Fri.Jun 17, 2022

article thumbnail

Tracking People via Bluetooth on Their Phones

Schneier on Security

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not enough. Computer scientists at the University of California San Diego proved in a study published May 24 that minute imperfections in phones caused during manufacturing create a unique Bluetooth beacon , one that establishes a digital signature or fingerprint di

article thumbnail

Weekly Update 300

Troy Hunt

Well, we're about 2,000km down on this trip and are finally in Melbourne, which was kinda the point of the drive in the first place (things just escalated after that). The whole journey is going into a long tweet thread you can find below (or mute - that's partly why it's in a single thread): It’s time for the next great road trip 🏎 pic.twitter.com/9B9k9cXQvH — Troy Hunt (@troyhunt) June 14, 2022 Next week is NDC Melbourne so please get along to the event if

Passwords 305
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crosspost: A Simple SOAR Adoption Maturity Model

Anton on Security

Originally written for a new Chronicle blog. As security orchestration, automation and response (SOAR) adoption continues at a rapid pace , security operations teams have a greater need for a structured planning approach. My favorite approach has been a maturity model, vaguely modeled on the CMM approach. For example, in my analyst days, I built a maturity model for a SOC (2018) , a SIEM deployment (2018) and vulnerability management (2017).

article thumbnail

How to back up your Authy app

Tech Republic Security

In this step-by-step guide, learn how to enable the backup feature within the two-factor authentication application Authy. The post How to back up your Authy app appeared first on TechRepublic.

Backups 167
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Chinese DriftingCloud APT exploited Sophos Firewall Zero-Day before it was fixed

Security Affairs

China-linked threat actors exploited the zero-day flaw CVE-2022-1040 in Sophos Firewall weeks before it was fixed by the security vendor. Volexity researchers discovered that the zero-day vulnerability, tracked as CVE-2022-1040 , in Sophos Firewall was exploited by Chinese threat actors to compromise a company and cloud-hosted web servers it was operating.

Firewall 145
article thumbnail

How to fix the four biggest problems with failed VPN connections

Tech Republic Security

Is your VPN connected but not working? Learn four of the biggest trouble areas with VPN connections and how you can fix them today. The post How to fix the four biggest problems with failed VPN connections appeared first on TechRepublic.

VPN 167

LifeWorks

More Trending

article thumbnail

2022 Dark Web prices for cybercriminals services

Tech Republic Security

Almost every cybercriminal service is on sale on the Dark Web’s marketplaces and forums. Learn more about these service's prices in 2022 and how to protect from being exposed on the Dark Web. The post 2022 Dark Web prices for cybercriminals services appeared first on TechRepublic.

148
148
article thumbnail

ALPHV squeezes victim with dedicated leak site for employees and customers

Malwarebytes

Eyebrows were raised this week when the ALPHV ransomware group created a leak site dedicated to just one of its victims. The site was aimed at the employees and guests of a hotelier that had been attacked, and allowed them to see if their personal details had been leaked. The new tactic seems to be designed to create further pressure on the victim to pay the ransom.

article thumbnail

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

Security Boulevard

A study shows many U.S. hospitals are leaking personal information to Facebook. Experts say it’s a HIPAA violation. The post HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook appeared first on Security Boulevard.

article thumbnail

Interpol arrests 2000 criminals launching social engineering attacks

CyberSecurity Insiders

In what appears as an operation first of its kind, Interpol has arrested over 2000 criminals who launched social engineering attacks worldwide. The operation to nab thousands of cyber criminals at a time was named ‘ First Light 2022’ and was performed with the coordination of police forces from about 76 countries. Social engineering attacks are crimes that involve business email compromise, job scams, X-rated scams using beautiful faces of women, mainly models, telephone scams, money laundering,

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Microsoft: June Windows updates may break Wi-Fi hotspots

Bleeping Computer

Microsoft is investigating a newly acknowledged issue causing connectivity issues when using Wi-Fi hotspots after deploying Windows updates released during the June 2022 Patch Tuesday. [.].

131
131
article thumbnail

NinjaForms WordPress plugin, actively exploited in wild, receives forced security update

Graham Cluley

A critical vulnerability in a WordPress plugin used on over one million websites has been patched, after evidence emerged that malicious hackers were actively exploited in the wild.

129
129
article thumbnail

Cisco says it won’t fix zero-day RCE in end-of-life VPN routers

Bleeping Computer

Cisco advises owners of end-of-life Small Business RV routers to upgrade to newer models after disclosing a remote code execution vulnerability that will not be patched. [.].

article thumbnail

Resurgence of Voicemail-themed Phishing Attacks Targeting Key Industry Verticals in US

Security Boulevard

Summary. Since May 2022, ThreatLabz has been closely monitoring the activities of a threat actor which targets users in various US-based organizations with malicious voicemail-notification-themed emails in an attempt to steal their Office365 and Outlook credentials. The tactics, techniques, and procedures (TTPs) of this threat actor have a high overlap with a previous voicemail campaign that ThreatLabz analyzed in July 2020.

Phishing 128
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Apps on Google Play Store with in-built Adware

CyberSecurity Insiders

Security researchers from Dr. Web have discovered in their latest study that many of the applications hosted in the Google Play Store were loaded with adware and info stealing malicious software. The most concerning info about these apps is the fact that some applications also have the potential to steal information from other apps such as OTPs received on Gmail or the SMS app on an android phone.

Adware 124
article thumbnail

Big tech platforms sign up to the EU Commission’s new Code of Practice on Disinformation

CSO Magazine

Major technology platforms have joined 34 signatories in committing to the EU Commission’s attempts to fight online disinformation by removing financial incentives and empowering researchers and fact checkers.

article thumbnail

Websites Hosting Fake Cracks Spread Updated CopperStealer Malware

Trend Micro

We found updated samples of the CopperStealer malware infecting systems via websites hosting fake software.

Malware 120
article thumbnail

Top 5 Front-End Frameworks Web Developers Should Consider

SecureBlitz

Web development is aimed at building responsive websites and saving speed up development procedures. Check out the best web development. Read more. The post Top 5 Front-End Frameworks Web Developers Should Consider appeared first on SecureBlitz Cybersecurity.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Microsoft: BlackCat Ransomware Group Targets Vulnerable Microsoft Exchange Servers

Heimadal Security

According to Microsoft, the BlackCat ransomware group is gaining access to targeted networks by exploiting unpatched Exchange server security flaws. After gaining access, the threat actors quickly began collecting data about the infected systems, followed by credential theft and lateral movement activities, intellectual property gathering, and delivering the ransomware payload.

article thumbnail

How to spot malicious spam – Week in security with Tony Anscombe

We Live Security

As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam. The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

Malware 116
article thumbnail

June Windows updates break Microsoft 365 sign-ins on Arm devices

Bleeping Computer

Microsoft is investigating a new known issue causing Azure Active Directory and Microsoft 365 sign-in issues on Arm devices after deploying the June 2022 Windows updates. [.].

116
116
article thumbnail

A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould

Security Affairs

Experts discovered a feature in Microsoft 365 suite that could be abused to encrypt files stored on SharePoint and OneDrive and target cloud infrastructure. Researchers from Proofpoint reported that a feature in the in Microsoft 365 suite could be abused to encrypt files stored on SharePoint and OneDrive. “Proofpoint has discovered a potentially dangerous piece of functionality in Office 365 or Microsoft 365 that allows ransomware to encrypt files stored on SharePoint and OneDrive in a way

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 6/17

Security Boulevard

Insight #1. ". Incremental and measurable improvement over time is the key to a successful security program.". . Insight #2. ". If you sell a product or service, and in selling that product or service you are charging more for basics like API or audit log access, I urge you to rethink your strategy. Providing security visibility in your products will only strengthen your relationship with your customers and provide them with the tools they need to monitor usage and perform incident investigatio

CISO 115
article thumbnail

China-linked APT Flew Under Radar for Decade

Threatpost

Evidence suggests that a just-discovered APT has been active since 2013.

article thumbnail

Article 1/5: Stop Using VPNs and IP Whitelists to Secure Access to SaaS Applications

Security Boulevard

Co-author: Den Jones Do your employees complain about needing to use their corporate VPNs to access SaaS applications such as Microsoft Office 365, Google Workspace and Salesforce? Does your enterprise security model require backhauling traffic destined for SaaS applications through corporate VPN gateways or concentrators? Is your IT operations team constantly configuring and updating IP […].

VPN 111
article thumbnail

New MaliBot Android Malware Mines Cryptocurrency

Heimadal Security

MaliBot can steal screenshots, intercept notifications and SMS messages, log boot operations, and provide its operators with remote control capabilities using a VNC system. The operators are granted the ability to travel between displays through VNC, as well as a scroll, take screenshots, copy and paste material, swipe, and conduct long pushes. In addition, the […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Why You Need CIS Controls for Effective Cyber Defense

Security Boulevard

The Center for Internet Security (CIS) is a non-profit organization that helps public sectors and private sectors improve their cybersecurity. The organization aims to help small, medium, and large organizations defend themselves against cyber threats and create an unbreakable cyber defense. . The post Why You Need CIS Controls for Effective Cyber Defense appeared first on Security Boulevard.

article thumbnail

Reimagine Hybrid Work: Same CyberSec in Office and at Home

The Hacker News

It was first the pandemic that changed the usual state of work - before, it was commuting, working in the office & coming home for most corporate employees. Then, when we had to adapt to the self-isolation rules, the work moved to home offices, which completely changed the workflow for many businesses.As the pandemic went down, we realized success never relied on where the work was done.

110
110
article thumbnail

WordPress Plug-in Ninja Forms Issues Update for Critical Bug

Dark Reading

The code injection vulnerability is being actively exploited in the wild, researchers say.

110
110
article thumbnail

Survey: Maintaining Cybersecurity Balance is a Challenge

Security Boulevard

A survey of 1,007 IT decision-makers at small-to-medium enterprises (SMEs) found two-thirds of respondents (66%) conceded that adding security measures resulted in more cumbersome user experiences. The survey polled SMEs in the U.S. and United Kingdom and was conducted by JumpCloud, a provider of IT management tools. Despite that issue, however, most respondents (56%) said.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!