Fri.Aug 25, 2023

article thumbnail

Kroll Employee SIM-Swapped for Crypto Investor Data

Krebs on Security

Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user information for multiple cryptocurrency platforms that are relying on Kroll services in their ongoing bankruptcy proceedings. And there are indications that fraudsters may already be exploiting the stolen data in phishing attacks.

Mobile 244
article thumbnail

Hacking Food Labeling Laws

Schneier on Security

This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to ensure that they are not effective. There are the typical high-pressure lobbying tactics and lawsuits. But there’s also examples of companies hacking the laws: Companies like Coca-Cola and Kraft Heinz have begun designing their products so that their packages don’t have a true front or back, but rather two nearly identical labels—except for the fact that only

Hacking 236
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

XLoader Malware Variant Targets MacOS Disguised as OfficeNote App

Tech Republic Security

A new variant of malware called XLoader is targeting macOS users. Learn more about how to protect yourself from this malicious software.

Malware 148
article thumbnail

Smart lightbulb and app vulnerability puts your Wi-Fi password at risk

Malwarebytes

New research highlights another potential danger from IoT devices, with a popular make of smart light bulbs placing your Wi-Fi network password at risk. Researchers from the University of London and Universita di Catania produced a paper explaining the dangers of common IoT products. In this case, how smart bulbs can be compromised to gain access to your home or office network.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses

Tech Republic Security

The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in the U.K. and the U.S.

Malware 148
article thumbnail

Whiffy Recon malware triangulates the position of infected systems via Wi-Fi

Security Affairs

Experts observed the SmokeLoader malware delivering a new Wi-Fi scanning malware strain dubbed Whiffy Recon. Secureworks Counter Threat Unit (CTU) researchers observed the Smoke Loader botnet dropping a new Wi-Fi scanning malware named Whiffy Recon. The malicious code triangulates the positions of the infected systems using nearby Wi-Fi access points as a data point for Google’s geolocation API. “The scan results are mapped to a JSON structure (see Figure 5) that is sent to the Googl

Malware 98

LifeWorks

More Trending

article thumbnail

The 3 Malware Loaders Behind 80% of Incidents

Digital Shadows

Loader malware is working behind the scenes in many organizations' environments, doing the heavy lifting that helps an infection spread. ReliaQuest has picked out the most commonly observed loaders and outlined why SOC analysts should worry about them, plus how to defend against them.

Malware 98
article thumbnail

China-linked Flax Typhoon APT targets Taiwan

Security Affairs

China-linked APT group Flax Typhoon targeted dozens of organizations in Taiwan as part of a suspected espionage campaign. Microsoft linked the Chinese APT Flax Typhoon (aka Ethereal Panda) to a cyber espionage campaign that targeted dozens of organizations in Taiwan. The researchers observed Flax Typhoon gaining and maintaining long-term access to Taiwanese organizations’ networks with minimal use of malware.

VPN 98
article thumbnail

API Abuse – Lessons from the Duolingo Data Scraping Attack

Security Boulevard

It’s been reported that 2.6 million user records sourced from the Duolingo app are for sale. The attacker apparently obtained them from an open API provided by the company. There’s a more technical explanation available here. While we talk a lot about the vulnerabilities in the OWASP API Top-10 and the exploits associated with those [.] The post API Abuse – Lessons from the Duolingo Data Scraping Attack appeared first on Wallarm.

98
article thumbnail

EPSS and Its Role in Cisco Vulnerability Management Risk Scoring

Cisco Security

In our March 2023 blog, “What is EPSS and Why Does It Matter?” , Michael Roytman, Distinguished Engineer at Cisco (former Chief Data Scientist at Kenna Security) and co-creator of EPSS, covers the role the Exploit Prediction Scoring System (EPSS) plays in a security program. To sum it up, EPSS enables practitioners to have a defensible way to forecast how likely a newly published vulnerability is to become exploited before attackers have a chance to build new ransomware or exploits.

Risk 98
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Lockbit leak, research opportunities on tools leaked from TAs

SecureList

Lockbit is one of the most prevalent ransomware strains. It comes with an affiliate ransomware-as-a-service (RaaS) program offering up to 80% of the ransom demand to participants, and includes a bug bounty program for those who detect and report vulnerabilities that allow files to be decrypted without paying the ransom. According to the Lockbit owners, the namesake cybercriminal group, there have been bounty payments of up to 50 thousand dollars.

article thumbnail

How To Prepare For A Cyber Assessment

SecureBlitz

Learn how to prepare for a cyber assessment in this post. Cybersecurity assessments are more important than ever in today's rapidly evolving digital landscape. These assessments are designed to uncover vulnerabilities and help organizations strengthen their cyber defenses. This article offers guidance on how to prepare for a cyber assessment, ensuring that your business remains […] The post How To Prepare For A Cyber Assessment appeared first on SecureBlitz Cybersecurity.

article thumbnail

How to Choose the Best XDR Solution for Your Organization?

Heimadal Security

The fact that malicious software gets smarter and more sophisticated every day that goes by is no news to any IT professional. Add the fact that the attack surface continues to expand as our lives get highly connected to the Internet, and you have the perfect storm. Cybersecurity experts’ first response – to get more […] The post How to Choose the Best XDR Solution for Your Organization?

article thumbnail

How End-to-End Encryption Works: Securing Digital Modes of Communication

GlobalSign

Uncover the secrets of end-to-end encryption, including how to keep your digital conversations secure. Powerful technology safeguards your messages & data.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

What Is a Host Intrusion Detection System (HIDS) and How It Works

Heimadal Security

HIDS stands for host-based intrusion detection system and is an application that monitors a computer or network for suspicious activities. The monitored activities can include external actors` intrusions and also internal misuse of resources or data. A host intrusion detection system’s job is to look for suspicious activities or unusual patterns that could result in […] The post What Is a Host Intrusion Detection System (HIDS) and How It Works appeared first on Heimdal Security Blog.

article thumbnail

Update now! Google Chrome's first weekly update has arrived

Malwarebytes

Google has published details about the first weekly update for the Chrome browser. Recently Google announced that it would start shipping weekly security updates for the Stable channel (the version most of us use). Regular Chrome releases will still come every four weeks, but to get security fixes out faster, updates to address security and other high impact bugs will be scheduled weekly.

article thumbnail

How Does XDR Software Help Security Teams

Heimadal Security

XDR software collects and processes data from various security layers, networks, and endpoints in an organization`s IT environment. It is a fast and accurate tool that helps security teams detect and respond faster to cyber threats wherever they might be located: endpoints, networks, or the cloud. In a more and more complex threat landscape, XDR […] The post How Does XDR Software Help Security Teams appeared first on Heimdal Security Blog.

article thumbnail

Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack

The Hacker News

Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees fell victim to a "highly sophisticated" SIM swapping attack. The incident, which took place on August 19, 2023, targeted the employee's T-Mobile account, the company said.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

XDR Security for MSSPs

Heimadal Security

Given the complexity of today’s digital environment, organizations, especially Small and Medium-sized Enterprises (SMEs), are learning that maintaining a robust security posture is a top priority and are turning to Managed Security Service Providers (MSSPs) to help them secure their critical assets. Smaller businesses frequently struggle with limited resources and a lack of technical expertise, […] The post XDR Security for MSSPs appeared first on Heimdal Security Blog.

98
article thumbnail

Navigating Legacy Infrastructure: A CISO's Actionable Strategy for Success

The Hacker News

Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often under various leadership teams with different priorities and goals. As those technologies age, they can leave your organization vulnerable to cyber threats.

CISO 97
article thumbnail

Teenage members of Lapsus$ ransomware gang convicted

Malwarebytes

A wave of video game developer compromises has come to a court-based conclusion for those responsible , with several convictions the end result. Arion Kurtaj, and a second teen who cannot be named due to their age, are finding themselves to be in quite a lot of trouble after repeated and sustained attacks on multiple businesses. The infamous Lapsus$ ransomware gang gained notoriety for a number of attacks against companies involved in game development, or companies closely associated with gaming

article thumbnail

Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches

The Hacker News

The U.S. Federal Bureau of Investigation (FBI) is warning that Barracuda Networks Email Security Gateway (ESG) appliances patched against a recently disclosed critical flaw continue to be at risk of potential compromise from suspected Chinese hacking groups.

Hacking 97
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The 12 Best Endpoint Security Software Solutions and Tools [2023]

Heimadal Security

Choosing the right endpoint security software can feel overwhelming, especially in a market valued at 13.4 billion U.S. dollars in 2023 and expected to grow to 29 billion U.S. dollars by 2027 (Statista). Organizations worldwide turn to endpoint security solutions to safeguard their valuable digital assets, and critical data, while making sure they can run […] The post The 12 Best Endpoint Security Software Solutions and Tools [2023] appeared first on Heimdal Security Blog.

article thumbnail

Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks

The Hacker News

Two U.K. teenagers have been convicted by a jury in London for being part of the notorious LAPSUS$ (aka Slippy Spider) transnational gang and for orchestrating a series of brazen, high-profile hacks against major tech firms and demanding a ransom in exchange for not leaking the stolen information.

Hacking 95
article thumbnail

'Whiffy Recon' Malware Transmits Device Location Every 60 Seconds

Dark Reading

Deployed by the infamous SmokeLoader botnet, the location-tracking malware could be used for a host of follow-on cyberattacks or even physical targeting.

Malware 91
article thumbnail

China-Linked Flax Typhoon Cyber Espionage Targets Taiwan's Key Sectors

The Hacker News

A nation-state activity group originating from China has been linked to cyber attacks on dozens of organizations in Taiwan as part of a suspected espionage campaign. The Microsoft Threat Intelligence team is tracking the activity under the name Flax Typhoon, which is also known as Ethereal Panda.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns

Dark Reading

The cyber-espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear.

89
article thumbnail

Data breach at French govt agency exposes info of 10 million people

Bleeping Computer

Pôle emploi, France's governmental unemployment registration and financial aid agency, is informing of a data breach that exposed data belonging to 10 million individuals. [.

article thumbnail

Luna Grabber Malware Targets Roblox Gaming Devs

Dark Reading

Roblox gaming developers are lured in by a package that claims to create useful scripts to interact with the Roblox website, for example by “promot(ing) users, shout events, and so on, or to create Discord utiltiies (sic) to manage their community.

Malware 82
article thumbnail

Kroll data breach exposes info of FTX, BlockFi, Genesis creditors

Bleeping Computer

Multiple reports on social media warn of a data breach at financial and risk advisory company Kroll that resulted in exposing to an unauthorized third-party the personal data of some credit claimants. [.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!