Wed.Oct 27, 2021

article thumbnail

How the FBI Gets Location Information

Schneier on Security

Vice has a detailed article about how the FBI gets data from cell phone providers like AT&T, T-Mobile, and Verizon, based on a leaked (I think) 2019 139-page presentation.

Mobile 289
article thumbnail

“Ransomware Killed My Baby”: Lawsuit Raises Issue Of CyberSecurity-Breach Disclosure Liability

Joseph Steinberg

A hospital suffering through a ransomware attack failed to provide proper care for an expectant mother and her newborn child, leading to the child’s death, according to a lawsuit filed in the US State of Alabama. Springhill Medical Center, a hospital in based in Mobile, Alabama, was hit with ransomware during the summer of 2019; the cyberattack crippled the medical facility’s information systems, causing multiple computer systems and networks to be unusable for over a week – the same period of t

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft warns of new supply chain attacks by Russian-backed Nobelium group

Tech Republic Security

The cybercrime group behind the SolarWinds hack remains focused on the global IT supply chain, says Microsoft, with 140 resellers and service providers targeted since May.

article thumbnail

Wslink: Unique and undocumented malicious loader that runs as a server

We Live Security

There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor. The post Wslink: Unique and undocumented malicious loader that runs as a server appeared first on WeLiveSecurity.

Malware 144
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Develop the skills required for an in-demand cybersecurity career

Tech Republic Security

It's not necessary to spend a great deal of time or money to learn the skills required to work in some of the most exciting and highly paid positions in the tech industry.

article thumbnail

Cybersecurity First: #BeCyberSmart at Work and Home

Security Through Education

As security professionals, we are conditioned by consistent exposure to adversarial simulation training. This immersive form of education allows us to develop and maintain a secure environment outside of the workplace, as well as in it. This begs the question, could a bank teller do the same if given some basic exposure to this training? What about a C-level executive?

More Trending

article thumbnail

Code similarity analysis with r2diaphora

CyberSecurity Insiders

Executive summary. Binary diffing , a technique for comparing binaries, can be a powerful tool to facilitate malware analysis and perform malware family attribution. This blog post describes how AT&T Alien Labs is leveraging binary diffing and code analysis to reduce reverse-engineering time and generate threat intelligence. Using binary diffing for analysis is particularly effective in the IoT malware world, as most malware threats are variants of open-source malware families produced by a

article thumbnail

Babuk ransomware decryptor released to recover files for free

Bleeping Computer

Czech cybersecurity software firm Avast has created and released a decryption tool to help Babuk ransomware victims recover their files for free. [.].

article thumbnail

New certification in Network Defense, Ethical Hacking and Digital Forensics

CyberSecurity Insiders

EC Council, that can smartly abbreviated as the International Council of Electronic Commerce Consultants, has started a new certification program that offers MOOC certification series. Mooc stands for massive open online course, a training program that offers essential certifications in cybersecurity that includes courses related to network defense, ethical hacking and digital forensics.

Hacking 126
article thumbnail

5 steps to security incident response planning

CSO Magazine

Breach disclosure has recently been in the news, and not necessarily in a good way. Missouri Governor Mike Parson’s press conference on a newspaper’s reporting of a security vulnerability on the Department of Elementary and Secondary Education’s website created a social media backlash. He blamed the reporter who discovered publicly accessible sensitive data for the exposure rather than a faulty website implementation.

Media 123
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Ransomware news trending on Google

CyberSecurity Insiders

First is the news related to a ransomware attack on a Candy maker that trade experts say could lead to chocolate scarcity when it is most needed by/for kids. And with only few days left for events such as Trick and Treat and Halloween night, Candy maker Brachs is making all arrangements that the malware attack doesn’t affect its production as the peak of the Christmas 2021 season on its way.

article thumbnail

Regulatory Compliance Mandates Encourage Better Cybersecurity

Security Boulevard

Cybersecurity risks are directly tied to legal and regulatory risk, according to a recent (ISC)2 Security Congress session. John Bandler, founder of Bandler Law Firm PLLC and Bandler Group, said the legal requirements relating to information governance include cybersecurity, privacy, incident response and breach reporting. Bandler believes the laws and regulations surrounding regulatory compliance have.

article thumbnail

Extracting type information from Go binaries

SecureList

During the 2021 edition of the SAS conference, I had the pleasure of delivering a workshop focused on reverse-engineering Go binaries. The goal of the workshop was to share basic knowledge that would allow analysts to immediately start looking into malware written in Go. A YouTube version of the workshop was released around the same time. Of course, the drawback of providing entry-level or immediately actionable information is that a few subtleties must be omitted.

article thumbnail

NIST's new devsecops guidance to aid transition to cloud-native apps

CSO Magazine

The United States federal government, much like in industry, is moving toward cloud adoption, Devsecops and microservices-based architectures for cloud-native applications. The National Institute of Standards of Technology (NIST) is tasked with promoting innovation and providing standards and guidance to industry to facilitate best practices.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Dark HunTOR: 150 arrested, $31 million seized in major dark web bust

We Live Security

The police sting spanned three continents and involved crackdowns in nine countries. The post Dark HunTOR: 150 arrested, $31 million seized in major dark web bust appeared first on WeLiveSecurity.

article thumbnail

Malicious NPM libraries install ransomware, password stealer

Bleeping Computer

Malicious NPM packages pretending to be Roblox libraries are delivering ransomware and password-stealing trojans on unsuspecting users. [.].

Passwords 132
article thumbnail

How To Update Your Security Infrastructure and Recover from a Cyberattack

Cisco Security

Manufacturing company Megablok was experiencing frequent network outages that were halting business productivity and forcing employees to work from home. Like most, it blamed its current network and decided to recheck all network cables and expand its broadband to help resolve the issue. Frustratingly, the outages continued to happen. The company learned shortly after that the issues were a result of a cyberattack.

article thumbnail

Twitter employees required to use security keys after 2020 hack

Bleeping Computer

Twitter rolled out security keys to its entire workforce and made two-factor authentication (2FA) mandatory for accessing internal systems following last year's hack. [.].

Hacking 115
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Grief ransomware gang hit US National Rifle Association (NRA)

Security Affairs

Grief ransomware operators claim to have compromised computer systems at US National Rifle Association (NRA) and added it to their leak site. Grief ransomware operators announced to have hacked US National Rifle Association (NRA) and threaten to leak the stolen data. The NRA was added to the list of compromised organizations on the leak site of the group, that gang also published a set of documents as proof of the hack.

article thumbnail

US bans China Telecom Americas over national security risks

Bleeping Computer

The Federal Communications Commission (FCC) has revoked China Telecom Americas' license to provide telecommunication services within the United States. [.].

article thumbnail

Defenders Worry Orgs Are More Vulnerable Than Last Year

Dark Reading

Most IT and security leaders are confident their cybersecurity strategy is on the right track, but they still believe their organizations are as vulnerable as they were a year ago.

article thumbnail

Russian cyberspies target cloud services providers and resellers to abuse delegated access

CSO Magazine

The group of hackers responsible for the SolarWinds software supply chain attack have continued to seek out ways of indirectly gaining access to enterprise networks by targeting IT and cloud services providers that have admin rights on their customers' systems through virtue of their business relationship. In a new report this week, Microsoft warns that since May, the group known as Nobelium has targeted over 140 cloud service resellers and technology providers and has succeeded to compromise as

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Hackers Using Squirrelwaffle Loader to Deploy Qakbot and Cobalt Strike

The Hacker News

A new spam email campaign has emerged as a conduit for a previously undocumented malware loader that enables the attackers to gain an initial foothold into enterprise networks and drop malicious payloads on compromised systems.

Malware 107
article thumbnail

Apple Patches Critical iOS Bugs; One Under Attack

Threatpost

Researchers found that one critical flaw in question is exploitable from the browser, allowing watering-hole attacks.

132
132
article thumbnail

Cyber Attack in Iran Reportedly Cripples Gas Stations Across the Country

The Hacker News

A cyber attack in Iran left petrol stations across the country crippled, disrupting fuel sales and defacing electronic billboards to display messages challenging the regime's ability to distribute gasoline. Posts and videos circulated on social media showed messages that said, "Khamenei! Where is our gas?" — a reference to the country's supreme leader Ayatollah Ali Khamenei.

article thumbnail

Lazarus Group North Korea strikes South Korean software firm

CyberSecurity Insiders

Lazarus hacking group aka APT group from North Korea has hit the news headlines for launching a supply chain attack on a software company operating in lines with US Technology firms SolarWinds and Kaseya firms. Cybersecurity Insiders have learnt that the said group of threat actors have launched a MATA malware attack on the servers of the software company to steal information from the database and encrypt it with ransomware until their demands are met.

Software 105
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Watch out for the Steam skin “free knife” scam

Malwarebytes

Have you ever had someone run up to you in the street and insist you take their free knife? I hope not, because that’s a good way to wind up in a 60-minute police procedural drama. In video game land, however, anything goes. A certain type of scam is showing signs of activity at the moment and it’s likely to claim some victims before the week is out.

Scams 105
article thumbnail

WordPress Plugin Bug Lets Subscribers Wipe Sites

Threatpost

The flaw, found in the Hashthemes Demo Importer plugin, allows any authenticated user to exsanguinate a vulnerable WordPress site, deleting nearly all database content and uploaded media.

Media 104
article thumbnail

Apple ships Monterey with security updates, fixes 0-day in Watch and TV products, updates iDevices

Naked Security

A slew of security bulletins from Apple HQ, including 37 bugs listed as fixed in the initial public release of macOS Monterey.

124
124
article thumbnail

Identity-Focused Security Controls Prevail

Dark Reading

How identity and access management strategies held up during the pandemic and tips for putting together an identity security road map.

119
119
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.