Fri.Oct 29, 2021

article thumbnail

Weekly Update 267

Troy Hunt

Now this office is starting to look good! New wallpaper is in and brackets for the shelf are ready, just waiting for it to be made and fitted now. Oh - I mentioned a sound absorbing material that'll go up the wall in front of me and the ceiling - here's what'll it'll look like: During yesterday's weekly update vid I mentioned some sound absorbing material was going into my office.

270
270
article thumbnail

Cybercrime: Europol arrests 12 people for ransomware activities possibly affecting 1,800 victims in 71 countries

Tech Republic Security

The European police force stated the ransomware activities targeted critical infrastructures and mostly large corporations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Diversity Matters in Cybersecurity

Cisco Security

It’s as serendipitous as it seems designed that there are two important worldwide recognitions in October: Global Diversity and Cybersecurity Awareness. The intersection is a powerful reminder for the security industry that diversity fuels innovation. The more varied the experiences and thinking of its people, the better the outcomes. We know instinctively that Diversity and Inclusion (D&I) matters.

article thumbnail

Hive ransomware now encrypts Linux and FreeBSD systems

Bleeping Computer

The Hive ransomware gang now also encrypts Linux and FreeBSD using new malware variants specifically developed to target these platforms. [.].

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How Can You Keep Your Personal Information Safe?

CyberSecurity Insiders

A few simple changes to your devices and accounts can help discourage cyber criminals from trying to access your data. Getting started is easy. This short guide presents some quick measures you can take to protect your privacy and keep your personal info safe. Prevent Data Breaches. Giants like Facebook and Target have suffered breaches and password leaks, so it’s safe to say data from at least one of your online accounts could have been leaked.

Passwords 141
article thumbnail

Modern cybersecurity needs not just awareness, but a whole new perspective

Security Boulevard

As Cybersecurity Awareness Month draws to a close, we’ve had a chance to reflect on the state of the cybersecurity. The post Modern cybersecurity needs not just awareness, but a whole new perspective appeared first on Entrust Blog. The post Modern cybersecurity needs not just awareness, but a whole new perspective appeared first on Security Boulevard.

LifeWorks

More Trending

article thumbnail

A New Zero-day Vulnerability Is Impacting All Windows Versions

Heimadal Security

A security researcher recently revealed technical details for a zero-day privilege elevation vulnerability in Windows and also a public proof-of-concept (PoC) exploit that provides SYSTEM access under certain settings. As explained by Cezarina, a zero-day exploit refers to the method used by attackers to infiltrate and deploy the malware into a system.

Malware 135
article thumbnail

Police arrest hackers behind over 1,800 ransomware attacks

Bleeping Computer

The Europol has announced the arrest of 12 individuals who are believed to be linked to ransomware attacks against 1,800 victims in 71 countries. [.].

article thumbnail

New 'Shrootless' Bug Could Let Attackers Install Rootkit on macOS Systems

The Hacker News

Microsoft on Thursday disclosed details of a new vulnerability that could allow an attacker to bypass security restrictions in macOS and take complete control of the device to perform arbitrary operations on the device without getting flagged by traditional security solutions.

131
131
article thumbnail

Google fixes 2 new actively exploited zero-day flaws in Chrome

Security Affairs

Google has released Chrome 95.0.4638.69 for Windows, Mac, and Linux to address two actively exploited zero-day vulnerabilities. Google has released Chrome 95.0.4638.69 for Windows, Mac, and Linux to address two zero-day vulnerabilities, tracked as CVE-2021-38000 and CVE-2021-38003, actively exploited in attacks in the wild. Google fixed a total of seven vulnerabilities with the latest release of the popular browser.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

An Apparent Ransomware Hack Puts the NRA in a Bind

WIRED Threat Level

The group behind the reported attack is under sanctions from the US Treasury, which means a payout could come with penalties for the victim.

Hacking 128
article thumbnail

Google Chrome is Abused to Deliver Malware as ‘Legit’ Win 10 App

Threatpost

Malware delivered via a compromised website on Chrome browsers can bypass User Account Controls to infect systems and steal sensitive data, such as credentials and cryptocurrency.

Malware 128
article thumbnail

The return of the Malwarebytes CrackMe

Malwarebytes

This blog post was authored by Hasherezade. Twice in the past ( 2017 , 2018 ) we published a Capture-The-Flag challenge dedicated to aspiring malware analysts. Each time it was a Windows executable, containing up to 3 stages to break, in order to get the final flag. The goal of the crackme was to provide an exercise where the contestants will be able to challenge themselves in understanding and overcoming techniques commonly present in real-life malware.

Malware 128
article thumbnail

This New Android Malware Can Gain Root Access to Your Smartphones

The Hacker News

An unidentified threat actor has been linked to a new Android malware strain that features the ability to root smartphones and take complete control over infected smartphones while simultaneously taking steps to evade detection. The malware has been named "AbstractEmu" owing to its use of code abstraction and anti-emulation checks to avoid running while under analysis.

Malware 127
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Papua New Guinea ‘s finance ministry was hit by a ransomware

Security Affairs

A ransomware attack hit Papua New Guinea ‘s finance ministry and disrupted government payments and operations. Government officials confirmed that Papua New Guinea’s finance ministry was hit by a ransomware attack that disrupted government payments and operations. The ransomware infected the Department of Finance’s Integrated Financial Management System a week ago, said the finance minister and acting treasurer, John Pundari.

article thumbnail

Europol announces “targeting” of 12 suspects in ransomware attacks

Naked Security

More anti-ransomware activity by law enforcement, this time in Switzerland and Ukraine.

article thumbnail

The Week in Ransomware - October 29th 2021 - Making arrests

Bleeping Computer

This week, international law enforcement operations went on the offensive, making arrests in numerous countries for ransomware-related activities. [.].

article thumbnail

Microsoft to offer cyber security training in community colleges across US

CyberSecurity Insiders

Microsoft has announced that it is going to offer cyber security training to interested students who are studying in community colleges across the United States. To reach its aim, the American tech giant has announced that it is going to invest millions of dollars on nurturing new talent to fill 250,000 jobs lying vacant in various cybersecurity roles.

Education 116
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Dawn of Insider Risk – Are You Prepared?

Security Boulevard

We’re going to have to fire her. That’s what I thought one afternoon when I received an unexpected call from our security team. A new sales hire had just downloaded several documents from her previous employer onto the company-issued laptop we’d given her. This looked like the textbook definition of insider theft by infiltration. An. The post The Dawn of Insider Risk – Are You Prepared?

Risk 116
article thumbnail

Shrootless: Microsoft finds Apple macOS vulnerability

Malwarebytes

Microsoft researchers have discovered a vulnerability in macOS, dubbed Shrootless, that can allow attackers to bypass System Integrity Protection (SIP) and perform malicious activities, such as gaining root privileges and installing rootkits on vulnerable devices. Microsoft reported the Shrootless attack to Apple’s security team earlier this year, together with a proof-of-concept that showed how the bug could be abused to install a malicious kernel extension (rootkit).

115
115
article thumbnail

Microsoft: Windows web content filtering now generally available

Bleeping Computer

Microsoft has announced that web content filtering has reached general availability and is now available for all Windows enterprise customers. [.].

113
113
article thumbnail

Police arrested 12 individuals involved in 1800 ransomware attacks worldwide

Security Affairs

Europol and Norwegian Police arrested 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators. A joint operation conducted by Europol, the Norwegian Police and other authorities led to the arrest of 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Microsoft documents “SHROOTLESS” hack patched in latest Apple updates

Naked Security

We'd have called this bug "SHROOTMORE", but naming it wasn't our call.

Hacking 111
article thumbnail

Week in security with Tony Anscombe

We Live Security

ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR. The post Week in security with Tony Anscombe appeared first on WeLiveSecurity.

article thumbnail

What Is a Senior Security Analyst? What I Do and How I Got Here

CompTIA on Cybersecurity

Find out what a senior security analyst does – straight from the source. Aireal Liddle shares what she does, and how she got there.

111
111
article thumbnail

SolarMarker Attackers Use SEO Poisoning to Push Malicious Code

eSecurity Planet

Cybercriminals leveraging the SolarMarker.NET-based backdoor are using a technique called SEO poisoning to drive malicious payloads into victims’ systems so they can gain access to the credentials and data within. According to researchers at Menlo Security, the SolarMarker campaign is one of two such efforts they’ve seen in recent months using SEO poisoning to deceive users and get them to download the malicious payload into their systems.

Malware 110
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

NSA and CISA explained how to prevent and detect lateral movement in 5G networks via cloud systems

Security Affairs

The US NSA and CISA published a security advisory to warn about threat actors compromising 5G networks via cloud infrastructure. The US National Security Agency and the US Cybersecurity Infrastructure and Security Agency have published a security advisory to warn of attacks on 5G networks through the hijacking of a provider’s cloud resources. The report is part of a four-part series that was built on the ESF Potential Threat Vectors to 5G Infrastructure white paper that was released by the US ag

article thumbnail

VIPRE Advanced Security Gets Perfect AV-TEST Ratings

Vipre

VIPRE Advanced Security is once again standing out as a leading security product with the ratings to prove it. In the recent AV-TEST Product Review and Certification Report for July-Aug 2021 , VIPRE Advanced Security received the highest ratings in protection, performance, and usability — a perfect 6.0/6.0 in every single category. . AV-TEST evaluated 21 security products by using realistic tests to observe how each service stands up against real-world threats and scenarios, such as malware, wor

Antivirus 105
article thumbnail

Employees To Demand Remote Work In 2022 | Avast

Security Boulevard

Forrester has released its annual prediction guide, in which it anticipates that 2022 will see an increased demand from employees to work remotely, so much so that 30% of the companies that don’t support remote working will see their staff’s resignation rates rise to 2.5%. The guide, called Predictions 2022: Disruptive Forces Necessitate Bold Decisions , also suggests that the 50% of U.S. adults who “regularly make purchases from brands that align with their personal values” will drive “10 big m

article thumbnail

Tips to protect your data, security, and privacy from a hands-on expert

Malwarebytes

This post was authored by one of the most active helpers on the Malwarebytes forums who wishes to remain anonymous. Back in the early days of personal computing, perhaps one of the only real concerns was data loss from a drive failure. That risk still exists, but we all face many other threats today too. There are rootkits, Trojans, worms, viruses, ransomware, phishing, identity theft, and social engineering to worry about.

Backups 104
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!