Thu.May 20, 2021

article thumbnail

Bizarro Banking Trojan

Schneier on Security

Bizarro is a new banking trojan that is stealing financial information and crypto wallets. …the program can be delivered in a couple of ways­ — either via malicious links contained within spam emails, or through a trojanized app. Using these sneaky methods, trojan operators will implant the malware onto a target device, where it will install a sophisticated backdoor that “contains more than 100 commands and allows the attackers to steal online banking account credentials,”

Banking 344
article thumbnail

Using Threat Modeling to Improve Compliance (TM Thursday)

Adam Shostack

Threat model Thursday is not just back, but live again! This week is my Using Threat Modeling to Improve Compliance at RSAC 2021. The video replay is available if you have an RSA pass, and the slides are available to all.

147
147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How your personal data may be exposed by misconfigured mobile apps

Tech Republic Security

App developers are failing to properly set up and secure access to third-party services, putting user data at risk, says Check Point Research.

Mobile 177
article thumbnail

The Top Three Weaknesses in Healthcare Cybersecurity

Security Boulevard

With remote care, connected devices , and more efficient use of data digitizing healthcare delivery, cybersecurity has never been more vital for providers. Despite the benefits to patient care, however, there are some major weak spots that still remain for providers. With healthcare under continuous attack from threat actors , not only will new vulnerabilities emerge, but existing cybersecurity weaknesses are also set to become more critical as providers leverage digital technology more frequent

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The 3 elements of a sound threat intelligence program

Tech Republic Security

Because every organization has different security needs and requirements, there is no one-size-fits-all approach.

171
171
article thumbnail

Synthetic Data Removes Data Privacy Risks

Security Boulevard

The idea that data has value certainly isn’t new. It’s been called the new oil, the new gold – in fact, insert any rare commodity, and someone has probably created an analogy! Ironically, though, now that there’s almost universal recognition that this value exists, unlike any of these other commodities, it has become infinitely harder. The post Synthetic Data Removes Data Privacy Risks appeared first on Security Boulevard.

More Trending

article thumbnail

High Court Deals Blow to Data Privacy Regulations

Security Boulevard

Like the Kubler-Ross stages of grief, there are multiple stages of data breach. Anger, denial, blame, investigation, litigation, regulation and, ultimately, resignation. This includes possible class action litigation by consumers, banks, vendors, suppliers or others impacted by the failure to adequately protect data, shareholder derivative lawsuits by investors for failure to protect critical corporate assets, The post High Court Deals Blow to Data Privacy Regulations appeared first on Security

article thumbnail

Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives

The State of Security

With all the headlines about ransomware attacks hitting companies hard, you might think there's only bad news around the subject. Well, think again. Read more in my article on the Tripwire State of Security blog.

article thumbnail

Android 12 will give you more control over how much data you share with apps

We Live Security

An all-new privacy dashboard and better location, microphone and camera controls are all aimed at curbing apps’ data-slurping habits. The post Android 12 will give you more control over how much data you share with apps appeared first on WeLiveSecurity.

142
142
article thumbnail

Comcast now blocks BGP hijacking attacks and route leaks with RPKI

Bleeping Computer

Comcast, one of America's largest broadband providers, has now deployed RPKI on its network to defend against BGP route hijacks and leaks. Left unchecked, a BGP route hijack or leak can cause a drastic surge in internet traffic that now gets misdirected or stuck, leading to global congestion and a Denial of Service (DoS). [.].

Internet 140
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

TrustArc Incorporates EU Cloud Code of Conduct Into PrivacyCentral Platform

TrustArc

TrustArc has announced that its data-driven PrivacyCentral platform will now incorporate the EU Cloud Code of Conduct, a GDPR Code of Conduct approved by European regulators on May 20, 2021. This capability allows organizations operating as cloud-service providers to evaluate their readiness to declare adherence to the standards of the new Code at a more […].

140
140
article thumbnail

Microsoft SimuLand, an open-source lab environment to simulate attack scenarios

Security Affairs

Microsoft released SimuLand, an open-source tool that can be used to build lab environments to simulate attacks and verify their detection. Microsoft has released SimuLand, an open-source lab environment that allows to reproduce the techniques used in real attack scenarios. The tool could be used to test and improve Microsoft solutions, including Microsoft 365 Defender, Azure Defender, and Azure Sentinel defenses against real attack scenarios. “SimuLand is an open-source initiative by Micr

Hacking 140
article thumbnail

Data of 100+ million Android users exposed via misconfigured cloud services

Bleeping Computer

A banking trojan named Bizarro that originates from Brazil has crossed the borders and started to target customers of 70 banks in Europe and South America. [.].

Banking 141
article thumbnail

Vishing attacks spoof Amazon to try to steal your credit card information

Tech Republic Security

The attacks used fake order receipts and phone numbers in an attempt to steal credit card details from unsuspecting victims, says Armorblox.

138
138
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Microsoft releases SimuLand, a test lab for simulated cyberattacks

Bleeping Computer

Microsoft has released SimuLand, an open-source lab environment to help test and improve Microsoft 365 Defender, Azure Defender, and Azure Sentinel defenses against real attack scenarios. [.].

131
131
article thumbnail

The Role of Ethics in Cybersecurity Studies

Security Boulevard

Nobody wants to be a proverbial guinea pig; least of all, developers donating their time and energy to making the world a better place. You’d think with all the recent discussion about consent, researchers would more carefully observe ethical boundaries. Yet, a group of researchers from the University of Minnesota not only crossed the line. The post The Role of Ethics in Cybersecurity Studies appeared first on Security Boulevard.

article thumbnail

Microsoft: Massive malware campaign delivers fake ransomware

Bleeping Computer

A massive malware campaign pushed the Java-based STRRAT remote access trojan (RAT), known for its data theft capabilities and the ability to fake ransomware attacks. [.].

Malware 131
article thumbnail

A doctor reveals the human cost of the HSE ransomware attack

Malwarebytes

“It’s cracking, the whole thing.” The words were delivered quickly, but in a thoughtful and measured way. As if the person saying them was used to delivering difficult news. Little surprise, given they belonged to a doctor. But this doctor wasn’t describing a medical condition—this was their assessment of the situation on the ground in the hospital where they’re working today, in Ireland.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Conti ransomware gives HSE Ireland free decryptor, still selling data

Bleeping Computer

The Conti ransomware gang has released a free decryptor for Ireland's health service, the HSE, but warns that they will still sell or release the stolen data. [.].

article thumbnail

The Full Story of the Stunning RSA Hack Can Finally Be Told

WIRED Threat Level

In 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.

Hacking 136
article thumbnail

The FBI’s Internet Crime Complaint Center Logs its Six Millionth Complaint

Hot for Security

The FBI’s Internet Crime Complaint Center (IC3) has been providing the public with reliable cybercrime reporting systems for 20 years. In that time, the IC3 has developed into a go-to platform for victims of fraud, online scams, identity theft, and other cyber-related crimes that have inflicted losses of over $10 billion. Last week, the center received its six millionth complaint, revealing that, while individuals have become more inclined to report cyber incidents, more and more people ar

Internet 125
article thumbnail

STRRAT RAT spreads masquerading as ransomware

Security Affairs

Microsoft warns of a malware campaign that is spreading a RAT dubbed named STRRAT masquerading as ransomware. Microsoft Security Intelligence researchers uncovered a malware campaign that is spreading a remote access trojan (RAT) tracked as STRRAT. The RAT was designed to steal data from victims while masquerading as a ransomware attack. The Java-based STRRAT RAT was distributed in a massive spam campaign, the malware shows ransomware-like behavior of appending the file name extension.crimson to

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

NSF Wants Data on Your Data Needs

Adam Shostack

The National Science Foundation is looking for information on needs for datasets, Dear Colleague Letter: Request for Information on the specific needs for datasets to conduct research on computer and network systems. A draft of my responses is on Google Docs. Comments are due Friday at 5 PM EST. (I thought I’d posted this earlier.).

100
100
article thumbnail

Blind SQL Injection flaw in WP Statistics impacted 600K+ sites

Security Affairs

Experts discovered a Time-Based Blind SQL Injection vulnerability in the WP Statistics plugin which is installed on over 600,000 WordPress sites. Researchers from the Wordfence Threat Intelligence discovered a Time-Based Blind SQL Injection vulnerability in WP Statistics , which is a WordPress plugin with over 600,000 active installs. The plugin was developed by VeronaLabs, it provides complete website statistics to site owners.

Firewall 121
article thumbnail

Spammers flood PyPI with pirated movie links and bogus packages

Bleeping Computer

The official Python software package repository, PyPI, is getting flooded with spam packages, as seen by BleepingComputer. These packages are named after different movies in a style that is commonly associated with torrents and "warez" sites hosting pirated content. [.].

Software 120
article thumbnail

Serious Privacy Podcast: Data Secrets (with Ray Everett)

TrustArc

On this week of Serious Privacy, Paul Breitbarth and K Royal connect with Ray Everett, Founding Member & Chief Privacy Intelligence Officer at Data Secrets, a company that develops solutions focused on identifying risk wherever applications are accessing your data — in the public cloud, in SaaS applications, and on-premise. He has a long history working as a privacy professional, […].

Risk 119
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

23 Android Apps Expose Over 100,000,000 Users' Personal Data

The Hacker News

Misconfigurations in multiple Android apps leaked sensitive data of more than 100 million users, potentially making them a lucrative target for malicious actors.

123
123
article thumbnail

The CSO role today: Responsibilities and requirements for the top security job

CSO Magazine

CSO definition. A CSO is a departmental leader responsible for information security, corporate security or both. That's the simplest answer to the question "What is a CSO?", and one that our founding editor Derek Slater offered up to readers way back in 2005—heck, if there's one website you ought to be able to trust to tell you what a CSO is, it's CSOonline.

CSO 116
article thumbnail

Apple Exec Calls Level of Mac Malware ‘Unacceptable’

Threatpost

Company is using threat of attacks as defense in case brought against it by Epic Games after Fortnite was booted from the App Store for trying to circumvent developer fees.

Malware 116
article thumbnail

Smashing Security podcast #228: Pipeline pickle, Blockchain bollocks, and Eufy SNAFU

Graham Cluley

The Colonial Pipeline attack has shone light on the activities of the Darkside ransomware gang, we take a skeptical look at cryptocurrencies and the blockchain, and Eufy security cameras suffer an embarrassing security failure. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by BBC technology correspondent Rory Cellan-Jones.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.