Mon.Sep 28, 2020

article thumbnail

On Executive Order 12333

Schneier on Security

Mark Jaycox has written a long article on the US Executive Order 12333: “ No Oversight, No Limits, No Worries: A Primer on Presidential Spying and Executive Order 12,333 “: Abstract : Executive Order 12,333 (“EO 12333”) is a 1980s Executive Order signed by President Ronald Reagan that, among other things, establishes an overarching policy framework for the Executive Branch’s spying powers.

article thumbnail

Governnment Software Vendor Tyler Technologies Announces Breach

Adam Levin

Tyler Technologies, a software and technology provider for U.S. federal, state, and local government agencies, announced that its internal systems were hacked last week. . The company, which provides election, information management and emergency management systems to over 15,000 government offices across the country, announced the hack after its website was taken offline Wednesday, September 23. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity: How to properly perform vulnerability assessments in your organization

Tech Republic Security

Assessing the security posture of devices is an important part of securing data and communications. Follow these steps to make sure you do it correctly.

article thumbnail

REvil ransomware operators are recruiting new affiliates

Security Affairs

REvil Ransomware (Sodinokibi) operators deposited $1 million in Bitcoins on a Russian-speaking hacker forum to demonstrate their willingness to involve new affiliates. The REvil Ransomware (Sodinokibi) operators have deposited $1 million in bitcoins on a Russian-speaking hacker forum to prove to potential affiliates that they mean business. Some hacker forum allows members to deposit funds that can be used to buy any kind of illicit services or product offered by other members.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Google removes 17 Android apps designed to deploy Joker malware

Tech Republic Security

The Joker malware has been a persistent thorn in Google's side as it keeps popping up in shady apps to infect users of the Google Play store.

Malware 218
article thumbnail

Mount Locker ransomware operators demand multi-million dollar ransoms

Security Affairs

The operators behind new ransomware dubbed Mount Locker have adopted the same tactic of other gangs threatening the victims to leak stolen data. A new ransomware gang named Mount Locker has started its operations stealing victims’ data before encrypting. According to BleepingComputer, the ransomware operators are demanding multi-million dollar ransoms.

More Trending

article thumbnail

UHS hospitals hit by Ryuk ransomware attack

Security Affairs

Universal Health Services (UHS) healthcare providers has reportedly shut down systems at healthcare facilities after a Ryuk ransomware attack. Universal Health Services (UHS) , one of the largest hospital and healthcare services providers, has shut down systems at healthcare facilities in the United States after they were infected with the Ryuk ransomware.

article thumbnail

5 more things to know about ransomware

Tech Republic Security

Ransomware continues to be a cybersecurity threat. Tom Merritt lists five additional things to know about ransomware.

article thumbnail

Mac, Linux Users Now Targeted by FinSpy Variants

Threatpost

FinSpy has returned in new campaigns targeting dissident organizations in Egypt - and researchers uncovered new samples of the spyware targeting macOS and Linux users.

Spyware 110
article thumbnail

How to install common security tools via Homebrew on a Mac

Tech Republic Security

We'll guide you through the process of using Homebrew package manager to install common security tools on macOS computers to assess and aid in hardening devices on your network.

136
136
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Windows 7 ‘Upgrade’ Emails Steal Outlook Credentials

Threatpost

Researchers warn of emails pretending to help business employees upgrade to Windows 10 - and then stealing their Outlook emails and passwords.

Passwords 115
article thumbnail

Judge narrowly saves TikTok from latest US app store ban

Tech Republic Security

The temporary ruling means that TikTok will still be available for downloading in the US, at least for now.

155
155
article thumbnail

The Election Threats That Keep US Intelligence Up at Night

WIRED Threat Level

Government officials have increasingly sounded alarms on the risks of foreign interference and disinformation campaigns leading up to—and after—November 3.

article thumbnail

5 more things to know about ransomware

Tech Republic Security

Ransomware continues to be a cybersecurity threat. Tom Merritt lists five additional things to know about ransomware.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Fortune 500 Ransomware Attack Against United Health Services

SecureWorld News

United Health Services, a Fortune 500 company that operates more than 400 hospitals across the U.S. and U.K., is the latest victim of a ransomware attack. The incident reportedly took place overnight between Saturday the 26th and Sunday the 27th of September. UHS employees discuss the cyberattack online. A Reddit thread titled Cyberattack on UHS Hospitals Nationwide was started Sunday morning for employees and IT professionals to share what is going on and what might have caused this.

article thumbnail

Cross-Platform / Modular Glupteba Malware Uses ManageX

Trend Micro

This entry features the analysis of a variant of Glupteba, emphasizing the modularity and the cross-platform features of the malware as seen through the examination of its code. Notable in this variant is the use of ManageX.

Malware 94
article thumbnail

9 Tips to Prepare for the Future of Cloud & Network Security

Dark Reading

Cloud and network security analysts outline trends and priorities businesses should keep top of mind as they grow more reliant on cloud.

article thumbnail

A Ransomware Attack Has Struck a Major US Hospital Chain

WIRED Threat Level

“All computers are completely shut down,” one Universal Health Services employee told WIRED.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Twitter Warns Developers of API Bug That Exposed App Keys, Tokens

Threatpost

Twitter has fixed a caching issue that could have exposed developers' API keys and tokens.

107
107
article thumbnail

Safeguarding Schools Against RDP-Based Ransomware

Dark Reading

How getting online learning right today will protect schools, and the communities they serve, for years to come.

article thumbnail

Joker Trojans Flood the Android Ecosystem

Threatpost

September saw dozens of Joker malware variants hitting Google Play and third-party app stores.

Malware 105
article thumbnail

MFA-Minded Attackers Continue to Figure Out Workarounds

Dark Reading

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.

Hacking 138
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Universal Health Services Ransomware Attack Impacts Hospitals Nationwide

Threatpost

The Ryuk ransomware is suspected to be the culprit.

article thumbnail

Universal Health Services Network Down in Apparent Ransomware Attack

Dark Reading

UHS reportedly hit with ransomware that took down its network that supports hundreds of healthcare facilities and hospitals.

article thumbnail

17 Apps Removed from Google Play for Joker Malware

SecureWorld News

Google has removed 17 apps from its Google Play store due to malware known as Joker. The Joker malware family is infamous for constantly targeting Android devices. Even though Google is very much aware of this cyber threat, it manages to keep finding its way into their official application market. It accomplishes this by changing its code, execution methods, or payload-retrieving techniques.

Malware 63
article thumbnail

MFA-Minded Attackers Continue to Figure Out Workarounds

Dark Reading

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.

Hacking 110
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Four Ways to Validate Credentials in SearchLight

Digital Shadows

Amid the billions of credentials that are breached each year, security teams are focused on one core question: do any. The post Four Ways to Validate Credentials in SearchLight first appeared on Digital Shadows.

40
article thumbnail

Ivanti Acquires Two Security Companies

Dark Reading

Purchase of MobileIron and Pulse Secure announced simultaneously.

82
article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

If you think hacking only involves the use of a keyboard, then you’re probably missing out. What about using light? What about using sound? In this episode, The Hacker Mind looks at some of the work Dr. Kevin Fu has been doing at the University of Michigan, such as using laser pointers to pwn voice-activated digital assistants, and using specific frequencies of sound to corrupt or crash hard disk drives.

Hacking 52
article thumbnail

Putin proposes new information security collaboration to US, including no-hack pact for election

Security Affairs

Putin is proposing a new cyber security collaboration with the United States, including a no-hack pact for the upcoming Presidential election. Russian Government has published a statement by President Vladimir Putin that proposes to the United States a comprehensive program of measures for restoring the Russia – US cooperation in information security.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.