Thu.Apr 08, 2021

article thumbnail

Welcoming the Ukrainian Government to Have I Been Pwned

Troy Hunt

Another month, another national government to bring onto Have I Been Pwned. This time it's the Ukrainian National Cybersecurity Coordination Center who now has access to monitor all their government domains via API domain search, free of charge. The Ukraine is now the 13th government to be onboarded to HIBP's service joining counterparts across Europe, North America and Australia.

article thumbnail

What if We Made Paying Ransoms Illegal?

Daniel Miessler

I was on Twitter the other day and saw someone suggest that we could fix people paying ransoms by making it illegal for them to do so. I was a bit flippant with my response. The person making the argument appears to be a serious security professional acting in good faith, and my response was below my standard for civil discourse. Apologies @VickerySec.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google’s Project Zero Finds a Nation-State Zero-Day Operation

Schneier on Security

Google’s Project Zero discovered , and caused to be patched, eleven zero-day exploits against Chrome, Safari, Microsoft Windows, and iOS. This seems to have been exploited by “Western government operatives actively conducting a counterterrorism operation”: The exploits, which went back to early 2020 and used never-before-seen techniques, were “watering hole” attacks that used infected websites to deliver malware to visitors.

article thumbnail

Zero trust: The good, the bad and the ugly

Tech Republic Security

Zero trust is a good cybersecurity platform, but experts suggest care to get it right and not disenfranchise users.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

(Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor

We Live Security

ESET researchers discover a new Lazarus backdoor deployed against a freight logistics firm in South Africa. The post (Are you) afreight of the dark? Watch out for Vyveva, new Lazarus backdoor appeared first on WeLiveSecurity.

Malware 145
article thumbnail

Nation-state cyber attacks could lead to cyber conflict

Tech Republic Security

New HP-sponsored report finds significant increase in nation-states targeting enterprises to steal high-value IP.

More Trending

article thumbnail

Microsoft releases a cyberattack simulator - Shall we play a game?

Bleeping Computer

Microsoft has released an open-source cyberattack simulator that allows security researchers and data scientists to create simulated network environments and see how they fare against AI-controlled cyber agents. [.].

144
144
article thumbnail

Digging Into the Third Zero-Day Chrome Flaw of 2021

The State of Security

Hidden deep in Google’s release notes for the new version of Chrome that shipped on March 1 is a fix for an “object lifecycle issue.” Or, for the less technically inclined, a major bug. Bugs like these have been common in Chrome, leading some to wonder whether the world’s most popular web browser is as […]… Read More. The post Digging Into the Third Zero-Day Chrome Flaw of 2021 appeared first on The State of Security.

143
143
article thumbnail

Hackers hit nine countries, expose 623,036 payment card records

SC Magazine

A sign showing credit card logos is seen outside of a bank. user data of the Swarmshop card shop – which trades in stolen personal and payment records – was leaked online on March 17 and posted on a different underground forum. (Photo by Justin Sullivan/Getty Images). Hackers are hacking hackers. Group-IB researchers on Thursday said in a blog that user data of the Swarmshop card shop – which trades in stolen personal and payment records – was leaked online on March 17 and posted on a different

Banking 142
article thumbnail

The Facebook Data Leak Explained

Digital Shadows

This weekend press exposed a significant data leakage containing the records of 533 million Facebook users. The records were posted. The post The Facebook Data Leak Explained first appeared on Digital Shadows.

141
141
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Secrets Detection: An Emerging AppSec Category

Security Boulevard

Applications are no longer standalone monoliths, they now rely on thousands of independent building blocks: cloud infrastructure, databases, SaaS components such as Stripe, Slack and HubSpot, just to name a few. This is a significant shift in software development. Secrets are the glue that connects these different application building blocks by making a secure connection.

Software 139
article thumbnail

Digital artists meet scam artists, as criminals pounce on NFT craze

SC Magazine

An example of hashmask image that accompanies a Non-Fungible Token. ( Created by “Suum Cuique Labs GmbH”, Full ownership and unlimited commercial usage rights given to the consumer over their NFT. Source: [link] Section 3. A. , Public domain, via Wikimedia Commons). Many people have never even heard of non-fungible tokens. And yet, it’s become such a hot trend that scammers have taken notice and are attempting to lure current and prospective traders onto NFT-themed phishing and fraud

Scams 137
article thumbnail

What is Cyber Risk?

Security Boulevard

The discouraging numbers continue to grow as the latest high-profile breaches make headlines. Another corporate giant crumbles with. Read More. The post What is Cyber Risk? appeared first on Hyperproof. The post What is Cyber Risk? appeared first on Security Boulevard.

article thumbnail

How password anxiety is impacting individuals and organizations

Tech Republic Security

A majority of people said they'd avoid using certain websites or accounts where they've forgotten their password, says LastPass.

Passwords 152
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

The Automation of Fraud Attacks

Security Boulevard

The need for automation of fraud attacks Legitimate enterprises take advantage of automation to handle repetitive, yet business-critical tasks. They pay top dollars for skilled engineers to build and maintain automated business logic. Fraudsters do the same and commonly leverage botnets to automate part of the workflow that will lead to a successful fraud attack. […].

article thumbnail

How to use Docker Bench for Security to audit your container deployments

Tech Republic Security

Docker Bench for Security is a simple way of checking for common best practices around your Docker deployments in production. Jack Wallen shows you how to use this tool.

126
126
article thumbnail

Apple Inc to start take App Privacy Notifications seriously

CyberSecurity Insiders

Apple Inc has made it official that it is going to implement App Privacy Notifications seriously that could impact deeply digital ad firms such as Facebook and Twitter. Now to those uninitiated, the new policy can only roll out when the company’s iOS 14.5 OS rolls out in coming days. And will ask all app developers to make it mandatory to ask their users permission before they track their activity.

article thumbnail

Safe-T Has Partnered with Thales to Bring a New Remote Access Security Solution to the Table

Thales Cloud Protection & Licensing

Safe-T Has Partnered with Thales to Bring a New Remote Access Security Solution to the Table. madhav. Thu, 04/08/2021 - 07:38. The global pandemic of 2020 has changed the world around us in drastic and likely permanent ways. One of the most significant effects the pandemic has had on daily life is the need for businesses to support employees choosing to work from home.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Windows 10 hacked again at Pwn2Own, Chrome and Zoom also fall

Bleeping Computer

Contestants hacked Microsoft's Windows 10 OS twice during the second day of the Pwn2Own 2021 competition, together with the Google Chrome web browser and the Zoom video communication platform. [.].

Hacking 128
article thumbnail

Could this 'Unhackable' Chip Be a Security Moonshot?

SecureWorld News

Does the term unhackable send you into fits of laughter? Or does it make you wave your hand in the air as if to dismiss that possibility without needing a second thought? Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and more than 500 cybersecurity researchers tried to break through its security.

CISO 123
article thumbnail

What is IAM? Identity and access management explained

CSO Magazine

IAM Definition. Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network entities (users and devices) to a variety of cloud and on-premises applications. Users include customers, partners and employees; devices include computers, smartphones, routers, servers, controllers and sensors.

CSO 121
article thumbnail

Over 600,000 stolen credit cards leaked after Swarmshop hack

Bleeping Computer

The hacking spree targeting underground marketplaces has claimed another victim as a database from card shop Swarmshop emerged on another forum. [.].

Hacking 135
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof

Security Affairs

Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million records as proof. Original Post at [link]. An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author.

article thumbnail

CISA releases tool to review Microsoft 365 post-compromise activity

Bleeping Computer

The Cybersecurity and Infrastructure Security Agency (CISA) has released a companion Splunk-based dashboard that helps review post-compromise activity in Microsoft Azure Active Directory (AD), Office 365 (O365), and Microsoft 365 (M365) environments. [.].

article thumbnail

Audiencerate Achieves TRUSTe International Privacy Verification Through TrustArc

TrustArc

TrustArc has announced that Audiencerate, the identity hub, has received the TRUSTe International Privacy Verification from TrustArc. The verification illustrates that verified organizations maintain industry-established principles and standards for protecting personal data. “We are thrilled and proud to have received the TRUSTe Verification, demonstrating our commitment to privacy compliance.

116
116
article thumbnail

A Cyber Attack probability on Facebook, Instagram and WhatsApp cannot be ruled out

CyberSecurity Insiders

From the past few hours social networking platform Facebook and its messaging sharing subsidiary WhatsApp and Instagram were down because of some unknown reasons. The disruption was felt mainly by users in North and South America; some parts of UK and Africa. And the outage existed even till the time this article was in writing. Sources say that the outage hit Instagram first at 5 Pm ET and then showed its impact on other services such as Facebook and WhatsApp as well.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Does data stolen in a data breach expire?

We Live Security

Some personal information just doesn’t age – here’s what the Facebook data leak may mean for you. The post Does data stolen in a data breach expire? appeared first on WeLiveSecurity.

article thumbnail

Microsoft Office 365 phishing evades detection with HTML Lego pieces

Bleeping Computer

A recent phishing campaign used a clever trick to deliver the fraudulent web page that collects Microsoft Office 365 credentials by building it from chunks of HTML code stored locally and remotely. [.].

Phishing 127
article thumbnail

Italian data watchdog probes data breach of LinkedIn 500 million user accounts

CyberSecurity Insiders

For the first time in the history of professional social media platform LinkedIn a formal investigation has been launched by Italian watchdog Garante Privacy over a data breach of 500m LinkedIn user accounts. LinkedIn confirmed the probe and stated that it is ready to face a legal probe in this regards and is ready for the consequences as well–if/when found guilty.

article thumbnail

Exchange, Teams, Zoom, Hacked at Pwn2Own 2021

Digital Guardian

The annual hacking competition will see 23 attempts against operating systems, virtualization software, and browsers.

Hacking 141
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.