Tue.Jul 05, 2022

article thumbnail

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

Gathering intelligence has always been a key tool for organisational decision making – understanding the external operating environment is the ‘101’ for business. How can you grasp the challenges and opportunities for your company without a deep understanding of all the contributing factors that make the company tick? Related: We’re in the golden age of cyber espionage.

article thumbnail

Three dirty data cybersecurity concerns for business enterprises

Tech Republic Security

Dirty data not only leads to poor business decisions but can also pose some security concerns in organizations. Learn dirty data cybersecurity concerns enterprises may contend with. The post Three dirty data cybersecurity concerns for business enterprises appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New RedAlert Ransomware targets Windows, Linux VMware ESXi servers

Bleeping Computer

A new ransomware operation called RedAlert, or N13V, encrypts both Windows and Linux VMWare ESXi servers in attacks on corporate networks. [.].

article thumbnail

How to enable SSH 2FA on Ubuntu Server 22.04

Tech Republic Security

Jack Wallen walks you through the process of adding an extra layer of Secure Shell protection to your Ubuntu Servers, with the help of two-factor authentication. The post How to enable SSH 2FA on Ubuntu Server 22.04 appeared first on TechRepublic.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Update now! Chrome patches ANOTHER zero-day vulnerability

Malwarebytes

Google has released version 103.0.5060.114 for Chrome, now available in the Stable Desktop channel worldwide. The main goal of this new version is to patch CVE-2022-2294. CVE-2022-2294 is a high severity heap-based buffer overflow weakness in the Web Real-Time Communications (WebRTC) component which is being exploited in the wild. This is the fourth Chrome zero-day to be patched in 2022.

Software 140
article thumbnail

PennyWise malware on YouTube targets cryptocurrency wallets and browsers

Tech Republic Security

Learn more about how this stealer malware operates and how to protect yourself from it now. The post PennyWise malware on YouTube targets cryptocurrency wallets and browsers appeared first on TechRepublic.

LifeWorks

More Trending

article thumbnail

How to Achieve Fast and Secure Continuous Delivery of Cloud-Native Applications

Security Boulevard

How to Achieve Fast and Secure Continuous Delivery of Cloud-Native Applications. brooke.crothers. Tue, 07/05/2022 - 16:11. 4 views. What is Continuous Delivery? Continuous Delivery is the ability to get software changes of all types, including new features, configuration changes, and bug fixes, into production safely and quickly in a sustainable way.

Software 134
article thumbnail

Iranian Fars News Agency claims cyberattack on a company involved in the construction of Tel Aviv metro

Security Affairs

Iran’s Fars News Agency reported that a massive cyberattack hit operating systems and servers of the Tel Aviv Metro. Iran’s Fars News Agency reported on Monday that operating systems and servers of the Tel Aviv Metro were hit by a massive cyberattack. The rail system is still under construction and according to The Jerusalem Post, the infrastructure is the subject of a political debate in Israel.

Media 131
article thumbnail

Russia Ukraine War ejects cyber attack concerns in the Britain

CyberSecurity Insiders

After the cyber attack on the British Army’s Twitter and YouTube feed, the National Cyber Security Centre (NCSC) has issued a warning against Russian hacking efforts on National Infrastructure. The cyber arm of GCHQ is urging organizations to give regular breaks to the frontline cyber workforce to recharge, as the work pressure will quadruple in the coming months.

article thumbnail

Poor Software Patches Are Responsible for Half of All Zero-day Vulnerabilities

Heimadal Security

Project Zero is a team of security researchers at Google that was established in 2014. Their primary mission is to investigate zero-day vulnerabilities in the hardware and software systems that people all around the globe rely on. Their purpose is to make the identification and exploitation of security vulnerabilities more difficult, and to greatly enhance […].

Software 121
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Online Casino Security For Dummies: 4 Tips For A Secure And Safe Gaming Experience

SecureBlitz

In this online casino security for dummies guide, we will reveal 4 tips for a secure and safe gaming experience. Read more. The post Online Casino Security For Dummies: 4 Tips For A Secure And Safe Gaming Experience appeared first on SecureBlitz Cybersecurity.

article thumbnail

Researchers Uncover Malicious NPM Packages Stealing Data from Apps and Web Forms

The Hacker News

A widespread software supply chain attack has targeted the NPM package manager at least since December 2021 with rogue modules designed to steal data entered in forms by users on websites that include them.

Software 118
article thumbnail

APT campaign targeting SOHO routers highlights risks to remote workers

CSO Magazine

A targeted attack campaign has been compromising home and small-business routers since late 2020 with the goal of hijacking network communications and infecting local computers with stealthy and sophisticated backdoors. Attacks against home routers are not new, but the implants used by attackers in this case were designed for local network reconnaissance and lateral movement instead of just abusing the router itself.

article thumbnail

HackerOne Employee Fired for Stealing and Selling Bug Reports for Personal Gain

Dark Reading

Company says it is making changes to its security controls to prevent malicious insiders from doing the same thing in future; reassures bug hunters their bounties are safe.

117
117
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

AstraLocker ransomware operators shut down their operations

Security Affairs

AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re shutting down the operation and provided decryptors to the VirusTotal malware analysis platform. AstraLocker is based on the source code of the Babuk Locker (Babyk) ransomware that was leaked online on June 2021.

article thumbnail

Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Data

Dark Reading

A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report.

115
115
article thumbnail

AstraLocker Ransomware Goes Offline and Makes Decryptors Available

Heimadal Security

Another one bites the dust, we might say. It has been recently made public that the cybercriminal responsible for the not-so-famous AstraLocker ransomware is ceasing operations and intends to switch to cryptojacking. The threat actor behind the ransomware uploaded to the VirusTotal malware analysis platform a ZIP archive containing AstraLocker decryptors.

article thumbnail

SQL injection, XSS vulnerabilities continue to plague organizations

CSO Magazine

Despite years topping vulnerability lists, SQL injection and cross-site scripting errors (XSS) remain the bane of security teams, according to a new report by a penetration-testing-as-a-service company. The report by BreachLock, based on 8,000 security tests performed in 2021, organizes its findings based on risk. Critical risk findings pose a very high threat to a company's data.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Encryption tools to withstand Cyber Attacks from Quantum Computers

CyberSecurity Insiders

United States National Institute of Standards and Technology (NIST) has acknowledged a group of encryption tools that have the potential to endure cyber attacks launched from quantum computers. We already know that every technology has its pros and cons and any mind can use it anytime against mankind. Similarly, Quantum Computers can also launch sophisticated cyber attacks and NCSC suspects that adversary nations like China, Russia, and North Korea have such technology or work on such technology

article thumbnail

LockBit explained: How it has become the most popular ransomware

CSO Magazine

LockBit is one of the most prominent ransomware-as-a-service (RaaS) operations that has targeted organizations over the past several years. Since its launch in 2019, LockBit has constantly evolved, seeing unprecedented growth recently driven by other ransomware gangs disbanding. The LockBit creators sell access to the ransomware program and its infrastructure to third-party cybercriminals known as affiliates who break into networks and deploy it on systems for a cut of up to 75% of the money pai

article thumbnail

As New Clues Emerges, Experts Wonder: Is REvil Back?

The Hacker News

Change is a part of life, and nothing stays the same for too long, even with hacking groups, which are at their most dangerous when working in complete silence. The notorious REvil ransomware gang, linked to the infamous JBS and Kaseya, has resurfaced three months after the arrest of its members in Russia. The Russian domestic intelligence service, the FSB, had caught 14 people from the gang.

article thumbnail

Google patches “in-the-wild” Chrome zero-day – update now!

Naked Security

Running Chrome? Do the "Help-About-Update" dance move right now, just to be sure.

108
108
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cyber Police of Ukraine arrested 9 men behind phishing attacks on Ukrainians attempting to capitalize on the ongoing conflict

Security Affairs

The Cyber Police of Ukraine arrested nine members of a cybercriminal gang that has stolen 100 million hryvnias via phishing attacks. The Cyber Police of Ukraine arrested nine members of a cybercriminal organization that stole 100 million hryvnias via phishing attacks. The crooks created more than 400 phishing sites for obtaining the banking data of Ukrainian citizens under the guise of social security payments from the EU.

Phishing 108
article thumbnail

Data Inventory and Mapping to Support Privacy Compliance

TrustArc

TrustArc helps organizations streamline data inventory and mapping to create a central inventory of the data collected to improve data management and privacy compliance.

article thumbnail

Threat actors compromised British Army ’s Twitter, YouTube accounts to promote crypto scams

Security Affairs

Threat actors compromised the Twitter and YouTube accounts of the British Army to promote online crypto scams. The Twitter and YouTube accounts of the British Army were used to promote NFT and other crypto scams. The YouTube account was used to transmit an older Elon Musk clip that attempts to trick users into visiting cryptocurrency scam sites. The attackers hijacked the verified Twitter account of the British Army, changed the profile images, and renamed it to ‘pssssd.’ After the U

Scams 106
article thumbnail

Latest Cyberattack Against Iran Part of Ongoing Campaign

Threatpost

Iran's steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country's rail system.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

NPM supply-chain attack impacts hundreds of websites and apps

Bleeping Computer

An NPM supply-chain attack dating back to December 2021 used dozens of malicious NPM modules containing obfuscated Javascript code to compromise hundreds of downstream desktop apps and websites. [.].

103
103
article thumbnail

Cloud-based malware is on the rise. How can you secure your business?

Malwarebytes

There’s a lot of reasons to think the cloud is more secure than on-prem servers, from better data durability to more consistent patch management — but even so, there are many threats to cloud security businesses should address. Cloud-based malware is one of them. Indeed, while cloud environments are generally more resilient to cyberthreats than on-prem infrastructure, malware delivered over the cloud increased by 68% in early 2021 — opening the door for a variety of different cyber attacks.

Malware 101
article thumbnail

Why Browser Vulnerabilities Are a Serious Threat — and How to Minimize Your Risk

Dark Reading

As a result of browser market consolidation, adversaries can focus on uncovering vulnerabilities in just two main browser engines.

Risk 101
article thumbnail

Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server

Trend Micro

We recently found a new ransomware family, which we have dubbed as HavanaCrypt, that disguises itself as a legitimate Google Software Update application and uses a Microsoft web hosting service IP address as its command-and-control (C&C) server to circumvent detection.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!