Mon.Oct 25, 2021

article thumbnail

Conti Ransom Gang Starts Selling Access to Victims

Krebs on Security

The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.

article thumbnail

New York Times Journalist Hacked with NSO Spyware

Schneier on Security

Citizen Lab is that a New York Times journalist was hacked with the NSO Group’s spyware Pegasus, probably by the Saudis. The world needs to do something about these cyberweapons arms manufacturers. This kind of thing isn’t enough; NSO Group is an Israeli company.

Spyware 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s why castle-wall defenses utterly fail at stopping deceptive adversaries

The Last Watchdog

When it comes to cyber attacks, most businesses think: “It could never happen to us,” but some plots are just hitting a little too close to home. Related: T-Mobile breach reflects rising mobile device attacks. For instance, if you’ve ever played Grand Theft Auto, you know the goal is quite simply mass destruction: Use whatever resources you have at your disposal to cause as much damage as you possibly can and just keep going.

article thumbnail

REvil ransomware group reportedly taken offline by multi-nation effort

Tech Republic Security

Law enforcement officials and cyber specialists hacked into REvil's network, gaining control of some of its servers, sources told Reuters.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft: Russian SVR hacked at least 14 IT supply chain firms since May

Bleeping Computer

Microsoft says the Russian-backed Nobelium threat group behind last year's SolarWinds hack is still targeting the global IT supply chain, with 140 resellers and technology service providers attacked and at least 14 breached since May 2021. [.].

Hacking 143
article thumbnail

Companies that pay ransomware attackers get thumbs down from consumers

Tech Republic Security

More than half of those surveyed by data management firm Cohesity said that companies that pay the ransom in an attack encourage ransomware and bad actors.

More Trending

article thumbnail

Cyber Threat ranking for countries across the world

CyberSecurity Insiders

A research carried out by fraud detection firm SEON has ranked Denmark as the safest nation to spend time online, followed by Germany and United States. Releasing a report on this note, security researchers compiled their report based on the information passed on by the National Cyber Security Index (NCSI) and the Global Cybersecurity Index 2020. SEON backed report dubbed Cybersecurity Exposure Index (CEI) of 2020 clearly specified that the populace of Denmark seeking online services as the anti

article thumbnail

U.S. Senate Bill Would Require Digital Signatures for Court Documents

Security Boulevard

New Senate Bill S. 2547 rightly addresses flaws in the current procedure for sharing sensitive court documents by requiring digital signatures that provide additional security. Legislation that considers the new digital landscape is becoming increasingly necessary as workplace functions have been driven online by the pandemic, creating more opportunities for tampering.

article thumbnail

Microsoft Defender ATP adds live response for Linux and macOS

Bleeping Computer

Microsoft has announced the addition of new live macOS and Linux response capabilities to Defender for Endpoint, , the enterprise version of Redmond's Windows 10 Defender antivirus. [.].

Antivirus 136
article thumbnail

Tesco Cyber Attack 2021 and Microsoft Nobelium Cyber Attack 2021 details

CyberSecurity Insiders

Tesco customers are struggling to book their groceries online as the operations of the company’s dedicated app and the online store have been disrupted through a Cyber Attack. The UK’s supermarket chain has admitted that its operations were affected by the cyber incident that could also put a dent on the profits of it this summer. Tracking orders, placing orders, payment processing were deeply affected said a source from Tesco on the condition of anonymity.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hackers used billing software zero-day to deploy ransomware

Bleeping Computer

An unknown ransomware group is exploiting a critical SQL injection bug found in the BillQuick Web Suite time and billing solution to deploy ransomware on their targets' networks in ongoing attacks. [.].

article thumbnail

Can you Become Ransomware-Proof?

Security Boulevard

Wouldn’t it be great if you had enough confidence in your information security program that if a criminal gang attacked you, you would be able to defend yourself, keep your business going and notify the appropriate legal authorities and any vendor partners that might be impacted? With a mature information security program, you are able. The post Can you Become Ransomware-Proof?

article thumbnail

It's Windows XP's 20th birthday and way too many still use it

Bleeping Computer

?Today is the 20th anniversary of Windows XP, and although the operating system reached the end of support in 2014, way too many people continue to use the insecure version of Windows. [.].

Software 135
article thumbnail

Australian government announces Cyber Security skills program

CyberSecurity Insiders

Australian government has for the first time announced a cyber security skills program that will act as a $14.9 million initiative in training and hiring fresh batch of professional talent in Cybersecurity Science. Questcon’s Cyber Ready Program that has study material and training modules for students across primary, secondary and tertiary sectors.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Mozilla blocks malicious add-ons installed by 455K Firefox users

Bleeping Computer

Mozilla blocked malicious Firefox add-ons installed by roughly 455,000 users after discovering in early June that they were abusing the proxy API to block Firefox updates. [.].

130
130
article thumbnail

How deepfakes enhance social engineering and authentication threats, and what to do about it

CSO Magazine

Deepfake technology is an escalating cybersecurity threat to organizations. Cybercriminals are investing in AI and machine learning to create synthetic or manipulated digital content (including images, video, audio and text) for use in cyberattacks and fraud. This content can realistically replicate or alter appearance, voice, mannerisms or vocabulary with the aim of tricking targets both human and autonomous into believing that what they see, hear or read is authentic and trustworthy. [ Learn w

article thumbnail

CISA urges admins to patch critical Discourse code execution bug

Bleeping Computer

A critical Discourse remote code execution (RCE) vulnerability tracked as CVE-2021-41163 was fixed via an urgent update by the developer on Friday [.].

Software 134
article thumbnail

BrandPost: Overcoming Today’s Top Distributed Workforce Security Challenges

CSO Magazine

The future of work arrived much more abruptly than anticipated, bringing with it many pressing security challenges. The global pandemic forced organizations of all types and sizes to support remote work overnight, and it’s clear that we’re not going back. In fact, according to a recent Upwork report , 36.2 million Americans will be working remotely by 2025, which represents an 87% hike over pre-COVID norms.

124
124
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

SECURING THE SOFTWARE SUPPLY CHAIN STARTS WITH A SOFTWARE BILL OF MATERIALS (SBOM)

Security Boulevard

As readers of the AppSec Observer blog are aware, application attacks have continued unabated throughout the massive economic and social changes of the past two years. Most readers are also aware that an increasing number of cyberattacks target the software supply chain. The devastating SolarWinds attack in 2020 was followed by the supply chain attack on Colonial Pipeline that disrupted fuel supplies in the eastern U.S., the attack on Kaseya that impacted hundreds of its customers’ customers, an

Software 124
article thumbnail

3 reasons even Chromebook™ devices benefit from added security

Webroot

Google Chromebook devices could rightly be called a game-changer for education. These low-cost laptops are within financial reach for far more families than their more expensive competitors, a fact that proved crucial with the outbreak of the COVID-19 pandemic at the beginning of last year. During that period, Google donated more than 4,000 Chromebook devices to California schools and the sale of the devices surged, outselling Macs for the first time.

article thumbnail

Securing a New World: Navigating Security in the Hybrid Work Era

Security Boulevard

After a year and a half of working from home, companies have started calling their employees back into their offices. However, as the COVID-19 Delta variant continues to spread, many companies are expecting to see a hybrid workforce model emerge as the new normal. Uber, Citigroup and Qualtrics, for example, have each issued employee schedules. The post Securing a New World: Navigating Security in the Hybrid Work Era appeared first on Security Boulevard.

VPN 118
article thumbnail

Reddit’s Allison Miller builds trust through transparency

CSO Magazine

Allison Miller’s official title— CISO and vice president of trust —says a lot about her role and responsibilities at Reddit. Like all CISOs, Miller oversees the cybersecurity strategy and operations at the 16-year-old company. She’s also in charge of privacy, ensuring that Reddit safeguards data against illicit uses and unauthorized access. But unlike many other security chiefs, Miller is specifically tasked with safety, too, a job she summarizes as “keeping shenanigans from impacting a good use

CISO 117
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Russia-linked Nobelium APT targets orgs in the global IT supply chain

Security Affairs

Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May 2021. The SolarWinds security breach was not isolated, Russia-linked Nobelium APT group has targeted140 managed service providers (MSPs) and cloud service providers and successfully breached 14 of them since May 2021. The NOBELIUM APT ( APT29 , Cozy Bear , and The Dukes) is the threat actor that conducted supply chain attack against SolarWinds, which involved multip

article thumbnail

7 Scary Good Tips to Secure Your Website

Security Boulevard

Nothing pairs quite as well as cybersecurity and Halloween. Prepare for more than trick-or-treaters this spooky season with these 5 wicked Website Security tips. . 1 – Make a horcrux ( aka backup your data) –. In Harry Potter, a horcrux lets wizards store a fragment of their soul in different objects as a safeguard against death. Similarly, a backup can restore your site to life after it’s compromised by a cyber attack.

Backups 114
article thumbnail

NYT Journalist’s iPhone infected twice with NSO Group’sPegasus spyware

Security Affairs

Threat actors infected the iPhone of New York Times journalist Ben Hubbard with NSO Group’s Pegasus spyware between June 2018 to June 2021. The iPhone of New York Times journalist Ben Hubbard was repeatedly infected with NSO Group’s Pegasus spyware. The device was compromised two times, in July 2020 and June 2021. The attacks were documented by the Citizen Lab research team from the University of Toronto, the infections took place while the journalist was wording on a book about Saud

Spyware 110
article thumbnail

Millions of Android users targeted in subscription fraud campaign

Bleeping Computer

A new SMS scam campaign relying upon 151 apps has been uncovered, with many of these apps managing to find their way into the Play Store where they amassed 10.5 million downloads. [.].

Scams 109
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

A critical RCE flaw affects Discourse software, patch it now!

Security Affairs

US CISA urges administrators to address a critical remote code execution flaw, tracked as CVE-2021-41163, in Discourse installs. Discourse is a popular open-source Internet forum and mailing list management software application. The US CISA published a security advisory to urge administrators to fix a critical remote code execution flaw, tracked as CVE-2021-41163 , in Discourse installs.

Software 106
article thumbnail

What To Expect in a Ransomware Negotiation

Trend Micro

We wanted to get a better understanding of what victims go through during the aftermath and recovery process of a ransomware attack to help others in case they find themselves in a similar situation. To do this, we analyzed victim support chats for five ransomware families.

article thumbnail

Microsoft Warns of Continued Supply-Chain Attacks by the Nobelium Hacker Group

The Hacker News

Nobelium, the threat actor behind the SolarWinds compromise in December 2020, has been behind a new wave of attacks that compromised 14 downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations, illustrating the adversary's continuing interest in targeting the supply chain via the "compromise-one-to-compromise-many"

98
article thumbnail

South Korean telco KT suffers nationwide outage after routing error

Bleeping Computer

The second-largest telecommunications provider in South Korea, KT Corporation, has suffered a nationwide outage today, leaving all its 16.5 million customers without internet connectivity and telephony services for about 40 minutes. [.].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.