Fri.Aug 26, 2022

article thumbnail

Security and Cheap Complexity

Schneier on Security

I’ve been saying that complexity is the worst enemy of security for a long time now. ( Here’s me in 1999.) And it’s been true for a long time. In 2018, Thomas Dullin of Google’s Project Zero talked about “cheap complexity.” Andrew Appel summarizes : The anomaly of cheap complexity. For most of human history, a more complex device was more expensive to build than a simpler device.

Software 229
article thumbnail

8 best enterprise accounting software suites

Tech Republic Security

Enterprise accounting software is designed for large companies and businesses. Here are the top eight enterprise accounting software suites. The post 8 best enterprise accounting software suites appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Could Your Company Survive a Ransomware Attack?

CyberSecurity Insiders

Cyberattacks are commonplace in the United States and around the world. Thousands of data breaches happen annually and affect millions of people. One of the most ruthless cyberattacks is a ransomware attack. These cyber invasions affect all industries worldwide, and companies question whether their computer systems can withstand such an invasion. What Is a Ransomware Attack?

article thumbnail

Cosmetics giant Sephora first to be fined for violating California’s Consumer Privacy Act

Tech Republic Security

Sephora will have to pay $1.2 million in penalties, inform California customers it sells their personal data and offer them ways to opt out. The post Cosmetics giant Sephora first to be fined for violating California’s Consumer Privacy Act appeared first on TechRepublic.

Big data 147
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

“Looking for pentesters”: How Forum Life Has Conformed to the Ransomware Ban

Digital Shadows

In mid-May 2021, the administrators of XSS and Exploit, two of the most prominent Russian-language cybercriminal forums, introduced a ban. The post “Looking for pentesters”: How Forum Life Has Conformed to the Ransomware Ban first appeared on Digital Shadows.

article thumbnail

Hackers Breach LastPass Developer System to Steal Source Code

The Hacker News

Password management service LastPass confirmed a security incident that resulted in the theft of certain source code and technical information. The security breach is said to have occurred two weeks ago, targeting its development environment. No customer data or encrypted passwords were accessed.

More Trending

article thumbnail

Friday Five 8/26

Digital Guardian

Read about why Twitter is coming under fire, how a cybersecurity organization may have gone on the offensive, possible big changes coming for software vendors, and much more in this week’s Friday Five!

article thumbnail

What I wish I knew about security when I started programming

Security Boulevard

It’s critical for developers to understand basic security concepts and best practices to build secure applications. The post What I wish I knew about security when I started programming appeared first on Application Security Blog. The post What I wish I knew about security when I started programming appeared first on Security Boulevard.

article thumbnail

Atlassian Bitbucket Server vulnerable to critical RCE vulnerability

Bleeping Computer

Atlassian has published a security advisory warning Bitbucket Server and Data Center users of a critical security flaw that attackers could leverage to execute arbitrary code on vulnerable instances. [.].

97
article thumbnail

Apple flaws put company networks at risk

Security Boulevard

Last week, Apple found two zero-day vulnerabilities in both iOS 15.6.1 and iPadOS 15.6.1 that hackers may have actively exploited to gain access to corporate networks, according to at least one report. The first vulnerability enables a hacker to execute arbitrary code with kernel privileges, and the second works with maliciously crafted web content to execute arbitrary code.

Risk 98
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

A Simple Rundown Of Cryptocurrency And Blockchain Technology

SecureBlitz

Here, I will show you a rundown of cryptocurrency and blockchain technology. While many people are familiar with the terms crypto and cryptocurrency trading, the technologies involved and the mechanisms for how to processes work are often misunderstood. Whether you are an active cryptocurrency trader or simply interested in learning more, understanding the rundown of […].

article thumbnail

Cybersecurity News Round-Up: Week of August 22, 2022

Security Boulevard

Twitter's Ex-CSO accuses the company of cybersecurity negligence, Hackers continue to attack hospitals and critical infrastructure. The post Cybersecurity News Round-Up: Week of August 22, 2022 appeared first on Security Boulevard.

CSO 98
article thumbnail

Critical Vulnerability Discovered in Atlassian Bitbucket Server and Data Center

The Hacker News

Atlassian has rolled out fixes for a critical security flaw in Bitbucket Server and Data Center that could lead to the execution of malicious code on vulnerable installations. Tracked as CVE-2022-36804 (CVSS score: 9.9), the issue has been characterized as a command injection vulnerability in multiple endpoints that could be exploited via specially crafted HTTP requests.

94
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 8/26

Security Boulevard

Insight #1. ". If you are struggling with the adoption of MFA across your organization, it’s time to focus all your efforts in rolling out a solution that provides the best experience for your users. Enabling MFA is paramount to protecting your organization. Figure out the psychological acceptability of your users’ ability to use different forms of MFA such as TOTP, FIDO tokens, Push, Biometrics, and start with the most acceptable.". .

CISO 98
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations

The Hacker News

Iranian state-sponsored actors are leaving no stone unturned to exploit unpatched systems running Log4j to target Israeli entities, indicating the vulnerability’s long tail for remediation.

94
article thumbnail

Unified API Protection for Telcos and Mobile Carriers – Time to Value

Security Boulevard

Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory of the company’s sprawling API footprint. Business critical API-based applications were driving the mobile carrier’s day-to-day business of managing their mobile network, but […].

Mobile 98
article thumbnail

LastPass hackers steal source code, no evidence of users’ passwords compromised

The State of Security

LastPass, the popular password manager trusted by millions of people around the world, has announced that it suffered a security breach two weeks ago that saw hackers break into its systems and steal information. Read more in my article on the Tripwire State of Security blog.

article thumbnail

LastPass Breach Raises Disclosure Transparency Concerns

Security Boulevard

In the graphic novel “The Watchman” by Alan Moore and Dave Gibbons, one of the recurring themes is ‘Who watches the watchers?’, a question originally posed by the Roman poet Juvenal as “Quis custodiet ipsos custodes?” The LastPass breach that was revealed this week should serve as a reminder of the critical role password managers. The post LastPass Breach Raises Disclosure Transparency Concerns appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Critical flaw impacts Atlassian Bitbucket Server and Data Center

Security Affairs

Atlassian addressed a critical vulnerability in Bitbucket Server and Data Center that could lead to malicious code execution on vulnerable instances. Atlassian fixed a critical flaw in Bitbucket Server and Data Center, tracked as CVE-2022-36804 (CVSS score 9.9), that could be explored to execute malicious code on vulnerable installs. The flaw is a command injection vulnerability that can be exploited via specially crafted HTTP requests. “This advisory discloses a critical severity security

Hacking 91
article thumbnail

Confidential Computing Beats Homomorphic Encryption for Data Security

Security Boulevard

For the enterprise, data is like the air we breathe. At the same time, data seems to be indefensible, with data breaches and intellectual property loss a near certainty. New technologies arrive regularly to offer hope that, ultimately, data in use can, in fact, be protected. Homomorphic encryption has emerged as one interesting option. Confidential.

article thumbnail

Ransomware Attacks are on the Rise

Threatpost

Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.

article thumbnail

Why You Need a Third-Party Risk Management (TPRM) Program

Security Boulevard

What entity, or sector doesn’t engage with a third party in some way, shape or form? Not many. The reality is that outsourcing, contracting and subcontracting happen all the time and is the norm as businesses continue to embrace the core/context mindset and division of labor. The more you outsource, the more you need to. The post Why You Need a Third-Party Risk Management (TPRM) Program appeared first on Security Boulevard.

Risk 97
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Lloyd’s excluding nation-state cyber attacks from Cyber Insurance

CyberSecurity Insiders

Lloyd’s London, one of the largest insurance services providers in the world, has disclosed that it is making amendments to its cyber insurance laws that will come into effect from March 2023. And as per the latest, all risks emerging from cyber attacks that are funded by nations will be excluded from the cyber insurance policies and the new rule will apply to all the new policies and the about-to-be renewed ones.

article thumbnail

Twilio breach let hackers gain access to Authy 2FA accounts

Bleeping Computer

Twilio's investigation into the attack on August 4 reveals that hackers gained access to some Authy user accounts and registered unauthorized devices. [.].

article thumbnail

How to Sell Digital Products: Tips & Threats for Online Sellers in 2022

GlobalSign

You don’t want to spend weeks creating a digital product and getting no sales after launching it. We discuss useful tips for selling digital products and the main threats online sellers face in 2022.

88
article thumbnail

'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2

Dark Reading

Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open source attack-emulation tool in recent campaigns.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Massive “0ktapus” Phishing Attack Hits Over 130 Organizations

Heimadal Security

Over 130 organizations were compromised in the “0ktapus” phishing campaign and the credential of 9,931 employees were stolen. Hackers that are responsible for this string of cyberattacks target companies such as Twilio, MailChimp, and Klaviyo. This was a months-long phishing campaign that has been ongoing since March 2022 and aimed primarily at companies that use […].

article thumbnail

Their Photos Were Posted Online. Then They Were Bombed

WIRED Threat Level

An attack on Russian mercenaries shows how militaries are increasingly using open source data—with sometimes deadly consequences.

98
article thumbnail

French hospital crippled by cyberattack – Week in security with Tony Anscombe

We Live Security

As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts. The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

article thumbnail

Password manager LastPass reveals intrusion into development system

CSO Magazine

LastPass, maker of a popular password management application, revealed Thursday that an unauthorized party gained access to its development environment through a compromised developer account and stole some source code and proprietary technical information. An initial probe of the incident has revealed no evidence that customer data or encrypted password vaults were accessed by the intruder, CEO Karim Toubba stated in a company blog post.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.