Mon.Dec 21, 2020

article thumbnail

Cellebrite Can Break Signal

Schneier on Security

Cellebrite announced that it can break Signal. (Note that the company has heavily edited its blog post, but the original — with lots of technical details — was saved by the Wayback Machine.). News article. Slashdot post. The whole story is puzzling. Cellebrite’s details will make it easier for the Signal developers to patch the vulnerability.

article thumbnail

Top 5 tech skills to master in 2021

Tech Republic Security

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

217
217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SUPERNOVA, a Backdoor Found While Investigating SolarWinds Hack

Security Affairs

While investigating the recent SolarWinds Orion supply-chain attack security researchers discovered another backdoor, tracked SUPERNOVA. The investigation of the SolarWinds Orion supply-chain attack revealed the existence of another backdoor that was likely used by a separate threat actor.

Hacking 145
article thumbnail

6 modern data stack trends to look for in 2021

Tech Republic Security

TechRepublic spoke with dozens of experts who said the influx of companies interested in doing more with their data is only increasing.

213
213
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

VMware and Cisco also impacted by the SolarWinds hack

Security Affairs

The IT giants VMware and Cisco revealed they were impacted by the recently disclosed SolarWinds supply chain attack. VMware and Cisco confirmed to have been both impacted by the recent SolarWinds hack. A recent advisory published by the NSA is warning that Russian state-sponsored hackers are exploiting the recently patched CVE-2020-4006 VMware flaw to steal sensitive information from their targets.

Hacking 143
article thumbnail

Don't let miscommunication lead to lapses in cybersecurity

Tech Republic Security

With cybersecurity issues, it's especially important that users understand the information provided by IT and leadership. Here are tips on dealing with the "curse of knowledge.

More Trending

article thumbnail

Cybersecurity pros: Are humans really the weakest link?

Tech Republic Security

Some experts argue that users might actually be the most vital link when it comes to certain types of cyberattacks.

article thumbnail

Zero-day exploit used to hack iPhones of Al Jazeera employees

Security Affairs

Tens of Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack their iPhones. Researchers from Citizen Lab reported that at least 36 Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack their iPhones. The attackers used an exploit chain named Kismet that was part of the arsenal of the controversial Pegasus spyware that is sold by the surveillance firm NSO Gr

Hacking 128
article thumbnail

The 5 tech skills should you master in 2021

Tech Republic Security

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year.

147
147
article thumbnail

Dell Wyse ThinOS flaws allow hacking think clients

Security Affairs

Multiple Dell Wyse thin client models are affected by critical vulnerabilities that could be exploited by a remote attacker to take over the devices. Critical vulnerabilities tracked as CVE-2020-29492 and CVE-2020-29491 affect several Dell Wyse thin client models that could be exploited by a remote attacker to execute malicious code and gain access to arbitrary files.

Hacking 102
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

The State of Security

Every website on the Internet is somewhat vulnerable to security attacks. The threats range from human errors to sophisticated attacks by coordinated cyber criminals. According to the Data Breach Investigations Report by Verizon, the primary motivation for cyber attackers is financial. Whether you run an eCommerce project or a simple small business website, the risk […]… Read More.

article thumbnail

Clop ransomware gang paralyzed flavor and fragrance producer Symrise

Security Affairs

Flavor and fragrance producer Symrise is the last victim of the Clop ransomware gang that claims to have stolen 500 GB of unencrypted files. Symrise AG, a major producer of flavours and fragrances, was hit by Clop ransomware operators. The threat actors claim to have stolen 500 GB of unencrypted files. The attack was reported last week by Handelsblatt , the website databreaches.net also reported the news after @Chum1ng0 alerted them. .

article thumbnail

A Christmas 2020 Review: Confronting and controlling insider threats

Digital Shadows

As the holidays rapidly approach, our halls are decked with images of Santa Claus. Kids are told stories of his. The post A Christmas 2020 Review: Confronting and controlling insider threats first appeared on Digital Shadows.

98
article thumbnail

How Oversharing About Your Kids on Social Media Can Lead to Identity Theft

Identity IQ

Every day, criminals scour the internet for personal information they can use to commit fraud and identity theft. In this digital age, individuals need to take steps to protect their privacy and information from fraudsters. This is as true for children as it is for adults, as kids can be victims of identity theft well before they reach adulthood. Social media can be a valuable trove of information for identity thieves looking to assume the identity of children.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Fixing CRLF Injection Logging Issues in Python

Veracode Security

It can sometimes be a little challenging to figure out specifically how to address different vulnerability classes in Python. This article addresses one of the top finding categories found in Python, CWE 117 (also known as CRLF Injection), and shows how to use a custom log formatter to address the issue. We???ll use this project , which deactivates or deletes user accounts from the Veracode platform, to illustrate the functionality.

article thumbnail

Cybersecurity Advent calendar: Stay aware, stay safe!

We Live Security

When it comes to holiday gifts, surprise and wonder are always welcome. When it comes to protecting your security, however, you don’t want to leave anything to chance. The post Cybersecurity Advent calendar: Stay aware, stay safe! appeared first on WeLiveSecurity.

article thumbnail

How to Protect Your Kid’s Privacy While At-Home Learning

Trend Micro

Many kids now have school-supplied computer equipment away from the school network. However, with this come privacy and security concerns. Some are easy to avoid, but others need some modifications to ensure safety.

article thumbnail

Smart Doorbell Disaster: Many Brands Vulnerable to Attack

Threatpost

Investigation reveals device sector is problem plagued when it comes to security bugs.

IoT 136
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

NSA, CISA Warn of Attacks on Federated Authentication

Dark Reading

While incident responders focus on attacks using SolarWinds Orion, government cyber defenders highlight other methods likely being used as well.

article thumbnail

Dark Web Pricing Skyrockets for Microsoft RDP Servers, Payment-Card Data

Threatpost

Underground marketplace pricing on RDP server access, compromised payment card data and DDoS-For-Hire services are surging.

DDOS 109
article thumbnail

What Is Containerization, and What Does Penetration Testing Have to Do with It?

CompTIA on Cybersecurity

While containers should help increase your security profile, that doesn’t mean it doesn’t need any extra attention. Cybersecurity isn’t just the garnish on the container, it’s an essential ingredient.

article thumbnail

Cisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report

Dark Reading

The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.

Software 139
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Hacker Dumps Crypto Wallet Customer Data; Active Attacks Follow

Threatpost

Customer data from a June attack against cryptocurrency wallet firm Ledger is now public and actively being used in attacks.

article thumbnail

7 Infamous Moments in Adobe Flash's Security History

Dark Reading

End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.

Software 130
article thumbnail

Simplifying Proactive Defense With Threat Playbooks

Threatpost

FortiGuard Labs’ Derek Manky talks about how threat playbooks can equip defense teams with the tools they need to fight back against evolving attacker TTPs.

article thumbnail

Continue Clean-up of Compromised SolarWinds Software

The State of Security

Last week, the United States Cybersecurity & Infrastructure Security Agency (CISA) advised on initial steps to take in response to the SolarWinds software that was compromised by advanced persistent threat actors. While federal agencies were under a deadline to complete certain actions, this issue will require continued clean-up and longer-term efforts to mitigate the threat. […]… Read More.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Defending Against State and State-Sponsored Threat Actors

Threatpost

Saryu Nayyar of Gurucul discusses state and state-sponsored threat actors, the apex predators of the cybersecurity world.

article thumbnail

Managing Scans using PowerShell and the Acunetix API

Acunetix

In the previous installment of this series, we have shown you how to manage Acunetix scans using Bash and the Acunetix API. In this article, you will learn how to do the same using PowerShell. As an example, we will create a PowerShell V7 script. Read more. The post Managing Scans using PowerShell and the Acunetix API appeared first on Acunetix.

75
article thumbnail

Zero-Click Apple Zero-Day Uncovered in Pegasus Spy Attack

Threatpost

The phones of 36 journalists were infected by four APTs, possibly linked to Saudi Arabia or the UAE.

article thumbnail

QUO, QUO, QUO! Merry Christmas….

Digital Shadows

On the first day of Christmas my true love sent to me an index of the dark web for free…. The post QUO, QUO, QUO! Merry Christmas…. first appeared on Digital Shadows.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.