Fri.Sep 02, 2022

article thumbnail

Montenegro is the Victim of a Cyberattack

Schneier on Security

Details are few, but Montenegro has suffered a cyberattack : A combination of ransomware and distributed denial-of-service attacks, the onslaught disrupted government services and prompted the country’s electrical utility to switch to manual control. […]. But the attack against Montenegro’s infrastructure seemed more sustained and extensive, with targets including water supply systems, transportation services and online government services, among many others.

Retail 240
article thumbnail

Traffers threat: The invisible thieves

Tech Republic Security

Traffers are cybercriminals organized in teams whose purpose is to steal a maximum of bankable information from infected computers, which they sell to other cybercriminals. The post Traffers threat: The invisible thieves appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CIOs Can Balance Boldness and Caution By Implementing DevOps Test Data Management

Security Boulevard

How CIOs Can Balance Boldness and Caution By Implementing DevOps Test Data Management. jasonaxelrod. Thu, 09/01/2022 - 12:16. With automated test data, companies can achieve fast, quality software releases, more seamless cloud adoption, and improved data security and privacy for meeting emerging compliance requirements. Josh Harbert. Sep 01, 2022. Too often, modern businesses are forced to choose between the speed of innovation and privacy and security for valuable data.

article thumbnail

Another Ransomware For Linux Likely In Development

Security Affairs

Uptycs researchers recently spotted a new Linux ransomware that appears to be under active development. The Uptycs Threat Research team recently observed an Executable and Linkable Format ( ELF ) ransomware which encrypts the files inside Linux systems based on the given folder path. We observed that the dropped README note matches exactly with the DarkAngels ransomware README note (see Figure 1).

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

British Airways: A Case Study in GDPR Compliance Failure

Security Boulevard

An investigation into the breach by Britain's Information Commissioner Office (ICO) concluded that British Airways had violated Europe’s General Data Protection Regulation (GDPR). The post British Airways: A Case Study in GDPR Compliance Failure appeared first on Source Defense. The post British Airways: A Case Study in GDPR Compliance Failure appeared first on Security Boulevard.

Risk 143
article thumbnail

The Makings of a Successful Threat-Hunting Program

Dark Reading

Threat hunters can help build defenses as they work with offensive security teams to identify potential threats and build stronger threat barriers.

145
145

More Trending

article thumbnail

Credential stuffing cyber attacks targeting home IP addresses

CyberSecurity Insiders

FBI has issued a warning that cybercriminals are hiding credentials on home IP addresses after hacking connected devices like IP cams and routers. To those unaware of the credential stuffing concept, here’s a gist. As soon as a cyber attack takes place and hackers gain access to loads of info, such as passwords and usernames, they sell them to other cyber crooks who then use such credentials to take over online accounts.

article thumbnail

Identity’s Role in API Security

Security Boulevard

Digital identities play an important role in an organization’s security program. But the idea of “identity” in APIs can be complex, Jeff Williams, CTO and co-founder at Contrast Security, said in an email interview. “People think of APIs as a way for two software applications to communicate,” Williams explained. For example, if a mobile phone. The post Identity’s Role in API Security appeared first on Security Boulevard.

Mobile 123
article thumbnail

The Ultimate Security Blind Spot You Don't Know You Have

The Hacker News

How much time do developers spend actually writing code? According to recent studies, developers spend more time maintaining, testing and securing existing code than they do writing or improving code. Security vulnerabilities have a bad habit of popping up during the software development process, only to surface after an application has been deployed.

Software 123
article thumbnail

GitHub Security 101: Best Practices for Securing your Repository

Security Boulevard

DevSecOps expert and GitHub Star Sonya Moisset shared with us her tips to improve your open-source repository's security in a few simple steps. The post GitHub Security 101: Best Practices for Securing your Repository appeared first on Security Boulevard.

120
120
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Apple pushes out emergency updates to address zero-day exploits

CSO Magazine

Apple has encouraged users of older mobile and desktop devices to update their software ASAP, as a vulnerability could allow an attacker to take complete control of older Apple devices.

Mobile 115
article thumbnail

10 common developer misconceptions about web application security

Security Boulevard

If you’re a web developer, you’re already familiar with many aspects of application security – and you’ve also heard conflicting opinions about it. To clear up some popular AppSec myths, we’ve put together a list of 10 common misconceptions about security in web development. Read on to make sure you’re steering clear of these traps in your everyday work.

article thumbnail

3 multicloud lessons for cloud architects

InfoWorld on Security

Many cloud architect friends of mine see multicloud on the horizon, but they don’t think they’re prepared for its extra complexities. Most of them initially pushed back on the concept of multicloud much like they pushed back on cloud computing in general before it became a thing. Cloud architects who now look down the barrel of multicloud deployments can increase their chances of success by applying these three tips: [ Learn all about the cloud at InfoWorld: What is cloud computing?

Software 115
article thumbnail

How to Prevent Fraud in Healthcare by Knowing Your Patient?

Security Boulevard

Healthcare fraud, waste, and abuse cost taxpayers billions of dollars. According to a report published in BusinessWire, the global healthcare fraud analytic market may reach US$ 5.69 billion by 2027. Detection of fraud leads to hefty fines, criminal proceedings, and incarceration for the concerned individuals in organizations. 2021 saw a peaking of medical fraud and […].

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

AWS Tokens Lurking in Android, iOS Apps Crack Open Corporate Cloud Data

Dark Reading

Thousands of corporate mobile apps developed by businesses for use by their customers contain hardcoded AWS tokens that can be easily extracted and used to access the full run of corporate data stored in cloud buckets.

Mobile 106
article thumbnail

SMBs Finally Investing More in Cybersecurity

Security Boulevard

A survey of 700 IT and business decision-makers found the bulk of small-to-medium businesses (SMBs) plan to increase investments in cybersecurity over the next 12 months, even though two-thirds of respondents admitted they lacked the in-house expertise needed to defend themselves. Conducted by ConnectWise, a provider of a management platform for providers of IT services, The post SMBs Finally Investing More in Cybersecurity appeared first on Security Boulevard.

article thumbnail

Linux Systems Are a More Common Target as the Attack Surface Expands

Heimadal Security

Often overlooked by security experts, Linux systems become a more common target for cybercriminals. Aiming to get as much money as possible, hackers are expanding the digital attack surface beyond Windows operating systems. Detections have increased by 75% in the last year as ransomware attacks are now heavily targeting Linux servers. Linux systems are not only […].

article thumbnail

Sephora Becomes First Company Publicly Fined Under CCPA

SecureWorld News

Sephora has been fined $1.2 million for violating California's Consumer Privacy Act (CCPA), becoming the first company to be publicly fined under the landmark privacy law. The French multinational beauty retailer allegedly failed to notify consumers that it was selling their personal information, and failed to process requests to opt out of sale via user-enabled global privacy controls in violation of the CCPA, according to a statement from California Attorney General Rob Bonta.

CISO 107
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

GIGN Elite Force helps lower ransom to a French Hospital

CyberSecurity Insiders

GIGN, an elite cyber force set up by French National Gendarmerie, has lowered the ransom demanded by hackers to free up data on the database of a Paris Hospital. CHSF Hospital Centre in Corbeil-Essonnes is the healthcare service provider in discussion whose servers storing imaging and patient data were locked up by encryption. As per a report published in Parisien Newspaper, the hackers demanded $10 million to release a decryption key, but lowered the sum to $1 million after negotiations by the

article thumbnail

Experts link Raspberry Robin Malware to Evil Corp cybercrime gang

Security Affairs

Researchers attribute the Raspberry Robin malware to the Russian cybercrime group known as Evil Corp group. IBM Security X-Force researchers discovered similarities between a component used in the Raspberry Robin malware and a Dridex malware loader, which was part of the malicious operations of the cybercrime gang Evil Corp. Raspberry Robin is a Windows worm discovered by cybersecurity researchers from Red Canary, the malware propagates through removable USB devices.

article thumbnail

Warning: PyPI Feature Executes Code Automatically After Python Package Download

The Hacker News

In another finding that could expose developers to increased risk of a supply chain attack, it has emerged that nearly one-third of the packages in PyPI, the Python Package Index, trigger automatic code execution upon downloading them.

Risk 108
article thumbnail

Microsoft will disable Exchange Online basic auth next month

Bleeping Computer

Microsoft warned customers today that it will finally disable basic authentication in random tenants worldwide to improve Exchange Online security starting October 1, 2022. [.].

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content

The Hacker News

A "major" security issue in the Google Chrome web browser, as well as Chromium-based alternatives, could allow malicious web pages to automatically overwrite clipboard content without requiring any user consent or interaction by simply visiting them. The clipboard poisoning attack is said to have been accidentally introduced in Chrome version 104, according to developer Jeff Johnson.

100
100
article thumbnail

Researchers analyzed a new JavaScript skimmer used by Magecart threat actors

Security Affairs

Researchers from Cyble analyzed a new, highly evasive JavaScript skimmer used by Magecart threat actors. Cyble Research & Intelligence Labs started its investigation after seeing a post on Twitter a new JavaScript skimmer developed by the Magecart threat group used to target Magento e-commerce websites. #JavaScript #skimmer overlayed onto payment page of an infected #Magento ecommerce store to steal payment card data from visitors exfils to united81[.]com #magecart #infosec #cybersecurity #

article thumbnail

Authorization: Why Now & What Next

Security Boulevard

Security starts when authentication ends. It's a line I have used a few times over the years as it is one I actually quite believe in. In an era where firewalls are derided as being pretty toothless in the fight against omnipresent complex cyber attacks - and the concept of trusted networks quite rightly become obsolete in the world of "zero trust" - it always seemed odd to me, to put such a large emphasis on stringent authentication services.

article thumbnail

Power System Cybersecurity: More Important Than Ever

SecureBlitz

Here, I will talk about power cybersecurity. Read on. Industrial facilities like power plants continue to be vital parts of the critical infrastructure in every country. Clearly, the highest protection measures should be implemented to avoid any kind of unlawful invasion, including terrorist acts. Physical and administrative security is often handled well.

article thumbnail

ERM Program Fundamentals for Success in the Banking Industry

Speaker: William Hord, Senior VP of Risk & Professional Services

Enterprise Risk Management (ERM) is critical for industry growth in today’s fast-paced and ever-changing risk landscape. When building your ERM program foundation, you need to answer questions like: Do we have robust board and management support? Do we understand and articulate our bank’s risk appetite and how that impacts our business units? How are we measuring and rating our risk impact, likelihood, and controls to mitigate our risk?

article thumbnail

Common Challenges When Handling PII Data

Security Boulevard

Personally identifiable information (PII) is information that can be used to distinguish or trace an individual’s identity. Understandably, if compromised, such sensitive information may be used for identity theft, fraud and other harmful and unlawful purposes. With data today considered a lucrative commodity, organizations are more aware than ever of the need for adopting the.

article thumbnail

Friday Five 9/2

Digital Guardian

Data privacy concerns were at the forefront of this week’s cybersecurity news but phishing and ransomware attacks are still making waves. Read about these stories and more in this week’s Friday Five!

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 9/2

Security Boulevard

Insight #1. ". Another breach of a developer environment this week leads us to yet another realization that the Solarwinds-like threat vector is here to stay. If you haven’t started strengthening your dev environments/pipelines, there is no better time than now to start.". . Insight #2. ". There was a great interview with a well-known ransomware initial access broker, Wazawaka, over the past week.

CISO 96
article thumbnail

Attack infrastructure used in Cisco hack linked to Evil Corp affiliate

Security Affairs

Researchers discovered that the infrastructure used in Cisco hack was the same used to target a Workforce Management Solution firm. Researchers from cybersecurity firm eSentire discovered that the attack infrastructure used in recent Cisco hack was also used to attack a top Workforce Management corporation in in April 2022. The experts also speculate that the attack was orchestrated by a threat actor known as mx1r, who is an alleged member of the Evil Corp affiliate cluster dubbed UNC2165.

Hacking 98
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.