Thu.Oct 15, 2020

article thumbnail

Customised Ubiquiti Clients and Randomised MAC Addresses on Apple Devices

Troy Hunt

You know how some people are what you'd call "house proud" in that they like everything very neat and organised? You walk in there and everything is in its place, nice and clean without clutter. I'm what you'd call "network proud" and the same principle applies to how I manage my IP things: That's just a slice of my Ubiquiti network map which presently has 91 IP addresses on it between clients and network devices.

IoT 356
article thumbnail

US Cyber Command and Microsoft Are Both Disrupting TrickBot

Schneier on Security

Earlier this month, we learned that someone is disrupting the TrickBot botnet network. Over the past 10 days, someone has been launching a series of coordinated attacks designed to disrupt Trickbot, an enormous collection of more than two million malware-infected Windows PCs that are constantly being harvested for financial data and are often used as the entry point for deploying ransomware within compromised organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware campaign threatens organizations with DDoS attacks

Tech Republic Security

All the organizations that contacted security provider Radware after receiving an extortion letter were hit by Distributed Denial of Service attacks.

DDOS 167
article thumbnail

Egregor ransomware gang leaked data alleged stolen from Ubisoft, Crytek

Security Affairs

The Egregor ransomware gang has hit the game developer Crytek and leaked files allegedly stolen from the systems of the gaming firm Ubisoft. A previously unknown ransomware gang dubbed Egregor has hit the game developer Crytek and leaked files allegedly stolen from the internal network of another leading gaming firm, Ubisoft. Breaking: new #Sekhmet #Ransomware (spin-off?

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Survey: 53% of young cybersecurity professionals fear replacement by automation

Tech Republic Security

Cybersecurity professionals largely embrace automation, but half of younger employees worry that technology could make their roles obsolete, according to a new survey by Exabeam.

article thumbnail

Twitter Hack Analysis Drives Calls for Greater Security Regulation

Dark Reading

New York's Department of Financial Services calls for more cybersecurity regulation at social media firms following the "jarringly easy" Twitter breach.

More Trending

article thumbnail

Crooks hit Puerto Rico Firefighting Department Servers

Security Affairs

Puerto Rico’s firefighting department discloses a security breach, hackers breached its database and demanded $600,000. Puerto Rico’s firefighting department discloses a security breach, hackers breached its database and demanded a $600,000 ransom. According to the department’s director, Alberto Cruz, the ability of the department to respond to emergencies was not impacted by the attack.

article thumbnail

The Media Just Passed a Test It Failed Four Years Ago

WIRED Threat Level

In an interview with WIRED, dean of the Columbia Journalism School Steve Coll says the media has learned some important lessons since 2016 about covering stolen email leaks.

Media 105
article thumbnail

U.S. Bookstore giant Barnes & Noble hit by cyberattack

Security Affairs

U.S. Bookstore giant Barnes & Noble has disclosed a cyber attack and that the threat actors have exposed the customers’ data. Barnes & Noble, Inc. , is an American bookseller with the largest number of retail outlets in the United States in fifty states. The bookseller also operated the Nook Digital, which is a spin-off division that sells eBook and e-Reader platform.

article thumbnail

Carnival Corp. Ransomware Attack Affects Three Cruise Lines

Threatpost

Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Microsoft Office 365 Accounts a Big Target for Attackers

Dark Reading

Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

article thumbnail

Barnes & Noble Hack: A Reading List for Phishers and Crooks

Threatpost

Customers' lists of book purchases along with email addresses and more could have been exposed -- and that's a problem.

Hacking 125
article thumbnail

How Do You Enable End-to-End Encryption in Zoom?

SecureWorld News

At the beginning of the COVID-19 pandemic, Zoom became an essential tool for co-workers and friends alike. As the platform exploded in popularity, questions about the security grew as well. The company claimed to have end to end encryption, when in reality it did not. SecureWorld has previously covered this topic and other security concerns that came to light as the company became both a savior and a suspect in the race to remote work.

article thumbnail

Zoom now supports end-to-end encrypted (E2EE) calls

Security Affairs

The Video conferencing platform Zoom announced the implementation of end-to-end encryption (E2EE) and its availability starting next week. The popular Video conferencing platform Zoom announced the availability of the end-to-end encryption (E2EE) starting next week. The new E2EE feature will be made available for both paid and free accounts. “We’re excited to announce that starting next week, Zoom’s end-to-end encryption (E2EE) offering will be available as a technical preview, which means

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Threat Intelligence and Security Awareness?

SecureWorld News

In our exclusive Behind the Scenes interview series, we take a deeper look at a topic that is relevant to the information security community. Today's conversation answers this question: How can threat intelligence strengthen security awareness? We're speaking with Sherrod DeGrippo, Sr. Director of Threat Research and Detection at Proofpoint, and Robert Shields, CISSP, also of Proofpoint.

article thumbnail

US Indicts Members of Transnational Money-Laundering Organization

Dark Reading

Members of the QQAAZZ group helped cybercriminals conceal origins of stolen funds, DoJ alleges.

122
122
article thumbnail

Zoom Rolls Out End-to-End Encryption After Setbacks

Threatpost

After backlash over false marketing around its encryption policies, Zoom will finally roll out end-to-end encryption next week.

article thumbnail

Prolific Cybercrime Group Now Focused on Ransomware

Dark Reading

Cybercriminal team previously associated with point-of-sale malware and data theft has now moved almost completely into the more lucrative crimes of ransomware and extortion.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

FIFA 21 Blockbuster Release Gives Fraudsters an Open Field for Theft

Threatpost

In-game features of the just-released FIFA 21 title give scammers easy access its vast audience.

Scams 96
article thumbnail

The Ruthless Cyber Chaos of Business Recovery

Dark Reading

Critical technology initiatives leveraging the best of technology solutions are the only way through the cyber chaos of 2020.

article thumbnail

ImmuniWeb Discovery to Intelligently Automate Penetration Testing Scoping and Scheduling

ImmuniWeb

The data-driven and risk-based approach prevents insufficient or incomplete testing, and precludes excessive or redundant testing by leveraging award-winning Machine Learning technology.

article thumbnail

Overcoming the Challenge of Shorter Certificate Lifespans

Dark Reading

We could be in the middle of a major transition to shorter and shorter certificate life spans, which has significant implications for how IT organizations manage certificates across the enterprise.

74
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts

Threatpost

Companies that use Broadvoice's cloud-based VoIP platform may find their patients, customers, suppliers and partners to be impacted by a massive data exposure.

article thumbnail

Barnes & Noble Warns Customers About Data Breach

Dark Reading

Famed bookseller says non-financial data was exposed in a new attack.

article thumbnail

Cybersecurity Automation: Definition, Advantages & Tools

Spinone

What is cybersecurity automation? Cybersecurity automation is the set of software tools that run critical cybersecurity operations of a company with minimal human involvement. They usually use playbooks created by the organization’s security teams. The automated operations include the management of: cyber vulnerabilities: detection assessment removal cyber threats: identification estimation protection cyber incidents: prevention detection […] The post Cybersecurity Automation: Defini

article thumbnail

Apple White Hat Hack Shows Value of Pen Testers

eSecurity Planet

An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.

Hacking 55
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

This Week in Security News: Cybercriminals Use Stolen Data and Hacking Tools

Trend Micro

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Hacking 40
article thumbnail

Breach at Dickey’s BBQ Smokes 3M Cards

Krebs on Security

One of the digital underground’s most popular stores for peddling stolen credit card information began selling a batch of more than three million new card records this week. KrebsOnSecurity has learned the data was stolen in a lengthy data breach at more than 100 Dickey’s Barbeque Restaurant locations around the country. An ad on the popular carding site Joker’s Stash for “BlazingSun,” which fraud experts have traced back to a card breach at Dickey’s BBQ.

article thumbnail

Cybersecurity Automation: Definition, Advantages & Tools

Spinone

What is cybersecurity automation? Cybersecurity automation is the set of software tools that run critical cybersecurity operations of a company with minimal human involvement. They usually use playbooks created by the organization’s security teams. The automated operations include the management of: cyber vulnerabilities: detection assessment removal cyber threats: identification estimation protection cyber incidents: prevention detection investigation analysis elimination recovery Types o

article thumbnail

New York: Cyberattack Is Twitter's Fault, Let's Increase Regulation

SecureWorld News

It was the summer cyberattack that had social media buzzing. A group of teenagers used social engineering to breach Twitter's network and take over the accounts of a whole bunch of A-listers. People like Barack Obama, Bill Gates, Kim Kardashian West, Jeff Bezos, and Elon Musk were suddenly tweeting about a can't miss double your bitcoin opportunity, that was really a scam.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.