Mon.Aug 31, 2020

article thumbnail

Seny Kamara on "Crypto for the People"

Schneier on Security

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities around the world, instead of crypto problems for governments and corporations. Well worth watching and listening to.

article thumbnail

The best developer-centric security products

Tech Republic Security

Commentary: For organizations struggling to secure their IT, a host of new, developer-focused products are hitting the market. Check out this guide of the best developer-centric security products.

Marketing 183
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers are trying to exploit DoS flaw in Cisco IOS XR software running in carrier-grade routers

Security Affairs

Cisco warns that threat actors are attempting to exploit a high severity DoS flaw in its Cisco IOS XR software that runs on carrier-grade routers. Cisco warned over the weekend that attackers are trying to exploit a high severity memory exhaustion denial-of-service (DoS) vulnerability ( CVE-2020-3566 ) affecting the Cisco IOS XR Network OS that runs on carrier-grade routers.

Software 125
article thumbnail

Microsoft, Oracle, and Google top list of companies with most vulnerabilities disclosed in Q2

Tech Republic Security

Two days accounted for 818 vulnerabilities, or 7.3% of the entire midyear's disclosures so far, according to a new report.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Researchers warn of QNAP NAS attacks in the wild

Security Affairs

Hackers target QNAP NAS devices running multiple firmware versions vulnerable to a remote code execution (RCE) flaw addressed by the vendor 3 years ago. Hackers are scanning the Internet for vulnerable network-attached storage (NAS) devices running multiple QNAP firmware versions vulnerable to a remote code execution (RCE) vulnerability addressed by the vendor 3 years ago.

Firmware 117
article thumbnail

Apple Accidentally Approved Malware to Run on MacOS

WIRED Threat Level

The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino's “notarization” defenses for the first time.

Adware 122

More Trending

article thumbnail

Apple Accidentally Notarizes Shlayer Malware Used in Adware Campaign

Threatpost

The notarized malware payloads were discovered in a recent MacOS adware campaign, disguised as Adobe Flash Player updates.

Adware 120
article thumbnail

Testing & Automation Pay Off for NSA's DevSecOps Project

Dark Reading

Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

130
130
article thumbnail

The Life Cycle of a Compromised (Cloud) Server

Trend Micro

We dive into the common life cycle of a compromised server from initial compromise to the different stages of monetization preferred by criminals.

article thumbnail

How to Drive Maximum Value from Automation Testing?

Hacker Combat

The results of a survey published in Forbes stated that 56% of CEOs have seen that digital developments in their company have contributed to an increase in revenue. Efficient and error-free digital services have made this possible. At the customer front, the GUI offered by internet or standalone applications looks smooth only because of a series of testing and changes that have led to the release of the final product.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Slack Patches Critical Desktop Vulnerability

Dark Reading

The remote code execution flaw could allow a successful attacker to fully control the Slack desktop app on a target machine.

107
107
article thumbnail

How Cryptography Lets Down Marginalized Communities

WIRED Threat Level

Speaking at a prestigious crypto conference this month, Seny Kamara called on the field to recognize its blind spots—and fix them.

96
article thumbnail

From Defense to Offense: Giving CISOs Their Due

Dark Reading

In today's unparalleled era of disruption, forward-thinking CISOs can become key to company transformation -- but this means resetting relationships with the board and C-suite.

CISO 87
article thumbnail

Critical Slack Bug Allows Access to Private Channels, Conversations

Threatpost

The RCE bug affects versions below 4.4 of the Slack desktop app.

125
125
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

UVA Researcher Charged with Computer Intrusion & Trade Secret Theft

Dark Reading

Chinese national Haizhou Hu was researching bio-mimics and fluid dynamics at the University of Virginia.

101
101
article thumbnail

Stolen Fortnite Accounts Earn Hackers Millions Per Year

Threatpost

More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone.

article thumbnail

The Blurred Lines and Closed Loops of Google Search

WIRED Threat Level

Seemingly small design tweaks to the search results interface may change how and where people find information online.

86
article thumbnail

Malicious Android Apps Slip Through Google Play Protection

Dark Reading

Multiple Android apps were found spying on users and recruiting victims' devices into ad-fraud botnets.

99
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Charming Kitten Returns with WhatsApp, LinkedIn Effort

Threatpost

The Iran-linked APT is targeting Israeli scholars and U.S. government employees in a credential-stealing effort.

article thumbnail

Ransomware Attacks on Schools: 'Dirty, Rotten Scoundrels' Stop Online Learning

SecureWorld News

School districts across the United States are back in session. But this fall, most of the students are sitting in virtual class. They are connecting with their teachers and learning on their laptops via Google, Skype, or Zoom. This is a challenge for parents and teachers. It is also an opportunity—for hackers and cybercriminals who are trying to make money by disrupting school district networks.

article thumbnail

The five best Kubernetes security practices

InfoWorld on Security

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

52
article thumbnail

Former Cisco Engineer Pleads Guilty to WebEx Attack

SecureWorld News

Sudhish Ramesh was an engineer at Cisco. Like engineers at a lot of companies, he resigned and moved on. But a few months later, he gained unauthorized access to Cisco's cloud environment and caused more than $2,000,000 in damage. Ramesh just pleaded guilty to the crime in a Silicon Valley courtroom. Former Cisco engineer admits delete hundreds of virtual machines.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

If you’re a fan of The Game of Thrones, then here’s a little known bit of trivia. In 1970, a young science fiction writer turned chess player, George RR Martin, played with his Northwestern University team against one of the fastest computers of the time -- and the humans won. It would take another 27 years before IBM’s Deep Blue defeated world chess champion Gary Kasparov, and -- how’s this for a coincidence?

Hacking 52
article thumbnail

Google removed malicious Terracotta apps from the Play Store

Security Affairs

Researchers from White Ops discovers several Android apps in the official Play store which installed on users’ mobile devices the Terracotta ad fraud malware. Researchers from security firm White Ops discovered several Android apps in the official Play Store that installed a hidden browser to load pages containing ad and commit ad fraud. The company shared its findings with Google which has quickly removed an undisclosed number of Android apps from the Google Play Store.

article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

If you’re a fan of The Game of Thrones, then here’s a little known bit of trivia. In 1970, a young science fiction writer turned chess player, George RR Martin, played with his Northwestern University team against one of the fastest computers of the time -- and the humans won. It would take another 27 years before IBM’s Deep Blue defeated world chess champion Gary Kasparov, and -- how’s this for a coincidence?

Hacking 52