Fri.Feb 05, 2021

article thumbnail

DDoS-for-hire services are exploiting Plex Media flaw to amplify their attacks

Tech Republic Security

Attackers are taking advantage of a security flaw in the way Plex Media servers look for compatible media devices and streaming clients, says Netscout.

Media 185
article thumbnail

Barcode Scanner app on Google Play infects 10 million users with one update

Malwarebytes

Late last December we started getting a distress call from our forum patrons. Patrons were experiencing ads that were opening via their default browser out of nowhere. The odd part is none of them had recently installed any apps, and the apps they had installed came from the Google Play store. Then one patron, who goes by username Anon00, discovered that it was coming from a long-time installed app, Barcode Scanner.

Adware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fake WhatsApp app may have been built to spy on iPhone users – what you need to know

Hot for Security

A fake version of the WhatsApp messaging app is suspected of being created by an Italian spyware company to snoop upon individuals and steal sensitive data. Read more in my article on the Hot for Security blog.

Spyware 145
article thumbnail

Russian hackers were interested in Microsoft Products

CyberSecurity Insiders

The SolarWinds Cyber Attack seems to be like a never-ending saga as daily a new revelation is being made by US Department of Homeland Security. Now, the latest find is that the hacking group suspected to be from Russia is reported to be only interested in Microsoft Corporation products and services. Brandon Wales, the director of DHS Cybersecurity and Infrastructure Security Agency, has confirmed the news and stated that the hacking operation was massive and could have been launched with a long-

Hacking 145
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Android emulator abused to introduce malware onto PCs

Malwarebytes

Emulators have played a part in many tech-savvy users’ lives. They introduce a level of flexibility that not only allows another system to run on top of a user’s operating system—a Windows OS running on a MacBook laptop, for example—but also allows video gamers to play games designed to work on a different platform than the one they own. Recently, ESET revealed a campaign that targeted users of NoxPlayer, a popular Android emulator for PCs and Macs.

Malware 142
article thumbnail

Microsoft warns of increasing OAuth Office 365 phishing attacks

Bleeping Computer

Microsoft has warned of an increasing number of consent phishing (aka OAuth phishing) attacks targeting remote workers during recent months, BleepingComputer has learned. [.].

Phishing 141

More Trending

article thumbnail

The Week in Ransomware - February 5th 2021 - Data destruction

Bleeping Computer

This week we saw a few large scale attacks and various ransomware reports indicating ransom payments are falling, while attacks are increasingly destroying data permanently. The good news is a new ransomware decryptor was released, allowing victims to recover files for free. [.].

article thumbnail

Launching OSV - Better vulnerability triage for open source

Google Security

Posted by Oliver Chang and Kim Lewandowski, Google Security Team We are excited to launch OSV (Open Source Vulnerabilities), our first step towards improving vulnerability triage for developers and consumers of open source software. The goal of OSV is to provide precise data on where a vulnerability was introduced and where it got fixed, thereby helping consumers of open source software accurately identify if they are impacted and then make security fixes as quickly as possible.

Software 133
article thumbnail

Windows 10 April updates remove Microsoft Edge Legacy permanently

Bleeping Computer

Microsoft has announced today that Microsoft Edge Legacy will be permanently removed and replaced with the new Microsoft Edge after installing April's Windows 10 Patch Tuesday security update. [.].

Software 133
article thumbnail

Five worthy reads: The future of work in a post-COVID world

Security Boulevard

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the changing face of work in the wake of the COVID-19 pandemic and the vaccine …. The post Five worthy reads: The future of work in a post-COVID world appeared first on ManageEngine Blog. The post Five worthy reads: The future of work in a post-COVID world appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Malicious extension abuses Chrome sync to steal users’ data

Bleeping Computer

The Google Chrome Sync feature can be abused by threat actors to harvest information from compromised computers using maliciously-crafted Chrome browser extensions. [.].

135
135
article thumbnail

Cybercriminals Now Using Plex Media Servers to Amplify DDoS Attacks

The Hacker News

A new distributed denial-of-service attack (DDoS) vector has ensnared Plex Media Server systems to amplify malicious traffic against targets to take them offline.

DDOS 127
article thumbnail

SitePoint discloses data breach after stolen info used in attacks

Bleeping Computer

The SitePoint web professional community has disclosed a data breach after their user database was sold and eventually leaked for free on a hacker forum. [.].

article thumbnail

ThreatStack Brings Security Observability to AWS EC2

Security Boulevard

ThreatStack announced this week that it has integrated its observability platform for tracking cybersecurity events with the EC2 cloud service from Amazon Web Services (AWS). Chris Ford, vice president of product for ThreatStack, said the company’s namesake platform for tracking security events can now consume metadata collected from EC2 by deploying an instance of its.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Medical Researcher to Serve 30 Months in Federal Prison for Conspiring to Sell Trade Secrets to China

Hot for Security

A former medical researcher at the Ohio-based Nationwide Children’s Hospital was sentenced to 30 months in federal prison after conspiring to steal and sell trade secrets to China, according to the US Department of Justice (DOJ). 47-year old Li Chen pleaded guilty in July 2020 to stealing scientific research while working at one of the largest freestanding pediatric research centers in the US.

article thumbnail

Critical Flaws Reported in Cisco VPN Routers for Businesses—Patch ASAP

The Hacker News

Cisco has rolled out fixes for multiple critical vulnerabilities in the web-based management interface of Small Business routers that could potentially allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. The flaws — tracked from CVE-2021-1289 through CVE-2021-1295 (CVSS score 9.

VPN 117
article thumbnail

Spotify Hit with a Credential Studding Attack with Data from Another Breach

Hot for Security

A security researcher has discovered that Spotify has fallen victim to a credential stuffing attack that used data from more than 100,000 accounts. Unlike the previous incident involving Spotify a few months ago, the latest attack is not due to a security breach. This time, bad actors tried to use a malicious Spotify logger database in a credential stuffing attack on Spotify.

Passwords 116
article thumbnail

ADDRESSING THE HUMAN ELEMENT OF SECURITY: AWARENESS & TRAINING PROGRAMS

CyberSecurity Insiders

This post was originally published by (ISC)Management. Did you ever hear the story about the hyphen that cost 80 Million dollars ? In the infancy of the United States’ space program, a programming error resulted in a forced abort of a rocket early in its flight to prevent possible injury along its crash path. Or how about the time a pilot miscalculated the required fuel for a flight from Montreal to Edmonton?

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Asset Tracking Software: What Is It and How Does It Work?

Heimadal Security

Keeping a record of your company’s inventory is essential for the digital and financial well-being of your business. Knowing where your resources are located is not only good for your budget but your cybersecurity strategy as well. Asset tracking software can help you with that. But what is asset tracking software? How does it work? […]. The post Asset Tracking Software: What Is It and How Does It Work?

Software 113
article thumbnail

Eletrobras, Copel energy companies hit by ransomware attacks

Bleeping Computer

Centrais Eletricas Brasileiras (Eletrobras) and Companhia Paranaense de Energia (Copel), two major electric utilities companies in Brazil have announced that they suffered ransomware attacks over the past week. [.].

article thumbnail

Google Firebase hosts Microsoft Office phishing attack

SC Magazine

A phishing attack recently uncovered by researchers pretends to share information about an electronic funds transfer (EFT) by offering up a link to download an HTML invoice that then loads to a page with Microsoft Office branding that’s hosted on Google Firebase. The attack culminates with a final phishing page that looks to extract a victim’s Microsoft login credentials, alternate email address, and phone number, Armorblox researchers wrote in a blog post.

Phishing 112
article thumbnail

CISO’s Guide to Secure Software Development

Security Boulevard

To better protect personal data and ensure information security, organizations should be taking advantage of vulnerability assessments and measuring against application security benchmarks. These application security validations and certifications ensure your applications comply with fundamental security specifications, including safe programming, organized design structure and secure operations.

Software 111
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Mortgage loan servicing company discloses ransomware attack to multiple states

SC Magazine

Mortgage loan servicing company SN Servicing Corporation notified at least two states in recent weeks of a ransomware attack on its systems. Filings submitted to the California and Vermont state attorneys general disclosed that the company was hit by ransomware attacks on or around Oct. 15, 2020. According to the documents, upon learning of the incident, SN “immediately locked down affected systems and engaged a third party team of forensic experts to determine the impact on our borrowers.”.

article thumbnail

3 ways to speak the board's language around cyber risk

CSO Magazine

The days of a hopeless disconnect between security leaders and the board of directors have come to a close—at least for enterprises with a healthy risk posture. Digitally savvy or not, in today’s business environment, board directors largely recognize they need an understanding of how cybersecurity risk overlaps with enterprise risk and the board’s overarching governance responsibilities, and they at least need to be conversant in cyber risk and how it could impact the organization—financially,

article thumbnail

Stormshield source code accessed by hackers in Cyber Attack

CyberSecurity Insiders

Stormshield, a France-based Cybersecurity firm, has revealed that hackers launched a cyber attack recently to steal its source code. And to a certain extent they reportedly accessed some sensitive content that was only meant to be used by customers or partners. Highly placed sources say that the incident took place in December 2020 when the threat actors took control of Stormshield Network Security(SNS) and Network Security Industrial Firewall Products that was meant to be accessed by customers

article thumbnail

Google Chrome Zero-Day Afflicts Windows, Mac Users

Threatpost

Google warns of a zero-day vulnerability in the V8 open-source engine that's being actively exploited by attackers.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Fortinet addresses 4 vulnerabilities in FortiWeb web application firewalls

Security Affairs

Security vendor Fortinet has addressed four vulnerabilities in FortiWeb web application firewalls, including a Remote Code Execution flaw. Fortinet has addressed four vulnerabilities in FortiWeb web application firewalls that were reported by Positive Technologies expert Andrey Medov. . 4 XSS in FortiWeb (CVE-2021-22122), found by Andrey Medov, have been patched.

Firewall 105
article thumbnail

Google Chrome sync feature can be abused for C&C and data exfiltration

Zero Day

A security researcher has found a malicious Chrome extension in the wild abusing the Chrome Sync process.

135
135
article thumbnail

Forward Air Corporation says that December Ransomware attack caused a loss of $7.5M

Security Affairs

Trucking and freight transportation logistics giant Forward Air Corporation said a December 2020 ransomware attack had $7.5M Impact. Trucking and freight transportation logistics giant Forward Air Corporation announced that the ransomware attack that hit the company in December will impact its fourth-quarter financial results. This week the company filed a FORM 8-K with SEC that revealed that the ransomware attack that took place in December impacted that infected its systems caused service del

article thumbnail

16+ Best Free Online Virus Scanners And Removers For 2021

SecureBlitz

Malware remains the most significant online threat that poses enormous threats to computers, especially when connected to the internet. This has led to the development of several anti-malware tools, including online virus scanners. Compared with the conventional offline antivirus engine, online virus removers are cloud-based. Hence, they do not use up system resources; neither do.

Antivirus 100
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.