Wed.Dec 21, 2022

article thumbnail

Ukraine Intercepting Russian Soldiers’ Cell Phone Calls

Schneier on Security

They’re using commercial phones, which go through the Ukrainian telecom network : “You still have a lot of soldiers bringing cellphones to the frontline who want to talk to their families and they are either being intercepted as they go through a Ukrainian telecommunications provider or intercepted over the air,” said Alperovitch. “That doesn’t pose too much difficulty for the Ukrainian security services.” […]. “Security has always been a mess, bot

article thumbnail

What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

Tech Republic Security

Microsoft has open sourced its framework for managing open source in software development. The post What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it? appeared first on TechRepublic.

Software 168
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Suspicious login” scammers up their game – take care at Christmas

Naked Security

A picture is worth 1024 words - we clicked through so you don't have to.

Phishing 141
article thumbnail

Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers

Security Affairs

Play ransomware attacks target Exchange servers with a new exploit that bypasses Microsoft’s ProxyNotShell mitigations. Play ransomware operators target Exchange servers using a new exploit chain, dubbed OWASSRF by Crowdstrike, that bypasses Microsoft’s mitigations for ProxyNotShell vulnerabilities. The ProxyNotShell flaws are: CVE-2022-41040 – Microsoft Exchange Server Elevation of Privilege Vulnerability.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cybersecurity Predictions: 2023 Brings New Threats from Hybrid Working and Economic Downturn

CyberSecurity Insiders

John Stock, Product Manager, Outpost24. With continued challenges from remote and hybrid working, increased economic unrest and geopolitical conflict, and a new gang of teenage hackers , 2022 has certainly thrown cybersecurity professionals some curveballs. While many of the same trends and threats remain, 2023 is likely to keep us on our toes as these threats mature and the landscape continues to shift.

article thumbnail

Thales collaborates with Hewlett Packard Enterprise to Enhance 5G Subscriber Privacy and Security

Thales Cloud Protection & Licensing

Thales collaborates with Hewlett Packard Enterprise to Enhance 5G Subscriber Privacy and Security. divya. Thu, 12/22/2022 - 05:40. Thales collaborates with Hewlett Packard Enterprise (HPE) to provide enhanced privacy and secure authentication for global 5G users, further extending its partner ecosystem. The Thales Luna 7 Hardware Security Module (HSM), a world-class HSM, will power a foundation of trust around HPE’s Subscriber Data Management (SDM) solutions, ensuring subscriber data, transactio

LifeWorks

More Trending

article thumbnail

Recently Discovered RisePro Malware Is a Vidar Stealer Derivative

Heimadal Security

RisePro, a new information-stealing malware, was recently observed on a dark web forum run by Russian cybercriminals. Since December 13, the virus has been offered for sale as a log credential stealer on underground forums, leading many to believe it is a clone of the Vidar Stealer. RisePro’s appearance on the Russian market is evidence […].

Malware 118
article thumbnail

Dispelling the Myths and False Beliefs of API Security

CyberSecurity Insiders

By Yaron Azerual, Senior Security Solution Lead, Radware. The shift to hybrid working and digital transformation has accelerated the use of APIs. According to Radware’s 2022 State of API Security Survey , conducted with Enterprise Management Associates, 97% of organizations use APIs for communications between workloads and systems; 92% have significantly or somewhat increased API usage within the last year; and 59% already run most of their applications in the cloud – all of which underscores th

DDOS 133
article thumbnail

Raspberry Robin Worm Uses Fake Malware to Evade Detection

Heimadal Security

Threat actors started using fake malware to confuse researchers and avoid being analyzed by detection systems. The new technique involves dropping a fake payload when the malware senses it`s being run into a sandbox and analyzed. If the analysis doesn`t seem to take place, real Raspberry Robin malware is launched. What Is Raspberry Robin Ransomware […].

Malware 117
article thumbnail

Why Out-of-Scope Assets are Prime Targets for Attackers

CyberSecurity Insiders

By Marcos Lira, Lead Sales Engineer at Halo Security. Nearly 10 years ago, Mark Zuckerberg pivoted away from a phrase he coined : “Move fast and break things.” Silicon Valley is largely still living by that mantra. Competitive pressures have pushed organizations to build and deliver products and services faster and closer to their customers. But too often the risks associated with this rapid pace have left organizations exposed to too many connections gone forgotten, unmanaged, or misconfigured.

Internet 131
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Agenda Ransomware Steals Sensitive Data from Critical Infrastructure

Heimadal Security

This year, many ransomware-as-a-service groups, including Agenda and Qilin, have developed versions of their ransomware in Rust. Like its Golang counterpart, the Rust variant of Agenda has targeted essential industries. In the past month, Trend Micro has observed that the Agenda ransomware has posted information about many businesses on its leaked website.

article thumbnail

Get ready for a data storage crisis by 2025

CyberSecurity Insiders

Scientists at Aston University are predicting a data deluge by the year 2025 that will pave the way to storage crisis later. The researchers are worried that there would be an increase of 300% in the generation of data that would cause a global data storage crisis, provided it is dealt scientifically now. Aston University data scientists argue that cloud platforms will become full in the next 2-3 years, leaving the humans find for ways to support the storage tech in coming years.

Media 119
article thumbnail

Today’s Most Common Threats Against Cybersecurity

SecureBlitz

There’s no denying that cybersecurity is an issue for anyone who uses a device. It doesn’t matter if it’s a person, a business, or an institution. Since most people use some form of technology and are always connected online, this is an ideal target for cyberattacks. Many different types of security risks have come and […]. The post Today’s Most Common Threats Against Cybersecurity appeared first on SecureBlitz Cybersecurity.

article thumbnail

New Microsoft Exchange Exploit Used by Ransomware Gang to Breach Servers

Heimadal Security

A group of threat actors known as Play ransomware is using a new exploit in Microsoft Exchange to breach servers. The exploit chain bypasses ProxyNotShell URL rewrite mitigations to gain remote code execution (RCE) on vulnerable servers. The ransomware operators used Remote PowerShell to misuse CVE-2022-41082, the same flaw that ProxyNotShell used to execute arbitrary […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

‘Tis the season for gaming: Keeping children safe (and parents sane)

We Live Security

It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action? The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity.

106
106
article thumbnail

Six-Step Guide To Establish A Strong Digital Presence For Your Brand

SecureBlitz

Here, I will show you six-step guide to establish a strong digital presence for your brand. In today’s digital age, businesses of all sizes must have a strong online presence. A strong digital presence can help you reach a wider audience, establish credibility and trust, and drive sales and revenue. However, with so many options […]. The post Six-Step Guide To Establish A Strong Digital Presence For Your Brand appeared first on SecureBlitz Cybersecurity.

article thumbnail

Who’s Keeping Computers Safe When Everybody’s Working From Home?

Security Boulevard

The writing on the wall has dried. For many people, working five days a week in an office is a thing of the past, a cadence shift propelled by the pandemic and widely embraced by global workers demanding greater flexibility. This is great news for workers who want more control over how, where and when. The post Who’s Keeping Computers Safe When Everybody’s Working From Home?

article thumbnail

Ring Digital Cameras Used in a Widespread Police Prank

Heimadal Security

The US Department of Justice (DoJ) announced that two men were charged with hacking into Ring digital cameras used for home protection and launching fake alarm calls. These phone calls caused a dozen of armed police responses which the indicted men live-streamed on social media, mocking the police officers. Details About the Scammers The case […].

Media 105
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Rise of the Rookie Hacker - A New Trend to Reckon With

The Hacker News

More zero knowledge attacks, more leaked credentials, more Gen-Z cyber crimes - 2022 trends and 2023 predictions. Cybercrime remains a major threat to individuals, businesses, and governments around the world. Cybercriminals continue to take advantage of the prevalence of digital devices and the internet to perpetrate their crimes.

article thumbnail

How To Keep Track Of Your Income In Smart Ways

SecureBlitz

Tracking one’s income sounds simple, but it’s tricky when you think about how frequently money is used. Applying a system to manage your income can feel like a lot to get used to. Still, once you get acquainted with a reliable method, you’ll find a tracking approach to be a significant tool for your financial […]. The post How To Keep Track Of Your Income In Smart Ways appeared first on SecureBlitz Cybersecurity.

article thumbnail

Okta revealed that its private GitHub repositories were hacked this month

Security Affairs

American identity and access management giant Okta revealed that that its private GitHub repositories were hacked this month. Okta revealed that its private GitHub repositories were hacked this month, the news was first reported by BleepingComputer which had access to ‘confidential’ email notification sent by Okta. According to the notification threat actors have stolen the Okta’s source code. “As soon as Okta learned of the possible suspicious access, we promptly placed

Hacking 102
article thumbnail

2023 Cybersecurity Spending Increases to Combat Evolving Threats

Security Boulevard

A survey of more than 6,550 security professionals finds that while organizations continue to invest heavily in cybersecurity there’s still not a lot of confidence when it comes to actually being able to thwart attacks. Conducted by Ravn Research on behalf of Ivanti, an IT service management platform provider, the survey found 71% of respondents. The post 2023 Cybersecurity Spending Increases to Combat Evolving Threats appeared first on Security Boulevard.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Shoemaker Ecco leaks over 60GB of sensitive data for 500+ days

Security Affairs

CyberNews researchers reported that Ecco, a global shoe manufacturer and retailer, exposed millions of documents. Original post @ [link]. Ecco, a global shoe manufacturer and retailer, exposed millions of documents. Not only could anyone have modified the data, but the server misconfiguration’s severity likely left the company open to an attack that could have affected customers all over the world.

Retail 102
article thumbnail

Russian Hackers Targeted Petroleum Refinery in NATO Country

Heimadal Security

During the ongoing Russo-Ukrainian conflict, the Russian-linked Gamaredon group attempted to break into a large petroleum refining company within NATO member state, on August 30, 2022. The unsuccessful attack, which was attributed to Russia’s Federal Security Service (FSB), was just one of multiple intrusions orchestrated by advanced persistent threats (APTs).

article thumbnail

German industrial giant ThyssenKrupp targeted in a new cyberattack

Security Affairs

German multinational industrial engineering and steel production company ThyssenKrupp AG was the target of a cyberattack. German multinational industrial engineering and steel production giant ThyssenKrupp AG announced that the Materials Services division and corporate headquarters were hit by a cyberattack. At this time the company has yet to disclose the type of attack that hit its systems and no cybercriminal group has yet to claim responsibility for the attack.

article thumbnail

SEO Poisoning Attack Linked to 144,000 Phishing Packages

Security Boulevard

Threat actors have uploaded 144k malicious packages to NuGet, PyPI, and NPM, containing links to phishing and scam sites as part of a BlackHat SEO campaign to manipulate search engine results and promote scam pages through backlinks from trusted websites. The post SEO Poisoning Attack Linked to 144,000 Phishing Packages appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hackers Breach Okta's GitHub Repositories, Steal Source Code

The Hacker News

Okta, a company that provides identity and access management services, disclosed on Wednesday that some of its source code repositories were accessed in an unauthorized manner earlier this month. "There is no impact to any customers, including any HIPAA, FedRAMP or DoD customers," the company said in a public statement. "No action is required by customers.

98
article thumbnail

Godfather Android banking malware is on the rise

Malwarebytes

Researchers at Cyble Research & Intelligence Labs (CRIL) have found a new version of the Android banking Trojan called Godfather. The new version of Godfather uses an icon and name similar to a legitimate application named MYT Music, which is hosted on the Google Play Store with over 10 million downloads. History. Group-IB researchers established that Godfather is a successor of Anubis.

Banking 98
article thumbnail

Cymulate Identifies Cyberattack Technique That Evades EDR Platforms

Security Boulevard

Cymulate, a cybersecurity posture assessment platform provider, shared a technique, dubbed Blindside, that enables malware to evade some endpoint detection and response (EDR) platforms and other monitoring/control systems. Mike DeNapoli, director of technical messaging at Cymulate, said company researchers discovered that by using breakpoints to inject commands to perform unexpected, unwanted or malicious operations, it.

Malware 98
article thumbnail

Sharing Netflix, Disney+, other passwords is illegal, according to new guidance

Malwarebytes

The Intellectual Property Office (IPO) , the UK government body overseeing intellectual property rights in the UK, has quietly released new guidance on piracy and online counterfeit goods. This campaign is a joint effort between IPO and Meta, Facebook’s parent company. The general issue on piracy is about the use of illegal streaming boxes and apps and how these not only expose children to age-inappropriate content due to lack of parental control but also risk putting sensitive personal in

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!