Mon.Jul 18, 2022

article thumbnail

Facebook Is Now Encrypting Links to Prevent URL Stripping

Schneier on Security

Some sites, including Facebook, add parameters to the web address for tracking purposes. These parameters have no functionality that is relevant to the user, but sites rely on them to track users across pages and properties. Mozilla introduced support for URL stripping in Firefox 102 , which it launched in June 2022. Firefox removes tracking parameters from web addresses automatically, but only in private browsing mode or when the browser’s Tracking Protection feature is set to strict.

article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

The 911 service as it exists today. For the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft Windows computers daily, allowing customers to route their Internet traffic through PCs in virtually any country or city around the globe — but predominantly in the United States. 911 says its network is made up entirely of users who voluntarily install its “free VPN” software.

VPN 357
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why North Korean cybercriminals are targeting businesses with ransomware

Tech Republic Security

Microsoft says a ransomware gang calling itself H0lyGh0st may be sponsored by the North Korean government as a way for the country to offset its struggling economy. The post Why North Korean cybercriminals are targeting businesses with ransomware appeared first on TechRepublic.

article thumbnail

Trojanized Password Crackers Targeting Industrial Systems

Dark Reading

Tools purporting to help organizations recover lost passwords for PLCs are really droppers for malware targeting industrial control systems, vendor says.

Passwords 141
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Best VPN services for SMBs

Tech Republic Security

VPNs are an essential component in small and medium-sized businesses' cybersecurity toolkit. Here's how leading VPN services for SMBs compare. The post Best VPN services for SMBs appeared first on TechRepublic.

VPN 179
article thumbnail

Get Comprehensive Insights into Your Network with Secure Analytics and MITRE Mappings

Cisco Security

A deep dive into the latest updates from Secure Network and Cloud Analytics that show Cisco’s leadership in the Security Industry. The year 2022 has been rather hectic for many reasons, and as the World undergoes its various challenges and opportunities, We At Cisco Security have buckled up and focused on improving the World in the way which we know best: by making it more Secure.

VPN 140

LifeWorks

More Trending

article thumbnail

A week in security (July 11 – July 17)

Malwarebytes

Last week on Malwarebytes Labs: Elden Ring maker Bandai Namco hit by ransomware and data leaks Predatory Sparrow massively disrupts steel factories while keeping workers safe New variant of Android SpyJoker malware removed from Play Store after 3 million+ installs China’s Tonto Team increases espionage activities against Russia Endpoint security for Mac: 3 best practices Low-income consumers preyed on by fake ISP during pandemic, FCC says Ransomware rolled through business defenses in Q2 2022 Co

article thumbnail

A massive cyberattack hit Albania

Security Affairs

A synchronized criminal attack from abroad hit Albania over the weekend, all Albanian government systems shut down following the cyberattack. Albania was hit by a massive cyberattack over the weekend, the government confirmed on Monday. A synchronized criminal attack from abroad hit the servers of the National Agency for Information Society (AKSHI), which handles many government services. “In order to withstand these unprecedented and dangerous strikes, we have been forced to close down go

article thumbnail

6 security analyst job description red flags that make hiring harder

CSO Magazine

Hiring for the role of security analyst —that workhorse of security operations—could get even harder. Demand for the position is expected to grow, with the U.S. Bureau of Labor Statistics predicting organizations to add tens of thousands of positions through the decade, with employment for security analysts expected to grow by 33% from 2020 to 2030—much faster than the average for all occupations.

125
125
article thumbnail

Two-Faced Facebook: Foils Privacy Plugins by Encrypting URLs

Security Boulevard

Facebook is rolling out a new link schema—to fight privacy browsers and privacy plugins. The post Two-Faced Facebook: Foils Privacy Plugins by Encrypting URLs appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

8 months on, US says Log4Shell will be around for “a decade or longer”

Naked Security

When it comes to cybersecurity, ask not what everyone else can do for you.

article thumbnail

Passwordless company claims to offer better password security solution

CSO Magazine

Stytch, a company founded to spread the adoption of passwordless authentication, has announced what it's calling a modern upgrade to passwords. The cloud-based solution addresses four common problems with passwords that create security risks and account friction. Password reuse. When someone tries to access an account covered by the Stytch solution, the password is automatically vetted at HaveIBeenPwnd, a dataset of 12 billion compromised passwords.

Passwords 119
article thumbnail

Hackers Distributing Password Cracking Tool for PLCs and HMIs to Target Industrial Systems

The Hacker News

Industrial engineers and operators are the target of a new campaign that leverages password cracking software to seize control of Programmable Logic Controllers (PLCs) and co-opt the machines to a botnet. The software "exploited a vulnerability in the firmware which allowed it to retrieve the password on command," Dragos security researcher Sam Hanson said.

Passwords 118
article thumbnail

MLNK Builder 4.2 released in Dark Web – malicious shortcut-based attacks are on the rise

Security Affairs

Cybercriminals released a new MLNK Builder 4.2 tool for malicious shortcuts (LNK) generation with an improved Powershell and VBS Obfuscator. Resecurity, Inc. (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, has detected an update of one of the most popular tools used by cybercriminals to generate malicious LNK files, so frequently used for malicious payloads delivery nowadays.

Malware 117
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Leveraging Your Worth in Cybersecurity

CyberSecurity Insiders

Cybersecurity is swiftly evolving and opening the door for new career opportunities. People are transitioning away from traditional computer science careers to work in digital security. However, the sector is facing many challenges in filling open positions. Professionals must leverage their worth in the cybersecurity field to achieve success. They should improve their confidence levels, education and communication strategies to land high-paying jobs.

article thumbnail

?PCI DSS v4.0: Compensating Controls vs Customized Approach

PCI perspectives

A primary goal for PCI DSS v4.0 is to increase flexibility for organizations using different methods to achieve security objectives. One way the standard does this is with the introduction of the Customized Approach. We talk with Lauren Holloway, Director of Data Security Standards, to address some common questions about the Customized Approach.

115
115
article thumbnail

Auth0’s OpenFGA explained: Open source universal authorization

CSO Magazine

Auth0’s OpenFGA project is an open source effort that undertakes to provide a universal authentication solution. FGA stands for “Fine Grained Authorization,” a granular approach to authorization modeling that is flexible enough to handle almost any imaginable use case. Read on for an introduction to the OpenFGA project. Authentication vs. authorization.

article thumbnail

Extortionists target restaurants, demand money to take down bad reviews

Malwarebytes

Restaurants and other eating establishments are being targeted by extortionists who post fake reviews online and then offer to remove them in exchange for a gift card. The possibility has always existed to leave poor reviews on Google Maps and elsewhere. However, seeing fraudsters get organised and issue extortion threats alongside the review is a new development.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Retbleed Fixed in Linux Kernel, Patch Delayed

Dark Reading

Linus Torvalds says Retbleed has been addressed in the Linux kernel, but code complexity means the release will be delayed by a week to give more time for testing.

112
112
article thumbnail

iPhone iOS 16 update might trigger mobile security concerns

CyberSecurity Insiders

In September 2022, Apple Inc will release its iOS 16 to all smart phones in its ecosystem and is urging every device user of its to upgrade their device software with the new one. But what’s tricking in this OS upgrade is that it only works with the models related to iPhone 8 and above and cannot be downloaded by other phones such as iPhone 7 and the previous ones.

Mobile 110
article thumbnail

Workers Go Back to the Office: Cybersecurity After COVID-19

Security Boulevard

According to new research from Microsoft, 50% of companies want workers back in the office five days a week based on surveyed workers around the world between January and February. In the same report, 52% of workers are in the process of switching to a hybrid or a full-time remote job in 2022. This dichotomy. The post Workers Go Back to the Office: Cybersecurity After COVID-19 appeared first on Security Boulevard.

article thumbnail

Facts You Might Not Know About The Dark Web

SecureBlitz

This post will show you facts you might not know about the dark web. If you’re like most people, you. Read more. The post Facts You Might Not Know About The Dark Web appeared first on SecureBlitz Cybersecurity.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Pegasus Spyware Used to Hack Devices of Pro-Democracy Activists in Thailand

The Hacker News

Thai activists involved in the country's pro-democracy protests have had their smartphones infected with the infamous Pegasus government-sponsored spyware.

Spyware 103
article thumbnail

Watch out for the CVE-2022-30136 Windows NFS Remote Code Execution flaw

Security Affairs

Researchers published an analysis of the Windows remote code execution vulnerability CVE-2022-30136 impacting the Network File System. Trend Micro Research has published an analysis of the recently patched Windows vulnerability CVE-2022-30136 that impacts the Network File System. CVE-2022-30136 is a remote code execution vulnerability that resides in the Windows Network File System, it is due to improper handling of NFSv4 requests.

Hacking 102
article thumbnail

FBI Warns of Fake Cryptocurrency Apps Stealing Millions from Investors

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) has warned of cyber criminals building rogue cryptocurrency-themed apps to defraud investors in the virtual assets space. "The FBI has observed cyber criminals contacting U.S.

article thumbnail

Tor Browser 11.5 is optimized to automatically bypass censorship

Security Affairs

The Tor Project team has announced the release of Tor Browser 11.5, which introduces functionalities to automatically bypass censorship. The Tor Project team has announced the release of Tor Browser 11.5 , the new version of the popular privacy-oriented browser implements new features to fight censorship. With previous versions of the browser, circumventing censorship of the Tor Network itself was a manual process that required users to dive into Tor Network settings and chose a bridge to unbloc

Hacking 102
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

FBI warns of fake cryptocurrency apps used to defraud investors

Bleeping Computer

The FBI warned that cybercriminals are creating and using fraudulent cryptocurrency investment applications to steal funds from US cryptocurrency investors. [.].

article thumbnail

Building Guardrails for Autonomic Security

Dark Reading

AI's potential for automating security has promise, but there are miles to go in establishing decision-making boundaries.

99
article thumbnail

Experts Notice Sudden Surge in Exploitation of WordPress Page Builder Plugin Vulnerability

The Hacker News

Researchers from Wordfence have sounded the alarm about a "sudden" spike in cyber attacks attempting to exploit an unpatched flaw in a WordPress plugin called Kaswara Modern WPBakery Page Builder Addons. Tracked as CVE-2021-24284, the issue is rated 10.

article thumbnail

Name That Toon: Modern-Day Fable

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

99
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!