Sat.May 08, 2021

article thumbnail

OT and IoT Security: Adopt a Post-Breach Mindset Today

Security Boulevard

Every time there’s a cyberattack like the recent ransomware targeting Colonial Pipeline, industry experts scramble to share thoughts on what could have been done to thwart it, or what the impact of a breach could be. Organizations need to reset themselves to have a post-breach mindset, pre-breach. The post OT and IoT Security: Adopt a Post-Breach Mindset Today appeared first on Nozomi Networks.

IoT 145
article thumbnail

Largest U.S. pipeline shuts down operations after ransomware attack

Bleeping Computer

Colonial Pipeline, the largest fuel pipeline in the United States, has shut down operations after suffering what is reported to be a ransomware attack. [.].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware attack leads to shutdown of major U.S. pipeline system

Security Boulevard

By: David E. Sanger A cyberattack forced the shutdown of one of the largest pipelines in the United States, in what appeared to be a significant attempt to disrupt vulnerable energy infrastructure. The pipeline carries refined gasoline and jet fuel up the East Coast from Texas to New York. The operator of the system, Colonial Pipeline, […]. The post Ransomware attack leads to shutdown of major U.S. pipeline system first appeared on SecurityOrb.com.

article thumbnail

A cyberattack shutdown US Colonial Pipeline

Security Affairs

A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline facility in Pelham, Alabama. The Colonial Pipeline facility in Pelham, Alabama was hit by a cybersecurity attack, its operators were forced to shut down its systems. The pipeline allows carrying 2.5 million barrels of refined gasoline and jet fuel each day up the East Coast from Texas to New York, it covers 45 percent of the East Coast’s fuel supplies. “The operator of the system,

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Tracking Company Says 96% of iPhone Users Block Tracking

Adam Shostack

So there’s some good news and some bad news in this story: Too Bad, Zuck: Just 4% of U.S. iPhone Users Let Apps Track Them After iOS Update. The good news is that, given a choice, 96% of Americans don’t accept targeted ads. I’m sure that the advertisers will accept that, move on, and not oppose new restrictions on intrusive practices.

Mobile 100
article thumbnail

Twitter scammers impersonate SNL in Elon Musk cryptocurrency scams

Bleeping Computer

Twitter scammers are jumping on Elon Musk's hosting of Saturday Night Live to push cryptocurrency scams to steal people's Bitcoin, Ethereum, and Dogecoin. [.].

More Trending

article thumbnail

Microsoft removes remaining Windows 10 Conexant update blocks

Bleeping Computer

Microsoft has addressed the last remaining known issues affecting Windows 10 computers with Conexant or Synaptics devices causing errors and issues when trying to update to Windows 10 versions 2004 or 20H2. [.].

132
132
article thumbnail

Major U.S. Pipeline Crippled in Ransomware Attack

Threatpost

Colonial Pipeline Company says it is the victim of a cyberattack that forced the major provider of liquid fuels to the East Coast to temporarily halted all pipeline operations.

article thumbnail

Microsoft pulls Windows 10 AMD driver causing PCs not to boot

Bleeping Computer

Microsoft has pulled an AMD driver from Windows Update after numerous people reported that it prevents Windows 10 from starting and displays an "INACCESSIBLE BOOT DEVICE" error. [.].

127
127
article thumbnail

The Colonial Pipeline Hack Is a New Extreme for Ransomware

WIRED Threat Level

An attack has crippled the company’s operations—and cut off a large portion of the East Coast’s fuel supply—in an ominous development for critical infrastructure.

Hacking 115
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Ransomware gangs have leaked the stolen data of 2,100 companies so far

Bleeping Computer

Since 2019, ransomware gangs have leaked the stolen data for 2,103 companies on dark web data leaks sites. [.].

article thumbnail

Facebook Will Limit Your WhatsApp Features For Not Accepting Privacy Policy

The Hacker News

WhatsApp on Friday disclosed that it won't deactivate accounts of users who don't accept its new privacy policy rolling out on May 15, adding it will continue to keep reminding them to accept the new terms. "No one will have their accounts deleted or lose functionality of WhatsApp on May 15 because of this update," the Facebook-owned messaging service said in a statement.

article thumbnail

Microsoft removes last remaining Windows 10 upgrade blocks

Bleeping Computer

Microsoft has addressed the last remaining known issues affecting Windows 10 computers with Conexant or Synaptics devices causing errors and issues when trying to update to Windows 10 versions 2004 or 20H2. [.].

111
111
article thumbnail

XKCD ‘Vaccinated’

Security Boulevard

via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink. The post XKCD ‘Vaccinated’ appeared first on Security Boulevard.

109
109
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Microsoft warns of a large-scale BEC campaign to make gift card scam

Security Affairs

Microsoft is warning of a large-scale BEC campaign that targeted hundreds of organizations leveraging typo-squatted domains registered days before the attacks. Business email compromise (BEC) attacks represent a serious threat for organizations worldwide, according to the annual report released by FBI’s Internet Crime Complaint Center , the 2020 Internet Crime Report , in 2020, the IC3 received 19,369 Business Email Compromise (BEC)/Email Account Compromise (EAC) complaints.

Scams 94
article thumbnail

CPDP 2021 – Moderator: Marcus Michaelsen ‘Social Media Monitoring And Movement Tracking Of Political Dissidents: The End Of Political Asylum In The EU?’

Security Boulevard

Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Marcus Michaelsen ‘Social Media Monitoring And Movement Tracking Of Political Dissidents: The End Of Political Asylum In The EU?

Media 98
article thumbnail

How to control Spotify while playing a game in Windows 10

Bleeping Computer

While playing a game, you may want to listen to your playlist rather than the in-game music to get the most out of your gaming experience. Unfortunately, it can be a pain to alt-tab out of the game to control your music. [.].

article thumbnail

ISPs Funded 8.5 Million Fake Comments Opposing Net Neutrality

WIRED Threat Level

The secret campaign, backed by major broadband companies, used real people’s names without their consent.

98
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Security News In Review: PyInstaller, Cloud Frameworks, and Scripps (Oh My)

Security Boulevard

This week, cloud security gets an upgrade, large companies take responsibility for past mistakes, and threat actors come up with admittedly innovative ways to steal your data. Keep reading to learn more about this week’s top cybersecurity news. . The post Security News In Review: PyInstaller, Cloud Frameworks, and Scripps (Oh My) appeared first on Security Boulevard.

article thumbnail

Microsoft Will Soon Kill Flash on Windows 10 for Good

WIRED Threat Level

Plus: A Peloton data leak, Russian hacker details, and more of the week’s top security news.

87
article thumbnail

CPDP 2021 – Moderator: Eduard Fosch-Villaronga ‘Artountability: Accountability, Ai And Art’

Security Boulevard

Speakers: Maranke Wieringa, Lucas Evers, Fiona McDermott, Piera Riccio, Vincent Rioux. Our sincere thanks to CPDP 2021 - Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization's YouTube channel. Enjoy! Permalink. The post CPDP 2021 – Moderator: Eduard Fosch-Villaronga ‘Artountability: Accountability, Ai And Art’ appeared first on Security Boulevard.

article thumbnail

Here’s How International Application Security Market Is Expected To Grow This Decade

CyberSecurity Insiders

A report from Research Dive has revealed that the international application security market is expected to grow by $9.77 billion during 2020-2027, with a compound annual growth rate of 16.1%. The rise in cyber attacks is the main factor that will drive the growth of the cybersecurity market. . Another factor is the increased dependency on secure data transfer due to the situation created by the COVID-19 crisis.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack.

Security Boulevard

Initial reports indicate that European criminal gang DarkSide undertook the attack against Colonial Pipeline, taking 5,500 miles of pipeline off-line and stopping the distribution of 100 million gallons of fuel per day. The post Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack. appeared first on Security Boulevard.