Tue.Apr 06, 2021

article thumbnail

Are You One of the 533M People Who Got Facebooked?

Krebs on Security

Ne’er-do-wells leaked personal data — including phone numbers — for some 553 million Facebook users this week. Facebook says the data was collected before 2020 when it changed things to prevent such information from being scraped from profiles. To my mind, this just reinforces the need to remove mobile phone numbers from all of your online accounts wherever feasible.

Mobile 333
article thumbnail

Ransomware: 8 Things That You Must Know

Joseph Steinberg

While ransomware may seem like a straightforward concept, people who are otherwise highly-knowledgeable seem to cite erroneous information about ransomware on a regular basis. As such, I would like to point out 8 essential points about ransomware. 1. Paying a demanded ransom may not get you your files back, and may not prevent a leak of your information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phone Cloning Scam

Schneier on Security

A newspaper in Malaysia is reporting on a cell phone cloning scam. The scammer convinces the victim to lend them their cell phone, and the scammer quickly clones it. What’s clever about this scam is that the victim is an Uber driver and the scammer is the passenger, so the driver is naturally busy and can’t see what the scammer is doing.

Scams 256
article thumbnail

Data scraped from 500 million LinkedIn users found for sale online

Tech Republic Security

IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks on LinkedIn and its users.

218
218
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. Related: Business-logic attacks target commercial websites. SMBs are tapping into cloud infrastructure and rich mobile app experiences, making great leaps forward in business agility, the same as large enterprises.

article thumbnail

How the quick shift to the cloud has led to more security risks

Tech Republic Security

Automating cloud security is a process still in its infancy for many organizations, says Unit 42.

Risk 186

More Trending

article thumbnail

Windows XP makes ransomware gangs work harder for their money

Bleeping Computer

A recently created ransomware decryptor illustrates how threat actors have to support Windows XP, even when Microsoft dropped supporting it seven years ago. [.].

article thumbnail

Janeleiro, the time traveler: A new old banking trojan in Brazil

We Live Security

ESET Research uncovers a new threat that targets organizations operating in various sectors in Brazil. The post Janeleiro, the time traveler: A new old banking trojan in Brazil appeared first on WeLiveSecurity.

Banking 135
article thumbnail

California Man Indicted in Shopify Data Breach

Hot for Security

Tassilo Heinrich, a California resident arrested a few months ago by the FBI for alleged involvement in a Shopify data breach, has been indicted by a grand jury. When we hear of data breaches, we usually assume they’re the work of outsiders, but that’s not always the case. Sometimes, breaches have causes other than hackers, like negligence or insider threats.

article thumbnail

Signal Adds a Payments Feature—With Cryptocurrency

WIRED Threat Level

The encrypted messaging app is integrating support for MobileCoin in a bid to keep up with the features offered by its more mainstream rivals.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

A deep dive into Saint Bot, a new downloader

Malwarebytes

This post was authored by Hasherezade with contributions from Hossein Jazi and Erika Noerenberg. In late March 2021, Malwarebytes analysts discovered a phishing email with an attached zip file containing unfamiliar malware. Contained within the zip file was a PowerShell script masquerading as a link to a Bitcoin wallet. Upon analysis, the obfuscated PowerShell downloader initiated a chain of infection leading to a lesser-known malware called Saint Bot.

Malware 123
article thumbnail

Coca-Cola trade secret theft underscores importance of insider threat early detection

CSO Magazine

The trial of Xiaorong You is set to begin today, April 6, in Greenville, TN. She is accused of trade secret theft and economic espionage after allegedly stealing bisphenol-A-free (BPA-free) technologies owned by several companies, including her former employers Coca-Cola and Eastman Chemical Company. The value placed on the development of the stolen technologies is $119.6 million.

CSO 124
article thumbnail

Facebook data leak now under EU data regulator investigation

Bleeping Computer

Ireland's Data Protection Commission (DPC) is investigating a massive data leak concerning a database containing personal information belonging to more than 530 million Facebook users. [.].

127
127
article thumbnail

How poor password habits put your organization at risk

Tech Republic Security

More than half of the cyberattacks reported to Keeper Security involved stolen credentials.

Passwords 153
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor

CSO Magazine

A group of criminals behind a stealthy backdoor known as more_eggs is targeting professionals with fake job offers tailored to them based on information from their LinkedIn profiles. The gang is selling access to systems infected with the backdoor to other sophisticated cybercrime groups including FIN6, Evilnum and Cobalt Group that are known to target organizations from various industries. [ Check out these 11 phishing prevention tips for best technology practices, employee education and social

article thumbnail

Pre-installed auto installer threat found on Android mobile devices in Germany

Malwarebytes

Users primarily located in Germany are experiencing malware that downloads and installs on their Gigaset mobile devices—right out of the box! The culprit installing these malware apps is the Update app, package name com.redstone.ota.ui, which is a pre-installed system app. This app is not only the mobile device’s system updater, but also an Auto Installer known as Android/PUP.Riskware.Autoins.Redstone.

Mobile 119
article thumbnail

Cyber Attack on European Union Institutions

CyberSecurity Insiders

Several organizations belonging to European Union were targeted by a cyber attack in March this year and news is out that it did partially impact the IT infrastructure of agencies, institutions and private bodies to a certain extent. The spokesperson of the European Commission made few details available to the media as the investigation is still going on.

article thumbnail

Research claims Google Pixel phones share 20 times more data than iPhones

Malwarebytes

If you’re an Android phone user, now might be a good time to invest in a good pair of ear plugs. Fans of iPhones aren’t known for being shy when it comes to telling Android users that Apple products are superior, and things may be about to get worse, thanks to a new research paper (pdf). . Researchers of the School of Computer Science and Statistics at Trinity College Dublin, Ireland decided to investigate what data iOS on an iPhone shares with Apple and what data Google Android on

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ongoing attacks are targeting unsecured mission-critical SAP apps

Bleeping Computer

Threat actors are targeting mission-critical SAP enterprise applications unsecured against already patched vulnerabilities, exposing the networks of commercial and government organizations to attacks. [.].

article thumbnail

Aurora campaign: Attacking Azerbaijan using multiple RATs

Malwarebytes

This post was authored by Hossein Jazi. As tensions between Azerbaijan and Armenia continue, we are still seeing a number of cyber attacks taking advantage of this situation. On March 5th 2021, we reported an actor that used steganography to drop a new.Net Remote Administration Trojan. Since that time, we have been monitoring this actor and were able to identify new activity where the threat actor switched their RAT from.Net to Python.

article thumbnail

EtterSilent maldoc builder used by top cybercriminal gangs

Bleeping Computer

A malicious document builder named EtterSilent is gaining more attention on underground forums, security researchers note. As its popularity increased, the developer kept improving it to avoid detection from security solutions. [.].

122
122
article thumbnail

Has Facebook leaked your phone number?

Malwarebytes

Unless you keep your social media at a pole’s distance, you have probably heard that an absolutely enormous dataset—containing over 500 million phone numbers—has been made public. These phone numbers have been in the hands of some cybercriminals since 2019 due to a vulnerability in Facebook that allowed personal data to be scraped from the social media platform, until it was patched it in 2019.

Scams 116
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Activision Warns of Remote-Access Trojans Hidden Within Fake ‘Call of Duty’ Cheat Tools

Hot for Security

Video game publisher Activision has warned the gaming community of hidden RAT Trojans masquerading as Call of Duty cheat tools. The company behind Call of Duty: Warzone and the popular Guitar Hero series said it examined the hacking tool that was promoted for use against gamers on multiple hacking forums. According to a recent report, threat actors posted a free “newbie friendly” and “effective” method for spreading a RAT – promoting the malicious software as a video game cheat program, as

article thumbnail

SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

Threatpost

Cyberattackers are actively exploiting known security vulnerabilities in widely deployed, mission-critical SAP applications, allowing for full takeover and the ability to infest an organization further.

Malware 114
article thumbnail

What's next for encryption if the RSA algorithm is broken?

CSO Magazine

What if a big crack appeared overnight in the internet's security layer? What if the fracture reached deep into the mathematical foundations of the cryptographic algorithms? That appeared to happen in early March when a paper dropped with a tantalizing conclusion in the abstract: “This destroys the RSA cryptosystem.

article thumbnail

Watch Out! Mission Critical SAP Applications Are Under Active Attack

The Hacker News

Cyber attackers are actively setting their sights on unsecured SAP applications in an attempt to steal information and sabotage critical processes, according to new research.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

SecurityTrails Secures Funding from Prominent Security Tech Leaders

SecurityTrails

Learn about the latest successful round of funding that will aid us in delivering on our promise of being the best all-in-one platform for Total Internet Inventory.

Internet 105
article thumbnail

Hackers Targeting professionals With 'more_eggs' Malware via LinkedIn Job Offers

The Hacker News

A new spear-phishing campaign is targeting professionals on LinkedIn with weaponized job offers in an attempt to infect targets with a sophisticated backdoor trojan called "more_eggs." To increase the odds of success, the phishing lures take advantage of malicious ZIP archive files that have the same name as that of the victims' job titles taken from their LinkedIn profiles.

Phishing 101
article thumbnail

5 Major Benefits of Early Security Testing

Security Boulevard

It is no secret that early security testing is beneficial. However, do you know how advantageous it is and what are the potential consequences of the lack of early testing? Here are 5 top benefits of early security testing along with the risks of late. Read more. The post 5 Major Benefits of Early Security Testing appeared first on Acunetix. The post 5 Major Benefits of Early Security Testing appeared first on Security Boulevard.

Risk 101
article thumbnail

Cybersecurity ops may never be the same after COVID-19, but that’s not all bad

SC Magazine

Today’s columnist, Amos Stern of Siemplify, says while the heyday of SOCs may have passed because of the pandemic, security pros have adjusted and need to focus on the threats at hand: insecure home networks, cloud adoption and phishing. PacificNorthwestNationalLaboratory CreativeCommons Credit: CC BY-NC-SA 2.0. About seven years ago, when serving as the cyber and intelligence director for Israel’s largest defense contractor, one of the biggest projects I oversaw was building a training simulato

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.