Wed.Jun 15, 2022

article thumbnail

M1 Chip Vulnerability

Schneier on Security

This is a new vulnerability against Apple’s M1 chip. Researchers say that it is unpatchable. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory, however, have created a novel hardware attack, which combines memory corruption and speculative execution attacks to sidestep the security feature. The attack shows that pointer authentication can be defeated without leaving a trace, and as it utilizes a hardware mechanism, no software patch can fix it.

article thumbnail

Microsoft Patch Tuesday, June 2022 Edition

Krebs on Security

Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including a zero-day flaw in all supported Microsoft Office versions on all flavors of Windows that’s seen active exploitation for at least two months now. On a lighter note, Microsoft is officially retiring its Internet Explorer (IE) web browser, which turns 27 years old this year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guilty as charged (or not) for spreading FUD about women in cyber

Jane Frankland

Judge: Jane Frankland, you have been picked up by the male police (one acting alone)) and stand here accused of potentially spreading FUD. On the 8 June you posted on LinkedIn highlighting data gaps and inconsistencies with regards to reporting for women in cyber, specifically methodologies. How do you plead? Jane: Not guilty, your honour. Judge: Please explain yourself.

Education 130
article thumbnail

New botnet and cryptominer Panchan attacking Linux servers

Tech Republic Security

Panchan is going after telecom and education providers using novel and unique methods to thwart defenses and escalate privileges. The post New botnet and cryptominer Panchan attacking Linux servers appeared first on TechRepublic.

Education 148
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Most of the cyber attacks in Canada are ransomware genre

CyberSecurity Insiders

According to a study conducted by Blake, Cassels Graydon LLP, most of the cyber attacks that were targeted on Canadian companies were of ransomware genre and alarmingly there was an increase in frequency and complexity of attacks. Coming to ransomware payments, there was a 25% increase in such attacks exceeding USD $1 million on average. From now on, Canadian businesses will be required to report any kind of digital assaults within 72 hours under a new law introduced early this week.

article thumbnail

Over 2 Million People Have Downloaded Android Malware from the Google Play Store

Heimadal Security

Last month, security specialists found adware and info-stealing malware on the Google Play Store, with at least five threats still obtainable and with more than 2 million downloads. Adware infections showing unsolicited ads degrade the user experience, use up the battery, generate heat, and can even lead to fraudulent transactions. This software typically attempts to […].

Adware 135

More Trending

article thumbnail

Kubernetes users struggle with security, Red Hat survey says

InfoWorld on Security

Security is a significant concern for Kubernetes and container-based development, according to Red Hat’s State of Kubernetes Security report for 2022. In fact, 93% of survey respondents experienced at least one security incident in their Kubernetes and container environments in the past 12 months, sometimes leading to the loss of customers or revenue.

115
115
article thumbnail

How to Help Protect Your Identity Offline

Identity IQ

How to Help Protect Your Identity Offline. IdentityIQ. The media often covers data breaches and cyberattacks that expose the personal data of large groups of people, leaving them vulnerable to identity theft and other forms of fraud. One of the best ways to help protect yourself from digital threats like these is to safeguard your data online. But your personal data isn’t just vulnerable on the internet; it can be offline too.

article thumbnail

Identity and Access: The Game is the Same, But Fiercer

Security Boulevard

Earlier this year, cybercriminals infiltrated authentication provider Okta’s systems. Okta is used by thousands of organizations around the world to manage access to their networks and applications. The threat actor gang, known as Lapsus$, gained access to the laptop of one of Okta’s third-party support engineers for five days, potentially affecting a small number of.

article thumbnail

In Cybersecurity, What You Can’t See Can Hurt You

Threatpost

The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing?

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

What is WAAP? – A Quick Walk Through

CyberSecurity Insiders

[ This article was originally published here by Indusface.com ]. Many of the businesses that already have revenue-generating web applications are starting an API-first program. Now, old monolith apps are being broken into microservices developed in elastic and flexible service-mesh architecture. The common question most organizations grapple with is – how to enhance application security designed for web apps to APIs and API security?

Firewall 106
article thumbnail

Nebulon bakes bare-metal Linux ransomware protection into the bootloader

CSO Magazine

Smart infrastructure vendor Nebulon today announced that its latest offerings provide newly hardened backups for configuration and snapshots, in an effort to add a new tool to the antiransomware arsenal for Linux systems. The idea, according to Nebulon, is to protect against the problem of misconfigured servers and dated server configurations in Linux systems.

article thumbnail

Interpol seizes $50 million, arrests 2000 social engineers

Bleeping Computer

An international law enforcement operation, codenamed 'First Light 2022,' has seized 50 million dollars and arrested thousands of people involved in social engineering scams worldwide. [.].

article thumbnail

7 Ways to Bring AI to Cybersecurity

Dark Reading

Academic researchers are developing projects to apply AI to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from C3.ai Digital Transformation Institute.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Hackers exploit three-year-old Telerik flaws to deploy Cobalt Strike

Bleeping Computer

The threat actor known as 'Blue Mockingbird' has been observed by analysts targeting Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by hijacking system resources. [.].

99
article thumbnail

Wormable Panchan Peer-to-Peer Botnet Harvests Linux Server Keys

Dark Reading

The Japanese-language Panchan botnet has been discovered stealing SSH keys from Linux servers across Asia, Europe, and North America, with a focus on telecom and education providers.

article thumbnail

Citrix warns critical bug can let attackers reset admin passwords

Bleeping Computer

Citrix warned customers to deploy security updates that address a critical Citrix Application Delivery Management (ADM) vulnerability that can let attackers reset admin passwords. [.].

article thumbnail

How Information Security Teams Can Help Reduce Stress and Burnout

Dark Reading

Work across the organization and take practical steps to ease user stress — prioritize user productivity by offering the right tools to avoid shadow IT and cultivate a transparent security culture. Remember the security team, too, and automate as many processes as possible.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Update now!  Microsoft patches Follina, and many other security updates

Malwarebytes

The June 2022 Patch Tuesday may go down in history as the day that Follina got patched, but there was a host of other important updates. And not just from Microsoft. Many other software vendors follow the pattern of monthly updates set by the people in Redmond. Microsoft. Microsoft released updates to deal with 60 security vulnerabilities. Undoubtedly the most prominent one is the one that goes by the name of Follina.

article thumbnail

Why Ransomware Extortion is a Threat

Security Boulevard

The majority of ransomware attacks now include some form of extortion attempt. What is ransomware extortion and how can you defend against it? The post Why Ransomware Extortion is a Threat appeared first on Security Boulevard.

article thumbnail

Firefox stops advertisers tracking you as you browse, calls itself the most “private and secure major browser”

Malwarebytes

Cookies are in the news as Mozilla rolls out significant privacy changes for Firefox. The idea is to dramatically lessen the risk of privacy-invading tracking across websites without your knowledge. Tracking cookies have been a hot topic in recent months, as advertisers try switching to other methods of tracking. Will this make a noticeable difference to people’s everyday browsing experience?

article thumbnail

Cisco Secure Email bug can let attackers bypass authentication

Bleeping Computer

Cisco notified customers this week to patch a critical vulnerability that could allow attackers to bypass authentication and login into the web management interface of Cisco email gateway appliances with non-default configurations. [.].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

CI Observability Makes Change Management Work

Security Boulevard

In every system, there is at least one limiting factor, as outlined in the methodology known as “ the Theory of Constraints.” Software development pipelines are no exception. When we look holistically at the various domains of development, it is clear that every step is interlinked, which means the constraints of each department are also shared. The post CI Observability Makes Change Management Work appeared first on Security Boulevard.

article thumbnail

Quality Assurance: Definition And Explanation

SecureBlitz

Quality assurance in its broadest form can be defined as the set of actions that companies take to be able. Read more. The post Quality Assurance: Definition And Explanation appeared first on SecureBlitz Cybersecurity.

article thumbnail

Phishing in the Metaverse: The New Reality of Brand Protection

Security Boulevard

The Metaverse is an emerging reality, albeit a virtual one. With it comes new versions of social media phishing attacks and scams. How can you protect your brand in this new world? We can help. The post Phishing in the Metaverse: The New Reality of Brand Protection appeared first on Security Boulevard.

article thumbnail

Zimbra bug allows stealing email logins with no user interaction

Bleeping Computer

Zimbra and SonarSource proceeded to the coordinated disclosure of a high-severity vulnerability that allows unauthenticated attackers to steal cleartext credentials from Zimbra without any user interaction. [.].

98
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Yes, Understanding Gender is a Professional Issue

Security Boulevard

Gender is a complex and frequently misunderstood topic. To some, this may not seem like something that you need to think about at work. For others, this deeply impacts their lives, including their experiences in the workplace and how they interact with their colleagues. I am going to break down why everyone should grasp the nuanced and complicated concept that is gender, and how it impacts your interactions with your peers, especially your transgender colleagues.

98
article thumbnail

Ransomware Group Launches Search Site for Stolen Data

Heimadal Security

ALPHV BlackCat is a RaaS, therefore the ALPHV BlackCat operators recruit affiliates to perform corporate breaches and encrypt devices. ALPHV ransomware executable is written in Rust, a programming language that, while not often used by malware creators, is gaining popularity because of its high efficiency and memory safety. Ransomware-as-a-Service is an illicit ‘parent-affiliate(s)’ business infrastructure, in which […].

article thumbnail

The benefits of using a Cloud Directory over Active Directory

Security Boulevard

A cloud-based directory service is a great way to manage user identities in your organization. With a cloud directory, you can easily connect users with the resources they need and keep your IT environment secure. This article will discuss some of the benefits of using a cloud directory over an Active Directory, and we’ll show [.]. Read More. The post The benefits of using a Cloud Directory over Active Directory appeared first on LogonBox.

98
article thumbnail

Panchan: A New Golang-based Peer-To-Peer Botnet Targeting Linux Servers

The Hacker News

A new Golang-based peer-to-peer (P2P) botnet has been spotted actively targeting Linux servers in the education sector since its emergence in March 2022. Dubbed Panchan by Akamai Security Research, the malware "utilizes its built-in concurrency features to maximize spreadability and execute malware modules" and "harvests SSH keys to perform lateral movement.".

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.