Wed.Mar 10, 2021

article thumbnail

Home Assistant, Pwned Passwords and Security Misconceptions

Troy Hunt

Two of my favourite things these days are Have I Been Pwned and Home Assistant. The former is an obvious choice, the latter I've come to love as I've embarked on my home automation journey. So, it was with great pleasure that I saw the two integrated recently: always something. now you are in my @home_assistant setup also :) Thanks @troyhunt pic.twitter.com/4d4Qxnlazl — Jón Ólafs (@jonolafs) March 3, 2021 Awesome!

Passwords 349
article thumbnail

Microsoft Exchange hack: Why so many enterprises still run their own Exchange servers

Tech Republic Security

Commentary: Enterprises try their best to secure their data, but running on-premises mail servers arguably doesn't do this. So why do they do it, anyway?

Hacking 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fisherian Runaway

Javvad Malik

Today I learn the phrase Fisherian Runaway, which was a term coined by mathematical biologist Ronald Fisher to account for the evolution of exaggerated male ornamentation, e.g. peacocks with their big tails. I wonder if we’ve fallen into the same trap within cyber security – especially when it comes to what gets researched, reported, and presented at events.

article thumbnail

How cybercrime groups are exploiting the latest Microsoft Exchange flaws

Tech Republic Security

Criminals have been targeting organizations that run Exchange hoping to breach ones that haven't patched the latest bugs, says ESET.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Exchange servers under siege from at least 10 APT groups

We Live Security

ESET Research has found LuckyMouse, Tick, Winnti Group, and Calypso, among others, are likely using the recent Microsoft Exchange vulnerabilities to compromise email servers all around the world. The post Exchange servers under siege from at least 10 APT groups appeared first on WeLiveSecurity.

Malware 145
article thumbnail

How weak passwords could put your organization at risk

Tech Republic Security

Employees at Fortune 500 companies were found using passwords that could be hacked in less than a second, according to NordPass.

Passwords 163

More Trending

article thumbnail

Is Cybersecurity More Difficult Than Going to Mars?

Security Boulevard

Exploration and evolution are written into the very fabric of humanity. Since the planets in our solar system were named, traveling to Mars has been nothing short of a farfetched dream. However, the rapid rise of digital transformation has changed the world we live in, connecting continents and laying the foundation for meaningful space travel. The post Is Cybersecurity More Difficult Than Going to Mars?

article thumbnail

F5 urges customers to patch critical BIG-IP pre-auth RCE bug

Bleeping Computer

F5 Networks, a leading provider of enterprise networking gear, has announced four critical remote code execution (RCE) vulnerabilities affecting most versions of BIG-IP and BIG-IQ software. [.].

Software 144
article thumbnail

9 Practical Tips to Take Your Cybersecurity Career to the Next Level

CyberSecurity Insiders

The demand for cybersecurity professionals is currently higher than the number of experts available. Cases of cyber-attacks are rapidly increasing, and businesses have every reason to worry following the recent prediction that damage costs might shoot beyond $6 trillion by the end of 2021. If you’re a skilled security expert, organizations will be clamoring for your services soon.

article thumbnail

More hacking groups join Microsoft Exchange attack frenzy

Bleeping Computer

More state-sponsored hacking groups have joined the ongoing attacks targeting tens of thousands of on-premises Exchange servers impacted by severe vulnerabilities tracked as ProxyLogon. [.].

Hacking 144
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Ad blocker with miner included

SecureList

Some time ago, we discovered a number of fake apps delivering a Monero cryptocurrency miner to user computers. They are distributed through malicious websites that may turn up in the victim’s search results. By the look of it, it appears to be a continuation of the summer campaign covered by our colleagues from Avast. Back then, cybercriminals distributed malware under the guise of the Malwarebytes antivirus installer.

DNS 142
article thumbnail

Told your organisation is leaking data? Here’s how not to respond

Graham Cluley

Platform engineer and open source enthusiast Rob Dyke says that he's found himself in a sticky pickle. You see, in late February he discovered two public repositories on Github which contained code for an application, API keys, usernames nad passwords, and a database dump. Anyone in the world could access the sensitive information. What's disappointing, however, is how the organisation responded when he told them about the problem.

Passwords 142
article thumbnail

OVH data centers suffered a fire, many popular sites are offline

Security Affairs

OVH, the largest hosting provider in Europe, has suffered a terrible fire that destroyed the data centers located in Strasbourg. OVH, one of the largest hosting providers in the world, has suffered a terrible fire that destroyed its data centers located in Strasbourg. The news was also confirmed by OVH founder Octave Klaba via Twitter, he also provided a series of updates on the incident.

Mobile 138
article thumbnail

New malware tied to China targets Linux endpoints and servers

SC Magazine

New malware compiled on Red Hat Enterprise Linux uses a network data encoding scheme based on XOR, creates a backdoor in systems that gives an attacker near full control over infected machines. ( “Linux password file” by Christiaan Colen is licensed under CC BY-SA 2.0 ). Researchers at Intezer found a new piece of malware targeting Linux endpoints and servers.

Malware 136
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Windows 10 crashes when printing due to Microsoft March updates

Bleeping Computer

The Windows 10 KB5000802 and KB5000808 cumulative updates released yesterday are causing Blue Screen of Death crashes when printing to network printers. [.].

145
145
article thumbnail

'Thousands' of Verkada Cameras Affected by Hacking Breach

Dark Reading

Thousands of Verkada cameras have been affected by a breach from a group of hackers, who have reportedly gained access to surveillance systems inside several high-profile companies, police departments, hospitals, prisons and schools.

article thumbnail

Indian hackers spreading ransomware to retaliate Govt actions on Farmers

CyberSecurity Insiders

All these days we have seen adversary nations spreading ransomware in retaliation and to fund their criminal objectives. But the latest that is going on in the cyberworld of India is astonishing! A hackers group named ‘Khalsa Cyber Fauj’ is indulging in the activity of spreading file encrypting malware into public and private companies operating in the Indian Subcontinent.

article thumbnail

Ryuk ransomware hits 700 Spanish government labor agency offices

Bleeping Computer

The systems of SEPE, the Spanish government agency for labor, were taken down following a ransomware attack that hit more than 700 agency offices across Spain. [.].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

OVH cloud datacenter destroyed by fire

Malwarebytes

A fire in one of the OVH datacenters has destroyed one datacenter and knocked two others offline. It took 100 firefighters and 43 fire trucks to fight the fire in the five-story building. Even though the fire department was quick to respond, and the fire was brought under control relatively quickly, the impact has been big. In a press statement OVH promised “to communicate as transparently as possible on the progress of our analyses and the implementation of solutions” OVH is the lar

Backups 132
article thumbnail

How organizations can combat the security risks of working remotely

Tech Republic Security

Less than half of employees feel their organization's cybersecurity has strengthened since the start of COVID-19, says Lynx Software.

Risk 140
article thumbnail

Researchers Unveil New Linux Malware Linked to Chinese Hackers

The Hacker News

Cybersecurity researchers on Wednesday shed light on a new sophisticated backdoor targeting Linux endpoints and servers that's believed to be the work of Chinese nation-state actors. Dubbed "RedXOR" by Intezer, the backdoor masquerades as a polkit daemon, with similarities found between the malware and those previously associated with the Winnti Umbrella (or Axiom) threat group such as ?

Malware 129
article thumbnail

Why the Microsoft Exchange Server attack isn’t going away soon

CSO Magazine

On March 2, Microsoft revealed a critical cybersecurity offensive launched by a foreign adversary against organizations in the United States. The company attributed the attacks to a Chinese advanced persistent threat group it calls Hafnium. Microsoft quickly announced patches for the four previously unknown vulnerabilities in Exchange Server that the malicious actors had exploited.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

India and China’s Conflict Goes Cyber

Security Boulevard

In early March, Recorded Future’s Insikt Group published a report titled China-Linked Group RedEcho Targets the Indian Power Sector, which detailed China’s targeting of ten different Indian organizations within the energy sector, specifically the power generation and transmission sector and two from the maritime sector. In the Insikt Group assessment, there are “significant concerns over.

Malware 127
article thumbnail

How your remote employees may be sharing sensitive data

Tech Republic Security

A majority of employees said they share sensitive information through messaging and collaboration tools, says Veritas.

142
142
article thumbnail

4 Cybersecurity Best Practices for Your Small Business

CyberSecurity Insiders

Cybercrime is a hotter topic than ever before right now. More and more businesses are becoming the victims of cybercrime and hacking, and smaller companies are often the main targets for cybercriminals, since they often do not have the same security measures in place and are therefore easier to breach. If you run a small business, understanding what you can do to prevent cybercrime and recognize the signs of a potential attack is more important than ever. .

article thumbnail

5 reasons why the cost of ransomware attacks is rising

CSO Magazine

Not many organizations end up paying $67 million in ransomware related costs like United Health Services (UHS) did last year following a September 2020 attack that crippled its network. The organization is, however, an example of the increasingly heavy financial toll that these attacks have begun to exact from victims over the past two years.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Online health security – when ‘opt out’ isn’t an option

We Live Security

What happens when you try to opt out of e-health to avoid issues in the event of a breach? The post Online health security – when ‘opt out’ isn’t an option appeared first on WeLiveSecurity.

126
126
article thumbnail

Norway parliament data stolen in Microsoft Exchange attack

Bleeping Computer

Norway's parliament, the Storting, has suffered another cyberattack after threat actors stole data using the recently disclosed Microsoft Exchange vulnerabilities. [.].

126
126
article thumbnail

The Future of P2P IoT Botnets

Trend Micro

We discuss how the involvement of P2P technology in IoT botnets can transform them into stronger threats that organizations and users need to watch out for.

IoT 133
article thumbnail

Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!

The Hacker News

Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks.

121
121
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.