzing, or fuss testing, is and how you can use it to improve application security and speed up your software development.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

An Unholy Union: Remote Access and Ransomware

Approachable Cyber Threats

Category Awareness, Vulnerabilities. Risk Level. Back in June, the Department of Homeland Security (DHS) issued an advisory that married together two of today’s major cybersecurity concerns: remote access technology and ransomware. While we talked about the possibility of this in another ACT post , DHS has now confirmed that they are seeing this unholy union occurring in the wild.

article thumbnail

British Airways Hit with Largest ICO Fine in History

SecureWorld News

This week, the U.K.'s Information Commissioner's Office (ICO) made the decision to fine British Airways £20 million for failing to protect the personal and financial details of more than 400,000 customers. British Airways fails in cybersecurity. An investigation conducted by the ICO concluded that British Airways (BA) was processing a very large amount of personal data without proper security measures in place.

article thumbnail

Dickey’s BBQ Breach: Meaty 3M Payment Card Upload Drops on Joker’s Stash

Threatpost

After cybercriminals smoked out 3 million compromised payment cards on the Joker’s Stash marketplace, researchers linked the data to a breach at the popular barbecue franchise.

Retail 95
article thumbnail

Cybercrime Losses Up 50%, Exceeding $1.8B

Dark Reading

Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Phishing Lures Shift from COVID-19 to Job Opportunities

Threatpost

Fortinet researchers are seeing a pivot in the spear-phishing and phishing lures used by cybercriminals, to entice potential job candidates as businesses open up.

article thumbnail

Fancy Bear Imposters Are on a Hacking Extortion Spree

WIRED Threat Level

Nice looking website you've got there. It'd be a shame if someone DDoS'd it.

Hacking 121
article thumbnail

Academia Adopts Mitre ATT&CK Framework

Dark Reading

Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers.

article thumbnail

Twitter’s ‘Hacked Materials’ Rule Tries to Thread an Impossible Needle

WIRED Threat Level

The company’s flip-flopping on the policy after banning a shady New York Post story highlights the challenges facing social media in 2020.

Hacking 89
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

Dark Reading

The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration.

92
article thumbnail

TikTok Launches Bug Bounty Program Amid Security Snafus

Threatpost

The move is a distinct change in direction for the app, which has been criticized and even banned for its security practices.

87
article thumbnail

Juniper fixes tens of flaws affecting the Junos OS

Security Affairs

Juniper Networks has addressed tens of vulnerabilities, including serious flaws that can be exploited to take over vulnerable systems. Juniper Networks has addressed tens of vulnerabilities, including serious issues that can be exploited to take control of vulnerable systems. The vendor has published 40 security advisories related to security vulnerabilities in the Junos OS operating system that runs on Juniper’s firewalls and other third-party components.

article thumbnail

Massive New Phishing Campaigns Target Microsoft, Google Cloud Users

Dark Reading

At least three campaigns are now underway.

Phishing 122
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.