Mon.Oct 19, 2020

article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. Related: Welcome to the CyberXchange Marketplace In the U.S. alone, in fact, there are more than 5,000 cybersecurity vendors. For organizations looking to improve their security posture, this is causing confusion and vendor fatigue, especially for companies that don’t have a full time Chief Information Security Officer.

eCommerce 234
article thumbnail

Why ransomware has become such a huge problem for businesses

Tech Republic Security

Ransomware has evolved into a significant threat for all types of organizations. How and why is it such a pervasive issue, and how can organizations better defend themselves against it?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fooling self-driving cars by displaying virtual objects

Security Affairs

Researchers from the Ben-Gurion University of the Negev demonstrated how to fool self-driving cars by displaying virtual objects. A group of researchers from the Ben-Gurion University of the Negev demonstrated that it is possible to fool self-driving cars by displaying virtual objects (phantoms). The experts define as phantom a depthless visual object used to deceive ADASs and cause these systems to perceive it as real.

article thumbnail

Microsoft now the most impersonated brand in phishing attacks

Tech Republic Security

Almost 20% of phishing campaigns last quarter spoofed Microsoft as many people continue to work remotely due to the coronavirus pandemic, says Check Point Research.

Phishing 215
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Hackers claim to have compromised 50,000 home cameras and posted footage online

Security Affairs

A hacker collective claims to have hacked over 50,000 home security cameras and published their footage online, some of them on adult sites. A group of hackers claims to have compromised over 50,000 home security cameras and published their private footage online. Some footages were published on adult sites, experts reported that crooks are offering lifetime access to the entire collection for US$150.

IoT 127
article thumbnail

State-sponsored hackers and ransomware gangs are diversifying tactics to inflict more harm

Tech Republic Security

The groups have been using off-the-shelf tooling and open source penetration testing tools at unprecedented scale, according to Accenture's 2020 Cyber Threatscape Report.

More Trending

article thumbnail

US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit

WIRED Threat Level

The Department of Justice has named and charged six men for allegedly carrying out many of the most costly cyberattacks in history.

Hacking 140
article thumbnail

Alexander Vinnik, the popular cyber criminal goes on trial in Paris

Security Affairs

The Russian citizen Alexander Vinnik goes on trial in Paris for having defrauded nearly 200 victims across the world of 135 million euros using ransomware. The Russian man Alexander Vinnik goes on trial in Paris for having defrauded nearly 200 victims across the world of 135M euros using ransomware. Alexander Vinnik allegedly headed the Bitcoin exchange BTC-e, he is charged with different hacking crimes in Russia, France, and the United States.

article thumbnail

7 Tips for Choosing Security Metrics That Matter

Dark Reading

Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

Risk 124
article thumbnail

GravityRAT malware also targets Android and macOS

Security Affairs

Researchers spotted new variants of the Windows GravityRAT spyware that now can also infect Android and macOS devices. Researchers from Kaspersky Lab have spotted new variants of the GravityRAT malware that now can be also used to infect Android and macOS devices. GravityRAT is a malware strain known for checking the CPU temperature of Windows computers to avoid being executed in sandboxes and virtual machines.

Malware 107
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Chart: The Pandemic Reprioritizes Security Projects

Dark Reading

Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.

105
105
article thumbnail

The forum of the popular Albion Online game was hacked

Security Affairs

Albion Online game maker discloses a data breach, hackers gained access to the company forum database by exploiting a known vulnerability. Albion Online (AO) is a free medieval fantasy MMORPG developed by Sandbox Interactive, a studio based in Berlin, Germany. A threat actor has breached the forum of Albion Online and stole usernames and password hashes from its database.

Hacking 102
article thumbnail

Microsoft: Most-Imitated Brand for Phishing Emails

Threatpost

The shift to remote working spurred Microsoft and Amazon to the top of the heap for cybercriminals to use as lures in the third quarter.

Phishing 117
article thumbnail

Cybersecurity, Here to Stay?

Trend Micro

I get asked why we can’t stop cybercrime with all the new technologies like artificial intelligence and machine learning that can detect in real-time new cyber threats. As I think about this, I always go back to the human factor and the fact that physical crime still hasn’t been wiped out. Physical crime has been around for a very long time, and we still need law enforcement to keep us safe from criminals who prey upon their victims.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Quarterly Update: Ransomware Trends in Q3

Digital Shadows

As we embark on the final months of 2020, ransomware has been the main topic of conversation once again. Throughout. The post Quarterly Update: Ransomware Trends in Q3 first appeared on Digital Shadows.

article thumbnail

Rapper Scams $1.2M in COVID-19 Relief, Gloats with ‘EDD’ Video

Threatpost

"Nuke Bizzle" faces 22 years in prison after brazenly bragging about an identity-theft campaign in his music video, "EDD.".

article thumbnail

Trickbot, Phishing, Ransomware & Elections

Dark Reading

The botnet has taken some hits lately, but that doesn't mean the threat is over. Here are some steps you can take to keep it from your door.

Phishing 108
article thumbnail

Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack

Threatpost

Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours.

Phishing 115
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

NSS Labs Shuttered

Dark Reading

The testing firm's website says it has 'ceased operations' as of Oct. 15.

143
143
article thumbnail

IoT Security and Privacy Labels, Like a Cereal Box

SecureWorld News

Every cereal box comes with a nutrition label, containing important information that lets you know exactly what you are eating. So why would something else important, such as your IoT devices, not provide the same relative information? Many consumers do not even consider the privacy and security of their IoT (Internet of Things) devices when making a purchase.

IoT 90
article thumbnail

Microsoft Exchange, Outlook Under Siege By APTs

Threatpost

A new threat report shows that APTs are switching up their tactics when exploiting Microsoft services like Exchange and OWA, in order to avoid detection.

article thumbnail

Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns

Dark Reading

US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.

109
109
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

GravityRAT Comes Back to Earth with Android, macOS Spyware

Threatpost

The espionage tool masquerades as legitimate applications and robs victims blind of their data.

Spyware 100
article thumbnail

A New Risk Vector: The Enterprise of Things

Dark Reading

Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.

Risk 93
article thumbnail

DOJ Charges 6 Sandworm APT Members in NotPetya Cyberattacks

Threatpost

DOJ charges six Russian nationals for their alleged part in the NotPetya, Ukraine power grid and Olympics cyberattacks.

84
article thumbnail

Microsoft Tops Q3 List of Most-Impersonated Brands

Dark Reading

The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Overlay Malware Targets Windows Users with a DLL Hijack Twist

Threatpost

Brazilians are warned of a new Vizom malware masquerading as video conferencing and browser software.

Malware 90
article thumbnail

IoT Vulnerability Disclosure Platform Launched

Dark Reading

VulnerableThings.com is intended to help vendors meet the terms of a host of new international IoT security laws and regulations.

IoT 94
article thumbnail

Your Next Move: Network Security Analyst

CompTIA on Cybersecurity

If you like to make sure everything is secure and want to monitor and prevent security breaches, then network security analyst could be for you.

article thumbnail

GravityRAT Spyware Targets Android & MacOS in India

Dark Reading

The Trojan once used in attacks against Windows systems has been transformed into a multiplatform tool targeting macOS and Android.

Spyware 92
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.