Fri.Nov 03, 2023

article thumbnail

New York Increases Cybersecurity Rules for Financial Companies

Schneier on Security

Another example of a large and influential state doing things the federal government won’t: Boards of directors, or other senior committees, are charged with overseeing cybersecurity risk management, and must retain an appropriate level of expertise to understand cyber issues, the rules say. Directors must sign off on cybersecurity programs, and ensure that any security program has “sufficient resources” to function.

article thumbnail

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Tech Republic Security

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Microsoft Exchange zero-days allow RCE, data theft attacks

Bleeping Computer

Microsoft Exchange is impacted by four zero-day vulnerabilities that attackers can exploit remotely to execute arbitrary code or disclose sensitive information on affected installations. [.

134
134
article thumbnail

What Is a VPN? Definition, How It Works, and More

Tech Republic Security

A VPN (virtual private network) encrypts your internet traffic and protects your online privacy. Find out how it works and why you should use it.

VPN 151
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

CanesSpy Spyware Discovered in Modified WhatsApp Versions

The Hacker News

Cybersecurity researchers have unearthed a number of WhatsApp mods for Android that come fitted with a spyware module dubbed CanesSpy. These modified versions of the instant messaging app have been observed propagated via sketchy websites advertising such software as well as Telegram channels used primarily by Arabic and Azerbaijani speakers, one of which boasts 2 million users.

Spyware 132
article thumbnail

Russian FSB arrested Russian hackers who supported Ukrainian cyber operations

Security Affairs

The FSB arrested two Russian hackers who are accused of having helped Ukrainian entities carry out cyberattacks on critical infrastructure targets. The Russian intelligence agency Federal Security Service (FSB) arrested two individuals who are suspected of supporting Ukrainian entities to carry out cyberattacks to disrupt Russian critical infrastructure.

Media 129

More Trending

article thumbnail

Okta customer support system breach impacted 134 customers

Security Affairs

Threat actors who breached the Okta customer support system also gained access to files belonging to 134 customers. Threat actors who breached the Okta customer support system in October gained access to files belonging to 134 customers, the company revealed. Some of the files accessed by the attackers are HAR files that contained session tokens. According to the company, the threat actor was able to use these session tokens to hijack the legitimate Okta sessions of 5 customers.

article thumbnail

Ace Hardware Still Reeling From Weeklong Cyberattack

Dark Reading

Cyberattackers downed a quarter of the hardware giant's entire IT apparatus. Now, before the company can recover, they're going after individual branches.

127
127
article thumbnail

ZDI discloses four zero-day flaws in Microsoft Exchange

Security Affairs

Researchers disclosed four zero-day flaws in Microsoft Exchange that can be remotely exploited to execute arbitrary code or disclose sensitive information on vulnerable installs. Trend Micro’s Zero Day Initiative (ZDI) disclosed four zero-day vulnerabilities in Microsoft Exchange that can be remotely exploited by an authenticated attacker to execute arbitrary code or disclose sensitive information on vulnerable installs.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 11/3

Security Boulevard

Insight #1 A recent study has 2/3 of cybersecurity professionals saying they have a shortage of cybersecurity staff. The most troubling part of this isn’t that they can’t find people to hire; it's that they aren’t actually hiring, leaving holes in their ability to protect their organization. The post Cybersecurity Insights with Contrast CISO David Lindner | 11/3 appeared first on Security Boulevard.

CISO 113
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Multiple WhatsApp mods spotted containing the CanesSpy Spyware

Security Affairs

Kaspersky researchers are warning of multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. Kaspersky researchers discovered multiple WhatsApp mods that embed a spyware module dubbed CanesSpy. mods are modifications or alterations made to an application, often by third-party developers or users. These modifications can serve various purposes, such as adding new features, customizing the app’s behavior, or enhancing its performance.

Spyware 110
article thumbnail

Google Play adds security audit badges for Android VPN apps

Bleeping Computer

Google Play, Android's official app store, is now tagging VPN apps with an 'independent security reviews' badge if they conducted an independent security audit of their software and platform. [.

VPN 113
article thumbnail

Google Play Store Highlights 'Independent Security Review' Badge for VPN Apps

The Hacker News

Google is rolling out a new banner to highlight the "Independent security review" badge in the Play Store's Data safety section for Android VPN apps that have undergone a Mobile Application Security Assessment (MASA) audit.

VPN 111
article thumbnail

Dutch hacker jailed for extortion, selling stolen data on RaidForums

Bleeping Computer

A former Dutch cybersecurity professional was sentenced to four years in prison after being found guilty of hacking and blackmailing more than a dozen companies in the Netherlands and worldwide. [.

Hacking 110
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads

The Hacker News

Compromised Facebook business accounts are being used to run bogus ads that employ "revealing photos of young women" as lures to trick victims into downloading an updated version of a malware called NodeStealer. "Clicking on ads immediately downloads an archive containing a malicious.exe 'Photo Album' file which also drops a second executable written in.

article thumbnail

CVE-2023-31102: 7-Zip Remote Code Execution Vulnerability

Penetration Testing

7-Zip is one of the most popular file archivers in the world and for good reason. It’s free, open-source, and supports a wide range of archive formats. However, a recent vulnerability discovered in 7-Zip... The post CVE-2023-31102: 7-Zip Remote Code Execution Vulnerability appeared first on Penetration Testing.

article thumbnail

Apache ActiveMQ vulnerability used in ransomware attacks

Malwarebytes

On the 27 October, the Apache Software Foundation (ASF) announced a very serious vulnerability in Apache ActiveMQ that can be used to achieve remote code execution (RCE). The Cybersecurity and Infrastructure Security Agency has now added this vulnerability to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate this vulnerability by November 11, 2023 in order to protect their de

article thumbnail

Remembering the World’s Greatest Hacker: Kevin Mitnick's Legacy

Mitnick Security

Arguably the most influential hacker, Kevin Mitnick, leaves behind a tremendous legacy and industry-changing knowledge in the hacking community as well as Mitnick Security and our team of security consultants.

Hacking 102
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

American Airlines pilot union hit by ransomware attack

Bleeping Computer

Allied Pilots Association (APA), a labor union representing 15,000 American Airlines pilots, disclosed a ransomware attack that hit its systems on Monday. [.

article thumbnail

Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind

Lenny Zeltser

The notion that security is everyone’s responsibility in computer systems dates back to at least the early 1980s when it was included in a US Navy training manual and hearings in the US House of Representatives. Behind the pithy slogan is the idea that every person in the organization contributes to its security program. Even if the company has employees with “security” in their title, they cannot safeguard information assets on their own.

article thumbnail

Okta's Recent Customer Support Data Breach Impacted 134 Customers

The Hacker News

Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 18,400 customers. It further noted that the unauthorized intruder gained access to its systems from September 28 to October 17, 2023, and ultimately accessed HAR files containing session tokens that could be used for session hijacking attacks.

article thumbnail

Critical Atlassian Bug Exploit Now Available; Immediate Patching Needed

Dark Reading

In-the-wild exploit activity from dozens of cyberattacker networks is ramping up for the security vulnerability in Confluence, tracked as CVE-2023-22518.

104
104
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Predictive AI in Cybersecurity: Outcomes Demonstrate All AI is Not Created Equally

The Hacker News

Here is what matters most when it comes to artificial intelligence (AI) in cybersecurity: Outcomes. As the threat landscape evolves and generative AI is added to the toolsets available to defenders and attackers alike, evaluating the relative effectiveness of various AI-based security offerings is increasingly important — and difficult.

article thumbnail

The Week in Ransomware - November 3rd 2023 - Hive's Back

Bleeping Computer

Over the past couple of months, ransomware attacks have been escalating as new operations launch, old ones return, and existing operations continue to target the enterprise. [.

article thumbnail

To Improve Cyber Defenses, Practice for Disaster

Dark Reading

Trained teams can implement and test security measures and protocols to prevent and mitigate cyber breaches.

122
122
article thumbnail

The Threat Is Real. MacOS Patching Keeps Your Apple Safe

Heimadal Security

Any device that runs code is vulnerable to hacking and so are MacOS machines. They need patching just as any other endpoint. Most Apple users would swear that Macs are immune to viruses and other malware. The truth is they`re not. A Mac is a computer, not a cybersecurity software. Hackers successfully target Macs with […] The post The Threat Is Real.

Malware 89
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

'KandyKorn' macOS Malware Lures Crypto Engineers

Dark Reading

Posing as fellow engineers, the North Korean state-sponsored cybercrime group Lazarus tricked crypto-exchange developers into downloading the hard-to-detect malware.

article thumbnail

Silent Safeguards – The Essence of ISO 27001 Controls

Heimadal Security

ISO 27001, sometimes referred to as ISO/IEC 27001 is an international standard that addresses organizational information security. Issued in 2005 and with a second revision in 2013, the ISO 27001 standard describes the Information Security Management Systems requirements for global controls and safeguards meant to preserve data privacy, protect sensitive information, optimize the organizational cybersecurity […] The post Silent Safeguards – The Essence of ISO 27001 Controls appeared

article thumbnail

Okta Customer Support Breach Exposed Data on 134 Companies

Dark Reading

1Password, BeyondTrust, and Cloudflare were among five customers directly targeted with stolen Okta session tokens, the company's CSO says.

CSO 102
article thumbnail

Critical QNAP NAS Vulnerabilities Allow Remote Code Execution

Penetration Testing

QNAP NAS devices are popular among businesses and consumers alike for their ease of use and reliability. The company released security updates to address two critical vulnerabilities in its network-attached storage (NAS) devices that... The post Critical QNAP NAS Vulnerabilities Allow Remote Code Execution appeared first on Penetration Testing.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.