Wed.Sep 06, 2023

article thumbnail

Cryptocurrency Startup Loses Encryption Key for Electronic Wallet

Schneier on Security

The cryptocurrency fintech startup Prime Trust lost the encryption key to its hardware wallet—and the recovery key—and therefore $38.9 million. It is now in bankruptcy. I can’t understand why anyone thinks these technologies are a good idea.

article thumbnail

Weekly Update 363

Troy Hunt

I'm super late pushing out this week's video, I mean to the point where I now have a couple of days before doing the next one. Travel from the opposite side of the world is the obvious excuse, then frankly, just wanting to hang out with friends and relax. And now, I somehow find myself publishing this from the most mind-bending set of circumstances: Heading to 31C.

Phishing 307
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vendor Comparison: DIY Home Security Systems

Tech Republic Security

When it comes to DIY home security, there are many systems and components to consider and many decisions to make. This vendor comparison guide from TechRepublic Premium provides advice you can follow as you make decisions regarding how you will deploy a home security system. The accompanying comparison tool will document your research and provide.

180
180
article thumbnail

ASUS routers are affected by three critical remote code execution flaws

Security Affairs

Three critical remote code execution vulnerabilities in ASUS routers potentially allow attackers to hijack the network devices. ASUS routers RT-AX55, RT-AX56U_V2, and RT-AC86U are affected by three critical remote code execution vulnerabilities that can potentially allow threat actors to take over the devices. The three vulnerabilities were reported by the Taiwanese CERT, below are their descriptions: CVE-2023-39238 (CVSS 9.8): ASUS RT-AX55, RT-AX56U_V2 and RT-AC86U iperf-related modules set_ipe

Firmware 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How China Demands Tech Firms Reveal Hackable Flaws in Their Products

WIRED Threat Level

Some foreign companies may be complying—potentially offering China’s spies hints for hacking their customers.

Hacking 143
article thumbnail

MITRE and CISA release Caldera for OT attack emulation

Security Affairs

MITRE and CISA released a Caldera extension for OT that allows the emulation of attacks on operational technology systems. MITRE Caldera is an open-source adversary emulation platform that helps cybersecurity practitioners to automate security assessments. The tool is built on the MITRE ATT&CK framework, which is a widely-recognized framework for understanding and responding to cyber threats. “Without further ado, the MITRE Caldera team is proud to announce the release of Caldera for O

LifeWorks

More Trending

article thumbnail

The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key

WIRED Threat Level

After leaving many questions unanswered, Microsoft explains in a new postmortem the series of slipups that allowed attackers to steal and abuse a valuable cryptographic key.

Hacking 141
article thumbnail

A zero-day in Atlas VPN Linux Client leaks users’ IP address

Security Affairs

Experts warn of an Atlas VPN zero-day flaw impacting the Linux client that can reveal the user’s IP address by visiting a website. A Reddit user with the handle ‘Educational-Map-8145’ published a proof of concept exploit for a zero-day flaw in the Linux client of Atlas VPN. The exploit code works against the latest version of the client, 1.0.3.

VPN 138
article thumbnail

Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant

The Hacker News

The Iranian threat actor tracked as APT34 has been linked to a new phishing attack that leads to the deployment of a variant of a backdoor called SideTwist. “APT34 has a high level of attack technology, can design different intrusion methods for different types of targets, and has supply chain attack capability,” NSFOCUS Security Labs said in a report published last week.

Phishing 135
article thumbnail

Chinese cyberspies obtained Microsoft signing key from Windows crash dump due to a mistake

Security Affairs

Microsoft revealed that the Chinese group Storm-0558 stole a signing key used to breach government email accounts from a Windows crash dump. In July, Microsoft announced it had mitigated an attack conducted by a China-linked threat actor, tracked as Storm-0558, which targeted customer emails. Storm-0558 threat actors focus on government agencies in Western Europe and were observed conducting cyberespionage, data theft, and credential access attacks.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Flipper Zero can be used to launch iOS Bluetooth spam attacks

Bleeping Computer

The Flipper Zero portable wireless pen-testing and hacking tool can be used to aggressively spam Bluetooth connection messages at Apple iOS devices, such as iPhones and iPads. [.

Wireless 131
article thumbnail

Google addressed an actively exploited zero-day in Android

Security Affairs

Google released September 2023 Android security updates to address multiple flaws, including an actively exploited zero-day. Google released September 2023 Android security updates that address tens of vulnerabilities, including a zero-day flaw tracked as CVE-2023-35674 that was actively exploited in the wild. This high-severity vulnerability CVE-2023-35674 resides in the Framework component, a threat actor could exploit the issue to escalate privileges without requiring user interaction or addi

Hacking 135
article thumbnail

A history of ransomware: How did it get this far?

Malwarebytes

Today's ransomware is the scourge of many organizations. But where did it start? If we define ransomware as malware that encrypts files to extort the owner of the system, then the first malware that could be classified as ransomware is the 1989 AIDS Trojan. However, while it encrypted file(name)s and asked for a ransom, it was far from effective. The AIDS Trojan was sent by snail mail on a floppy disk to participants of a WHO conference about HIV.

article thumbnail

Improve Security by 99% in Seconds without Changing a Single Password

SecureWorld News

We're all looking for quick fixes these days so that we can implement them and get on with our lives, and security is no different. So here are three quick moves you can make right now to dramatically improve your security. And guess what? Not one of them involves passwords. Multi-factor authentication If changing passwords is like the eating your veggies of the security world, multi-factor authentication (MFA) is more like eating fresh fruits.

Passwords 126
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Staying ahead of threats: 5 cybercrime trends to watch

We Live Security

New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought

article thumbnail

Hackers stole Microsoft signing key from Windows crash dump

Bleeping Computer

Microsoft says Storm-0558 Chinese hackers stole a signing key used to breach government email accounts from a Windows crash dump after compromising a Microsoft engineer's corporate account. [.

article thumbnail

Generative AI’s Biggest Security Flaw Is Not Easy to Fix

WIRED Threat Level

Chatbots like Open AI’s ChatGPT and Google’s Bard are vulnerable to indirect prompt injection attacks. Security researchers say the holes can be plugged—sort of.

Hacking 122
article thumbnail

Rockstar Games reportedly sold games with Razor 1911 cracks on Steam

Bleeping Computer

In an ironic twist, Rockstar Games reportedly uses pirated software cracks to remove its DRM from some games they sell on Steam. [.

Software 123
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

eSeals Explained: Providing Document Trust and Security

GlobalSign

This helpful guide breaks down what an electronic seal is, and how to choose one that is right for your organization.

119
119
article thumbnail

W3LL Gang Compromises Thousands of Microsoft 365 Accounts

Dark Reading

A secretive phishing cabal boasts a sophisticated affiliate network and a modular, custom toolset that's claiming victims on three continents.

article thumbnail

Toyota says filled disk storage halted Japan-based factories

Bleeping Computer

Toyota says a recent disruption of operations in Japan-based production plants was caused by its database servers running out of storage space. [.

118
118
article thumbnail

Securing Your Legacy: Identities, Data, and Processes

Dark Reading

Legacy systems of all kinds pose significant cybersecurity risks. Here's how to mitigate them.

Risk 117
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

“Threat-informed Defense Is Hard …” Cross-post for Safekeeping

Anton on Security

“Threat-informed Defense Is Hard …” Cross-post for Safekeeping Medium frowns at re-/cross-posting, so this should work: Threat-informed Defense Is Hard, So We Are Still Not Doing It! Enjoy! “Threat-informed Defense Is Hard …” Cross-post for Safekeeping was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.

article thumbnail

AtlasVPN Linux Zero-Day Disconnects Users, Reveals IP Addresses

Dark Reading

All it takes is a simple copy-paste to undo a VPN service used by millions worldwide.

VPN 112
article thumbnail

Threat Intelligence Analytics: Making the Most of Your CTI Program

Security Boulevard

The threat landscape has never been more challenging for CISOs and security teams than in 2023. Our research has found ransomware attacks have increased by more than 100% since 2022, hundreds of thousands of corporate credentials are being distributed on Telegram with SSO, active directory, and corporate SaaS application credentials, and initial access brokers (IAB) […] The post Threat Intelligence Analytics: Making the Most of Your CTI Program appeared first on Flare | Cyber Threat Intel &

CISO 111
article thumbnail

Coding Tips to Sidestep JavaScript Vulnerabilities

Dark Reading

This Tech Tip focuses on best security practices to write secure JavaScript code.

112
112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Callaway Asks Customers to Take a Mulligan on Passwords After Breach

SecureWorld News

More than 1.1 million U.S. customers of Callaway, the American sports equipment maker best known for its golf equipment and accessories, had their personal data compromised in an early-August data breach. In an August 29 letter , parent company Topgolf Callaway Brands Corp. alerted customers to the incident, disabling security questions and forcing them to take a mulligan on their passwords—requiring a reset of passwords for all accounts.

Passwords 110
article thumbnail

Russia's 'Fancy Bear' APT Targets Ukrainian Energy Facility

Dark Reading

The group, best known for 2016 US election interference and other attacks on Ukraine, used phishing emails offering pictures of women to lure its victim into opening a malicious attachment.

Phishing 110
article thumbnail

LockBit Breach Exposes Manufacturing Network Vulnerabilities

SecureWorld News

In a recent cyberattack, the LockBit ransomware group targeted U.K-based Zaun, a manufacturer of high-security perimeter fencing—revealing critical vulnerabilities in manufacturing networks. LockBit, a well-documented threat actor, struck Zaun with a sophisticated attack on August 5-6. Zaun's cybersecurity systems managed to thwart the encryption of its servers, preventing further catastrophic damage.

article thumbnail

Google's Souped-up Chrome Store Review Process Foiled by Data-Stealer

Dark Reading

Researchers have discovered that despite Google's adoption of the Manifest V3 security standard to protect against malicious plug-ins, attackers can still get bad extensions past its review process.

108
108
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!