Fri.Nov 17, 2023

article thumbnail

Weekly Update 374

Troy Hunt

Think about it like this: in 2015, we all lost our proverbial minds at the idea of the Kazakhstan government mandating the installation of root certificates on their citizens' devices. We were outraged at the premise of a government mandating the implementation of a model that could, at their bequest, allow them to intercept traffic without any transparency or accountability.

article thumbnail

Google to Force-Block Ad Blockers — Time to Get Firefox?

Security Boulevard

Manifest V3: Destiny. Huge advertising monopoly flexes muscles: “Manifest V2” extensions to be nuked, but “V3” cripples ad blockers. The post Google to Force-Block Ad Blockers — Time to Get Firefox? appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Do Password Managers Work and Why Do You Need One?

Tech Republic Security

Learn how password managers work, their benefits, and why your organization needs one to secure sensitive data and prevent security breaches.

article thumbnail

Top 7 cyber security measures that enterprises shouldn’t neglect

Security Boulevard

In an era dominated by digital connectivity, enterprises face unprecedented challenges in safeguarding their sensitive data and digital assets from an ever-evolving landscape of cyber threats. As the frequency and sophistication of cyber attacks continue to rise, it becomes imperative […] The post Top 7 cyber security measures that enterprises shouldn’t neglect appeared first on WeSecureApp :: Simplifying Enterprise Security.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Medusa ransomware gang claims the hack of Toyota Financial Services

Security Affairs

Toyota Financial Services discloses unauthorized activity on systems after the Medusa ransomware gang claimed to have hacked the company. Toyota Financial Services confirmed the discovery of unauthorized activity on systems in a limited number of its locations. “Toyota Financial Services Europe & Africa recently identified unauthorised activity on systems in a limited number of its locations.

article thumbnail

Waves of Risk: The Growing Cybersecurity Crisis in Maritime Trade

Security Boulevard

Cybercriminals are actively attacking and interrupting supply chains by targeting maritime organizations with ransomware. DP World Australia, which manages 40% of Australian shipping, is the latest to fall victim to these attacks, leaving over 30,000 shipping containers backed up. Operations such as theirs are increasingly attractive targets for cybercriminals, primarily due to their reliance on.

Risk 127

More Trending

article thumbnail

Mitigating Cybersecurity Risks in a Hybrid-Work World

Security Boulevard

This shift toward remote work has opened up new opportunities for cybercriminals to exploit vulnerabilities and compromise sensitive data. The post Mitigating Cybersecurity Risks in a Hybrid-Work World appeared first on Security Boulevard.

Risk 119
article thumbnail

CISA adds Sophos Web Appliance bug to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added three new vulnerabilities (tracked as CVE-2023-36584 , CVE-2023-1671 , and CVE-2023-2551 ) to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added three new vulnerabilities to its Known Exploited Vulnerabilities catalog. Below is the list of the three added vulnerabilities: CVE-2023-36584 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability CVE-2023-1671 Sophos Web Appliance Command Injection

Hacking 116
article thumbnail

CyberTalk Series: MSP and MSSP Cybersecurity Challenges in 2023 and Goals for 2024 with Wayne Selk

Security Boulevard

2023 has been a great eyeopener for the industry, and now many MSPs are waking up to the realization that “nobody is too small. The post CyberTalk Series: MSP and MSSP Cybersecurity Challenges in 2023 and Goals for 2024 with Wayne Selk appeared first on Seceon. The post CyberTalk Series: MSP and MSSP Cybersecurity Challenges in 2023 and Goals for 2024 with Wayne Selk appeared first on Security Boulevard.

article thumbnail

The board of directors of OpenAI fired Sam Altman

Security Affairs

OpenAI fired its CEO Sam Altman, and the Chief technology officer Mira Murati appointed interim CEO to lead the company. Sam Altman has been removed as CEO of OpenAI. The company announced that Mira Murati, the Chief Technology Officer, has been appointed as interim CEO. He was distrusted by the board for his behavior, for this reason, it is believed that he is no longer fit to lead the company. “Mr.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

The Hacker News

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in attacks targeting Ukrainian entities.

116
116
article thumbnail

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

Dark Reading

For several years operators at New Delhi-based Appin hacked into, spied on, and stole data from targets around the world for clients that included private investigators, government agencies, law enforcement, and others.

Hacking 114
article thumbnail

CISA warns of actively exploited Windows, Sophos, and Oracle bugs

Bleeping Computer

The U.S. Cybersecurity & Infrastructure Security Agency has added to its catalog of known exploited vulnerabilities (KEV) three security issues that affect Microsoft devices, a Sophos product, and an enterprise solution from Oracle. [.

article thumbnail

27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts

The Hacker News

An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six months with an aim to deliver malware capable of gaining persistence, stealing sensitive data, and accessing cryptocurrency wallets for financial gain.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Scattered Spider Casino Hackers Evade Arrest in Plain Sight

Dark Reading

The feds seem to know all about the hacking group brazenly breaking into corporate networks; so why are enterprise teams left on their own to stop their cybercrimes?

article thumbnail

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

The Hacker News

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company Securonix is tracking the ongoing activity under the name SEO#LURKER. “The malicious advertisement directs the user to a compromised WordPress website gameeweb[.

Malware 108
article thumbnail

The Bin Laden Letter Is Being Weaponized by the Far Right

WIRED Threat Level

Far-right influencers and right-wing lawmakers are using the spread of Osama bin Laden’s “Letter to America” to call for a TikTok ban and boost decades old conspiracies.

110
110
article thumbnail

FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks

The Hacker News

The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams that make it possible for malicious actors to orchestrate SIM-swapping attacks and port-out fraud.

Scams 107
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Uscrapper: powerful OSINT webscraper for personal data collection

Penetration Testing

Uscrapper Introducing Uscrapper 2.0, A powerful OSINT web scrapper that allows users to extract various personal information from a website. It leverages web scraping techniques and regular expressions to extract email addresses, social media... The post Uscrapper: powerful OSINT webscraper for personal data collection appeared first on Penetration Testing.

article thumbnail

Ransomware gang files SEC complaint about victim

Malwarebytes

In what seems to be a new twist on the ransomware theme, the notorious ALPHV/BlackCat ransomware group has filed a complaint with the US Securities and Exchange Commission (SEC) about the software company MeridianLink. ALPHV is one of the most active ransomware-as-a-service (RaaS) operators and regularly appears in our monthly ransomware reviews. MeridianLink supplies “digital lending solutions” to banks, credit unions, fintechs, and other financial institutions.

article thumbnail

Yamaha Motor confirms ransomware attack on Philippines subsidiary

Bleeping Computer

Yamaha Motor's Philippines motorcycle manufacturing subsidiary was hit by a ransomware attack last month, resulting in the theft and leak of some employees' personal information. [.

article thumbnail

Hackers Weaponize SEC Disclosure Rules Against Corporate Targets

Dark Reading

Ransomware group BlackCat/ALPHV files SEC complaint against its latest victim, putting an audacious new twist on cyber extortion tactics.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

British Library: Ongoing outage caused by ransomware attack

Bleeping Computer

The British Library confirmed that a ransomware attack is behind a major outage that is still affecting services across several locations. [.

article thumbnail

Hands Off the Security Budget! Find Efficiencies to Reduce Risk

Dark Reading

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements.

Risk 96
article thumbnail

Bloomberg Crypto X account snafu leads to Discord phishing attack

Bleeping Computer

The official Twitter account for Bloomberg Crypto was used earlier today to redirect users to a deceptive website that stole Discord credentials in a phishing attack. [.

Phishing 102
article thumbnail

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

We Live Security

An attack against a port operator that ultimately hobbled some 40 percent of Australia’s import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause

90
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

The Week in Ransomware - November 17th 2023 - Citrix in the Crosshairs

Bleeping Computer

Ransomware gangs target exposed Citrix Netscaler devices using a publicly available exploit to breach large organizations, steal data, and encrypt files. [.

article thumbnail

DllNotificationInjection: a POC of a new “threadless” process injection technique

Penetration Testing

DllNotificationInjection DllNotificationInection is a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and remote processes. An accompanying blog post with more details... The post DllNotificationInjection: a POC of a new “threadless” process injection technique appeared first on Penetration Testing.

article thumbnail

Google: Hackers exploited Zimbra zero-day in attacks on govt orgs

Bleeping Computer

Hackers leveraged a medium-severity security issue now identified as CVE-2023-37580 since June 29, nearly a month before the vendor addressed it in version 8.8.15 Patch 41of the software on July 25. [.

article thumbnail

CVE-2023-48238: A Critical Vulnerability in json-web-token for Node.js

Penetration Testing

In the realm of cybersecurity, JSON Web Tokens (JWTs) have become an indispensable tool for secure communication and data exchange. However, even the most widely used technologies can harbor vulnerabilities, and a recent discovery... The post CVE-2023-48238: A Critical Vulnerability in json-web-token for Node.js appeared first on Penetration Testing.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.