Tue.May 24, 2022

article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

Google, Microsoft and Apple are bitter arch-rivals who don’t often see eye-to-eye. Related: Microsoft advocates regulation of facial recognition tools. Yet, the tech titans recently agreed to adopt a common set of standards supporting passwordless access to websites and apps. This is one giant leap towards getting rid of passwords entirely. Perhaps not coincidently, it comes at a time when enterprises have begun adopting passwordless authentication systems in mission-critical parts of their inte

article thumbnail

The Justice Department Will No Longer Charge Security Researchers with Criminal Hacking

Schneier on Security

Following a recent Supreme Court ruling , the Justice Department will no longer prosecute “good faith” security researchers with cybercrimes: The policy for the first time directs that good-faith security research should not be charged. Good faith security research means accessing a computer solely for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability, where such activity is carried out in a manner designed to avoid any harm to indiv

Hacking 284
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Voice phishing attacks reach all-time high

Tech Republic Security

A study conducted by Agari and PhishLabs found a five-times increase in attempted vishing attacks from the beginning of 2021 to Q1 of 2022. The post Voice phishing attacks reach all-time high appeared first on TechRepublic.

Phishing 218
article thumbnail

New Linux-Based Ransomware 'Cheerscrypt' Targets EXSi Devices

Trend Micro

Trend Micro Research detected “Cheerscrypt”, a new Linux-based ransomware variant that compromises EXSi servers. We discuss our initial findings on in this report.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

A favorite of cybercriminals and nation states, ransomware incidents increase again

Tech Republic Security

70% of all malware breaches last year were ransomware. The post A favorite of cybercriminals and nation states, ransomware incidents increase again appeared first on TechRepublic.

article thumbnail

DuckDuckGo browser allows Microsoft trackers due to search agreement

Bleeping Computer

The privacy-focused DuckDuckGo browser purposely allows Microsoft trackers on third-party sites due to an agreement in their syndicated search content contract between the two companies. [.].

145
145

LifeWorks

More Trending

article thumbnail

Unknown APT group has targeted Russia repeatedly since Ukraine invasion

Malwarebytes

An unknown Advanced Persistent Threat (APT) group has targeted Russian government entities with at least four separate spear phishing campaigns since late February, 2022. The campaigns, discovered by the Malwarebytes Threat Intelligence team , are designed to implant a Remote Access Trojan (RAT) that can be used to surveil the computers it infects, and run commands on them remotely.

Malware 145
article thumbnail

Get More from Your Cybersecurity Spend When Inflation Rates Climb

Cisco Security

Find out how you can stretch your organization’s security budget amidst inflation and its economic impacts. No one could have predicted the lasting effects of the pandemic on our economy. A strain has been put on the overall supply chain, causing the value of the dollar, or any other local currency, to not go as far as it once did. Consumers are experiencing skyrocketing energy, gas, and food prices, and businesses are facing delays in deliveries of goods and services to their customers.

article thumbnail

Oracle bolsters its Cloud Security capabilities

CyberSecurity Insiders

Oracle has bolstered its Cloud Infrastructure with five new capabilities in order to protect its customers against attacks on cloud applications and data assets. The software giant will enhance its cloud native firewall service to enhance Oracle Cloud Guard and Oracle Security Zones. Nowadays, every business is interested in moving its application workloads and data to the cloud.

Firewall 142
article thumbnail

Zero-day vulnerabilities in Chrome and Android exploited by commercial spyware

Malwarebytes

The Google Threat Analysis Group (TAG) has revealed that of the nine zero-day vulnerabilities affecting Chrome, Android, Apple and Microsoft that it reported in 2021, five were in use by a single commercial surveillance company. Did I hear someone say Pegasus ? An educated guess, but wrong in this case. The name of the surveillance company—or better said, professional spyware vendor—is Cytrox and the name of its spyware is Predator.

Spyware 141
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Zola Wedding App ‘Hacked’ — Victims Lose BIG Money

Security Boulevard

A wedding planning startup, Zola, has been hacked—or so it seems. Users allege serious PCI violations. The post Zola Wedding App ‘Hacked’ — Victims Lose BIG Money appeared first on Security Boulevard.

Hacking 136
article thumbnail

Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

The Hacker News

Threat actors behind web skimming campaigns are leveraging malicious JavaScript code that mimics Google Analytics and Meta Pixel scripts in an attempt to sidestep detection.

129
129
article thumbnail

Poisoned Python and PHP packages purloin passwords for AWS access

Naked Security

More supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.

Passwords 126
article thumbnail

SIM-based Authentication Aims to Transform Device Binding Security to End Phishing

The Hacker News

Let's face it: we all use email, and we all use passwords. Passwords create inherent vulnerability in the system. The success rate of phishing attacks is skyrocketing, and opportunities for the attack have greatly multiplied as lives moved online. All it takes is one password to be compromised for all other users to become victims of a data breach.

Phishing 127
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

GM Credential Stuffing Attack Reveals Automobile Owners’ Details

Heimadal Security

The General Motors Company is a global American automobile manufacturing company with its headquarters in Detroit, Michigan. The corporation is the biggest automotive manufacturer located in the United States and is also one of the major manufacturers of motor vehicles in the world. The owners of Chevrolet, Buick, GMC, and Cadillac automobiles have access to […].

article thumbnail

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

The Hacker News

Even as the operators of Conti threatened to overthrow the Costa Rican government, the notorious cybercrime gang officially took down their infrastructure in favor of migrating their criminal activities to other ancillary operations, including Karakurt and BlackByte.

article thumbnail

This Malware-spreading PDF Uses a Clever File Name to Fool the Unsuspecting Victims

Heimadal Security

Threat actors using the Snake keylogger malware for Windows send malicious PDFs via email that have embedded Word documents to compromise their targets’ devices and snatch private data. The PDF malware operation has been observed by researchers at HP’s Wolf Security, who said that malicious PDFs are not a common method to use nowadays as […].

Malware 126
article thumbnail

Strong Password Policy Isn't Enough, Study Shows

Dark Reading

New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.

Passwords 124
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Cyber Attack on General Motors exposes customer details

CyberSecurity Insiders

General Motors (GM), an American automobile maker, has suggested that a credential stuffing attack that led to the exposure of customer details has hit it to hackers between April 11th–29th,2022. An email notification regarding the data breach is being sent to all affected customers by General Motors and it assured that it will put a curb on all such incidents soon by taking appropriate cybersecurity measures on a proactive note.

article thumbnail

Researchers to release exploit for new VMware auth bypass, patch now

Bleeping Computer

Proof-of-concept exploit code is about to be published for a vulnerability that allows administrative access without authentication in several VMware products. [.].

article thumbnail

7 machine identity management best practices

CSO Magazine

Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to secure them often fall short. Cybercriminals and other threat actors have been quick to take advantage. Cyberattacks that involved the misuse of machine identities increased by 1,600% over the last five years, according to a report released last spring by cybersecurity vendor Venafi.

article thumbnail

Popular Python and PHP libraries hijacked to steal AWS keys

Bleeping Computer

PyPI module 'ctx' that gets downloaded over 20,000 times a week has been compromised in a software supply chain attack with malicious versions stealing the developer's environment variables. Additionally, versions of a 'phpass' fork published to the PHP/Composer package repository Packagist had been altered to steal secrets. [.].

Software 120
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Most Dangerous Websites You Should Avoid [MUST READ]

SecureBlitz

Here, I will show you the most dangerous websites that you should avoid. We have entered into a new decade, Read more. The post Most Dangerous Websites You Should Avoid [MUST READ] appeared first on SecureBlitz Cybersecurity.

article thumbnail

New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

The Hacker News

Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and execute malicious code. Tracked from CVE-2022-22784 through CVE-2022-22787, the issues range between 5.9 and 8.1 in severity.

Hacking 119
article thumbnail

Nation-state malware could become a commodity on dark web soon, Interpol warns

Security Affairs

Interpol Secretary warns that nation-state malware will become available on the cybercrime underground in a couple of years. Interpol Secretary General Jurgen Stock declared that nation-state malwre will become available on the darknet in a couple of years. In the ongoing conflict between Russia and Ukraine, the malware developed by both nation-state actors and non state actors represents a serious risk for critical infrastructure and organizations worldwide.

Malware 117
article thumbnail

Trend Micro fixes bug Chinese hackers exploited for espionage

Bleeping Computer

Trend Micro says it patched a DLL hijacking flaw in Trend Micro Security used by a Chinese threat group to side-load malicious DLLs and deploy malware. [.].

Malware 117
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Malware Analysis: Trickbot

The Hacker News

In this day and age, we are not dealing with roughly pieced together, homebrew type of viruses anymore. Malware is an industry, and professional developers are found to exchange, be it by stealing one's code or deliberate collaboration.

Malware 117
article thumbnail

GET 30% OFF DASHLANE FOR YOUR BUSINESS

Tech Republic Security

At Dashlane, we’re passionate about making security simple. Dashlane is used by 20,000+ companies and 15+ million users worldwide. Whether it’s secure sharing, advanced password management, automated employee management, SAML-based single sign-on (SSO) integration, or any of our other features – we have you covered. Password management that’s good for your business, your team, and.

article thumbnail

Popular PyPI Package 'ctx' and PHP Library 'phpass' Hijacked to Steal AWS Keys

The Hacker News

Two trojanized Python and PHP packages have been uncovered in what's yet another instance of a software supply chain attack targeting the open source ecosystem. One of the packages in question is "ctx," a Python module available in the PyPi repository. The other involves "phpass," a PHP package that's been forked on GitHub to distribute a rogue update.

Software 115
article thumbnail

Open Source Intelligence May Be Changing Old-School War

WIRED Threat Level

Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.

112
112
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!