Fri.Apr 23, 2021

article thumbnail

Business and operations leaders are building digital trust through partnerships

Tech Republic Security

Organizations are increasing investments in cybersecurity and their dependence on third parties—even in light of disruptions, according to PwC's Cyber Trust report.

article thumbnail

China Silently Hacked Gov’t and Defense for a Year or More

Security Boulevard

After SolarWinds and the Exchange débâcle, here’s the third shoe to drop. The post China Silently Hacked Gov’t and Defense for a Year or More appeared first on Security Boulevard.

Hacking 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Major Cyber Attacks that took place so far in 2021

CyberSecurity Insiders

Microsoft Exchange Server Cyber Attack- Cyber Threat actors somehow infiltrated the email servers of Microsoft Exchange operating across the world through a vulnerability and accessed data of many government and private companies. Later, the Satya Nadella led company issued a statement that it could be the work of a Chinese Hacking group named Hafinium.

article thumbnail

Passwordstate password manager hacked in supply chain attack

Bleeping Computer

Click Studios, the company behind the Passwordstate password manager, notified customers that attackers compromised the app's update mechanism to deliver malware in a supply-chain attack after breaching its networks. [.].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Apple AirDrop Flaws Could Let Hackers Grab Users’ Phone Numbers and Email Addresses

Hot for Security

Users of Apple products have long loved the ability to wirelessly share files with each other, using AirDrop to transmit files between their iPhones and Macbooks. But researchers at the Technical University of Darmstadt in Germany have discovered that security weaknesses could allow an attacker to obtain a victim’s phone number and even email address.

Wireless 144
article thumbnail

HashiCorp is the latest victim of Codecov supply-chain attack

Bleeping Computer

Open-source software tools and Vault maker HashiCorp disclosed a security incident yesterday that occurred due to the recent Codecov attack. HashiCorp, a Codecov customer, has stated that the recent Codecov supply-chain attack aimed at collecting developer credentials led to the exposure of HashiCorp's GPG signing key. [.].

Software 143

More Trending

article thumbnail

Ransomware gang offers traders inside scoop on attack victims so they can short sell their stocks

SC Magazine

NASDAQ displays in Times Square deliver stock market information to traders. (bfishadow on Flickr, CC BY 2.0 [link] , via Wikimedia Commons). Brazen ransomware groups are continuing to seek out new avenues to rake in profits and ratchet up pressure on victims. In one of the latest such developments, the DarkSide ransomware group is openly coaxing stock traders to reach out and receive the inside scoop on the gang’s latest corporate victims, so they can short sell their stock before any data is l

article thumbnail

Love in a time of quarantine can be costly

Tech Republic Security

A new report says people were scammed out of a record-breaking $304 million in the past year after being "catfished.

Scams 150
article thumbnail

When a Ripple Becomes a Wave: Cyberattack Fallout

Security Boulevard

The exploitation of Microsoft Exchange Server made headlines earlier this year, sending security teams scrambling to patch their servers before malicious actors had a chance to compromise their system. According to Microsoft, they have attributed the attack to a group called Hafnium, which they describe as a being “state sponsored and operating out of China.”.

article thumbnail

Top 8 Cybersecurity Podcasts of 2021

eSecurity Planet

Cybersecurity podcasts are an easy way to immerse yourself in the world of SecOps. Depending on your interests, you can catch up on the latest news and hear analysis from experts in the field, or you can take a deep-dive into a major cybersecurity story or concept. The best part? You can listen while doing tasks that require little concentration such as washing dishes or folding laundry.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device.

VPN 126
article thumbnail

Instagram rolls out new features to help prevent cyberbullying

We Live Security

The social media platform is stepping up efforts to help stomp out harassment and other abusive behavior. The post Instagram rolls out new features to help prevent cyberbullying appeared first on WeLiveSecurity.

Media 125
article thumbnail

This time for sure, Pinky!

Adam Shostack

If everyone agrees on what we should do, why do we seem incapable of doing it? Alternately, if we are doing what we have been told to do, and have not reduced the risks we face, are we asking people to do the wrong things? Read Mike Tanji’s full article, From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice.

Risk 100
article thumbnail

Practical Steps for Fixing Flaws and Creating Fewer Vulnerabilities

Veracode Security

All security flaws should be fixed, right? In an ideal world, yes , all security flaws should be fixed as soon as they???re discovered. But for most organizations, fixing all security flaws isn???t feasible. A practical step your organization can ??? and should ??? take is to prioritize which flaws should be fixed first. To figure out which flaws should take precedence on your remediation ???

Software 120
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

BrandPost: A Healthy Boost: Hospital Uses Managed Services to Bolster Security

CSO Magazine

The healthcare industry remains a prime target for cybercriminals. In 2020, more than 29 million healthcare records were breached—a 25% increase over 2019, according to the HIPAA Journal. These sorts of statistics keep healthcare security leaders awake at night. “Like all healthcare institutions, we are particularly vulnerable because medical records go for a premium price on the dark web,” says Dr.

article thumbnail

New Qlocker ransomware infected hundreds of QNAP NAS devices in a few days

Security Affairs

A new ransomware strain dubbed Qlocker is infecting hundreds of QNAP NAS devices every day and demanding a $550 ransom payment. Experts are warning of a new strain of ransomware named Qlocker that is infecting hundreds of QNAP NAS devices on daily bases. The malware moves all files stored on the device to password-protected 7zip archives and demand the payment of a $550 ransom.

article thumbnail

Phishing impersonates global recruitment firm to push malware

Bleeping Computer

An ongoing phishing campaign is impersonating Michael Page consultants to push Ursnif data-stealing malware capable of harvesting credentials and sensitive data from infected computers. [.].

Phishing 115
article thumbnail

Darkside Ransomware gang aims at influencing the stock price of their victims

Security Affairs

The Darkside ransomware gang is enhancing its extortion tactics to interfere with the valuation of stocks of companies that are listed on NASDAQ or other stock markets. The Darkside ransomware operators are stepping up their extortion tactics targeting companies that are listed on NASDAQ or other stock markets with a new technique. The group announced with a message on their leak side that they will provide information stolen from these companies before the publication, so that it would be possi

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Apple AirDrop has “significant privacy leak”, say German researchers

Naked Security

Researchers say they reported what they consider to be a privacy hole to Apple in 2019, but never heard back. They worked on a fix anyway.

130
130
article thumbnail

Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses

Security Boulevard

Clients love the ID Agent Digital Risk Protection Platform. But don't take our word for it - hear from them directly in 2 new case studies! The post Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses appeared first on Security Boulevard.

Risk 113
article thumbnail

BrandPost: Mapping Your Way To Compliance With Cybersecurity Frameworks

CSO Magazine

Organizations today need to comply with multiple policy, regulatory, and legal security frameworks. Complying with all of these frameworks can be difficult and time consuming. Your cybersecurity program can work more efficiently when you know how to "map" them all together. Efficiencies for Cybersecurity Compliance. Today's IT and information security professionals can find themselves tasked with satisfying myriad regulatory frameworks.

article thumbnail

Keeping employee data safe – no matter where they may be

Security Boulevard

how to secure wifi for remote work, working from home securely, security home network, secure wifi network, remote work security risks, work from home security best practices. The post Keeping employee data safe – no matter where they may be appeared first on NuData Security. The post Keeping employee data safe – no matter where they may be appeared first on Security Boulevard.

Risk 109
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Oscar-Bait, Literally: Hackers Abuse Nominated Films for Phishing, Malware

Threatpost

Judas and the Black Messiah may be a favorite for Best Picture at the 93rd Academy Awards on Sunday, but it's a fave for cybercriminals too.

Phishing 120
article thumbnail

Lessons learned from building an inventory of systems

CyberSecurity Insiders

IT asset inventory vs an ISI – What’s the difference? Many frameworks, standards, and regulations require organizations to have an IT Asset Management program in place. However, the understanding of what separates a mature Information System Inventory (ISI) from an IT Asset Inventory and the benefits realized from an ISI are generally less well understood.

Risk 105
article thumbnail

An American History of Coups: How Military and Police Led Jan 6th Violence

Security Boulevard

When the events of January 6th unfolded, a hot-take was posted by a DefenseOne executive editor immediately declaring no coup because: Coups don’t come without any military, police, secret police, or armed forces of any kind on their side. As someone who has studied coups for decades, I nearly spit my tea. It seemed so … Continue reading An American History of Coups: How Military and Police Led Jan 6th Violence ?.

article thumbnail

Remote debuggers as an attack vector

Acunetix

Over the course of the past year, our team added many new checks to the Acunetix scanner. Several of these checks were related to the debug modes of web applications as well as components/panels used for debugging. These debug modes and components/panels often have misconfigurations, Read more. The post Remote debuggers as an attack vector appeared first on Acunetix.

109
109
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Microsoft Exchange Servers Used To Mine Cryptocurrency

Heimadal Security

The modular malware known as Prometei is able to infect both Windows and Linux systems, which makes it highly dangerous. The malware was first spotted last year. At that time it was using the EternalBlue exploit in order to gain access across compromised networks and enslave vulnerable Windows computers. It looks like that malware has been […].

article thumbnail

5 Fundamental But Effective IoT Device Security Controls

Threatpost

Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices.

IoT 121
article thumbnail

7 Types of Phishing: How to Recognize Them & Stay Off the Hook

Security Boulevard

Phishing is today’s most dangerous cyberattack. Google noted a more than 600% spike in phishing attacks in 2020 compared to 2019 with a total of 2,145,013 phishing sites registered as of January 17, 2021, up from 1,690,000 on Jan 19, 2020. It is the gateway to many types of damaging cyberattack including ransomware, malware, business email compromise (BEC), spoofing, identity theft, brand impersonation and credential compromise.

Phishing 100
article thumbnail

3 cloud architecture mistakes we all make, but shouldn’t

InfoWorld on Security

The only time I had an issue with someone I worked for was when they wanted me to punish a junior IT architect on my staff for making a pretty big mistake. One of the databases was not compatible with a middleware layer already in existence. Obviously, this error cost us time and money. But these kinds of mistakes are almost unavoidable when configuring IT systems, cloud computing included.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.