Wed.Jun 15, 2022

article thumbnail

Microsoft Patch Tuesday, June 2022 Edition

Krebs on Security

Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including a zero-day flaw in all supported Microsoft Office versions on all flavors of Windows that’s seen active exploitation for at least two months now. On a lighter note, Microsoft is officially retiring its Internet Explorer (IE) web browser, which turns 27 years old this year.

article thumbnail

M1 Chip Vulnerability

Schneier on Security

This is a new vulnerability against Apple’s M1 chip. Researchers say that it is unpatchable. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory, however, have created a novel hardware attack, which combines memory corruption and speculative execution attacks to sidestep the security feature. The attack shows that pointer authentication can be defeated without leaving a trace, and as it utilizes a hardware mechanism, no software patch can fix it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New botnet and cryptominer Panchan attacking Linux servers

Tech Republic Security

Panchan is going after telecom and education providers using novel and unique methods to thwart defenses and escalate privileges. The post New botnet and cryptominer Panchan attacking Linux servers appeared first on TechRepublic.

Education 148
article thumbnail

Over 2 Million People Have Downloaded Android Malware from the Google Play Store

Heimadal Security

Last month, security specialists found adware and info-stealing malware on the Google Play Store, with at least five threats still obtainable and with more than 2 million downloads. Adware infections showing unsolicited ads degrade the user experience, use up the battery, generate heat, and can even lead to fraudulent transactions. This software typically attempts to […].

Adware 142
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Most of the cyber attacks in Canada are ransomware genre

CyberSecurity Insiders

According to a study conducted by Blake, Cassels Graydon LLP, most of the cyber attacks that were targeted on Canadian companies were of ransomware genre and alarmingly there was an increase in frequency and complexity of attacks. Coming to ransomware payments, there was a 25% increase in such attacks exceeding USD $1 million on average. From now on, Canadian businesses will be required to report any kind of digital assaults within 72 hours under a new law introduced early this week.

article thumbnail

UK Data Protection Act & GDPR: No More Confusion

TrustArc

A guide to the GDPR General Data Protection Regulation and the UK Data Protection Act from TrustArc, the leader in privacy management software such as PrivacyCentral.

Software 130

LifeWorks

More Trending

article thumbnail

How much does access to corporate infrastructure cost?

SecureList

Division of labor. Money has been and remains the main motivator for cybercriminals. The most widespread techniques of monetizing cyberattacks include selling stolen databases, extortion (using ransomware) and carding. However, there is demand on the dark web not only for data obtained through an attack, but also for the data and services necessary to organize one (e.g., to perform specific steps of a multiphase attack).

VPN 128
article thumbnail

Ransomware Group Launches Search Site for Stolen Data

Heimadal Security

ALPHV BlackCat is a RaaS, therefore the ALPHV BlackCat operators recruit affiliates to perform corporate breaches and encrypt devices. ALPHV ransomware executable is written in Rust, a programming language that, while not often used by malware creators, is gaining popularity because of its high efficiency and memory safety. Ransomware-as-a-Service is an illicit ‘parent-affiliate(s)’ business infrastructure, in which […].

article thumbnail

Security resilience: 4 ways to achieve company-wide buy-in

Cisco Security

There are some very tough questions I’ve come across in my time. How does one walk into Mordor, if not simply? Why isn’t there a special name for the tops of your feet? (Credit to Lily Tomlin for that one.). For a security leader, the toughest questions are often around security buy-in: How do you achieve active support across the organization for building resilience?

CISO 120
article thumbnail

Identity and Access: The Game is the Same – It Just Got Fiercer

CyberSecurity Insiders

By Gunnar Peterson, CISO, Forter. Earlier this year, cybercriminals infiltrated Okta’s systems, an authentication company thousands of organizations around the world use to manage access to their networks and applications. The threat actor gang, known as Lapsus$, gained access to the laptop of one of Okta’s third-party support engineers for five days, potentially affecting a small number of the company’s customers.

CISO 119
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Quality Assurance: Definition And Explanation

SecureBlitz

Quality assurance in its broadest form can be defined as the set of actions that companies take to be able. Read more. The post Quality Assurance: Definition And Explanation appeared first on SecureBlitz Cybersecurity.

article thumbnail

How to Help Protect Your Identity Offline

Identity IQ

How to Help Protect Your Identity Offline. IdentityIQ. The media often covers data breaches and cyberattacks that expose the personal data of large groups of people, leaving them vulnerable to identity theft and other forms of fraud. One of the best ways to help protect yourself from digital threats like these is to safeguard your data online. But your personal data isn’t just vulnerable on the internet; it can be offline too.

article thumbnail

Kubernetes users struggle with security, Red Hat survey says

InfoWorld on Security

Security is a significant concern for Kubernetes and container-based development, according to Red Hat’s State of Kubernetes Security report for 2022. In fact, 93% of survey respondents experienced at least one security incident in their Kubernetes and container environments in the past 12 months, sometimes leading to the loss of customers or revenue.

117
117
article thumbnail

Identity and Access: The Game is the Same, But Fiercer

Security Boulevard

Earlier this year, cybercriminals infiltrated authentication provider Okta’s systems. Okta is used by thousands of organizations around the world to manage access to their networks and applications. The threat actor gang, known as Lapsus$, gained access to the laptop of one of Okta’s third-party support engineers for five days, potentially affecting a small number of.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

5 Virtual Private Network (VPN) Best Practices for 2022

Digital Guardian

Learn about VPNs, why organizations are using them so much more, and what IT leaders can do to help ensure their security.

VPN 111
article thumbnail

In Cybersecurity, What You Can’t See Can Hurt You

Threatpost

The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing?

article thumbnail

What is WAAP? – A Quick Walk Through

CyberSecurity Insiders

[ This article was originally published here by Indusface.com ]. Many of the businesses that already have revenue-generating web applications are starting an API-first program. Now, old monolith apps are being broken into microservices developed in elastic and flexible service-mesh architecture. The common question most organizations grapple with is – how to enhance application security designed for web apps to APIs and API security?

Firewall 106
article thumbnail

Travel-related Cybercrime Takes Off as Industry Rebounds

Threatpost

Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

CSO Magazine

Smart infrastructure vendor Nebulon today announced that its latest offerings provide newly hardened backups for configuration and snapshots, in an effort to add a new tool to the antiransomware arsenal for Linux systems. The idea, according to Nebulon, is to protect against the problem of misconfigured servers and dated server configurations in Linux systems.

article thumbnail

Email compromise leads to healthcare data breach at Kaiser Permanente

Malwarebytes

At least 69,000 people have been impacted by a data breach at Kaiser Permanente, a long-running managed healthcare consortium. The latest in a long-running series of healthcare attacks, the road to stolen data began on April 5 this year with an email compromise. The direct path to data. A “substitute breach notice” posted June 3 revealed details of the attack.

article thumbnail

Interpol seizes $50 million, arrests 2000 social engineers

Bleeping Computer

An international law enforcement operation, codenamed 'First Light 2022,' has seized 50 million dollars and arrested thousands of people involved in social engineering scams worldwide. [.].

article thumbnail

New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs

The Hacker News

A newly discovered security vulnerability in modern Intel and AMD processors could let remote attackers steal encryption keys via a power side channel attack.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Russia Is Taking Over Ukraine’s Internet

WIRED Threat Level

In occupied Ukraine, people’s internet is being routed to Russia—and subjected to its powerful censorship and surveillance machine.

article thumbnail

Hackers exploit three-year-old Telerik flaws to deploy Cobalt Strike

Bleeping Computer

The threat actor known as 'Blue Mockingbird' has been observed by analysts targeting Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by hijacking system resources. [.].

98
article thumbnail

State of OT Security in 2022: Big Survey Key Insights

Trend Micro

Learn about the state of OT Security in 2022 by reading the key insights found through surveying more than 900 ICS business and security leaders in the US, Germany and Japan.

article thumbnail

Critical Citrix Bugs Impact All ADM Servers, Agents

Dark Reading

Citrix ADM vulnerabilities could lead to admin password reset and disruption of ADM license service, company warns.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft: Windows update to permanently disable Internet Explorer

Bleeping Computer

Microsoft confirmed today that a future Windows update will permanently disable the Internet Explorer web browser on users' systems. [.].

article thumbnail

7 Ways to Bring AI to Cybersecurity

Dark Reading

Academic researchers are developing projects to apply AI to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from C3.ai Digital Transformation Institute.

article thumbnail

Panchan Golang P2P botnet targeting Linux servers in cryptomining campaign

Security Affairs

Researchers discovered a new Golang-based peer-to-peer (P2P) botnet, dubbed Panchan, targeting Linux servers in the education sector since March 2022. Akamai security researchers discovered a new Golang-based P2P Botnet, tracked as Panchan, that is targeting Linux servers that has been active since March 2022. Panchan uses basic SSH dictionary attack to implement wormable behavior, it also harvests SSH keys and uses them for lateral movement.

Malware 98
article thumbnail

24+ Billion Credentials Circulating on the Dark Web in 2022 — So Far

Dark Reading

Username and password combinations offered for sale on the Dark Web by criminals has increased 65% since 2020.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!