Wed.Apr 13, 2022

article thumbnail

Russian Cyberattack against Ukrainian Power Grid Prevented

Schneier on Security

A Russian cyberweapon, similar to the one used in 2016, was detected and removed before it could be used. Key points: ESET researchers collaborated with CERT-UA to analyze the attack against the Ukrainian energy company The destructive actions were scheduled for 2022-04-08 but artifacts suggest that the attack had been planned for at least two weeks The attack used ICS-capable malware and regular disk wipers for Windows, Linux and Solaris operating systems We assess with high confidence that the

Malware 343
article thumbnail

Microsoft Patch Tuesday, April 2022 Edition

Krebs on Security

Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, according to a report from the U.S. National Security Agency (NSA). Of particular concern this month is CVE-2022-24521 , which is a “privilege escalation” vulnerability in the Windows common log file system driver.

DNS 329
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds 8 known security vulnerabilities as priorities to patch

Tech Republic Security

The new vulnerabilities are being actively exploited, prompting CISA to advise federal agencies and organizations to patch them in a timely manner. The post CISA adds 8 known security vulnerabilities as priorities to patch appeared first on TechRepublic.

215
215
article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

Cyberattacks preceded Russia’s invasion of Ukraine, and these attacks continue today as the war unfolds. As the United States and other nations condemn Russia’s actions, the odds of Russian cyber actors targeting the U.S., allied countries, and businesses steadily increases. Related: Cyber espionage is in a Golden Age. These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technic

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Supply chain cyberattacks jumped 51% in 2021

Tech Republic Security

A study published by NCC Group shows what businesses need to be aware of when attempting to prevent cyber attacks. The post Supply chain cyberattacks jumped 51% in 2021 appeared first on TechRepublic.

article thumbnail

Russia Is Leaking Data Like a Sieve

WIRED Threat Level

Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.

145
145

LifeWorks

More Trending

article thumbnail

CVE-2021-31805 RCE bug in Apache Struts was finally patched

Security Affairs

Apache addressed a critical flaw in Apache Struts RCE that was linked to a previous issue that was not properly fixed. Apache Struts is an open-source web application framework for developing Java EE web applications. The Apache Software Foundation urges organizations to address a vulnerability, tracked as CVE-2021-31805, affecting Struts versions ranging 2.0.0 to 2.5.29.

Software 145
article thumbnail

U.S. Warns of APT Hackers Targeting ICS/SCADA Systems with Specialized Malware

The Hacker News

The U.S. government on Wednesday warned of nation-state actors deploying specialized malware to maintain access to industrial control systems (ICS) and supervisory control and data acquisition (SCADA) devices. "The APT actors have developed custom-made tools for targeting ICS/SCADA devices," multiple U.S. agencies said in an alert.

Malware 138
article thumbnail

Microsoft has taken legal and technical action to dismantle the Zloader botnet

Security Affairs

Microsoft’s Digital Crimes Unit (DCU) announced to have shut down dozens C2 servers used by the infamous ZLoader botnet. Microsoft dismantled the C2 infrastructure used by the ZLoader trojan with the help of telecommunications providers around the world and cybersecurity firms. The IT giant obtained a court order that allowed it to sinkhole 65 domains used by the ZLoader operators along with an additional 319 currently registered DGA domains. “Today, we’re announcing that Microsoft’

Banking 140
article thumbnail

Feds Uncover a ‘Swiss Army Knife’ for Hacking Industrial Systems

WIRED Threat Level

The malware toolkit, known as Pipedream, is perhaps the most versatile tool ever made to target critical infrastructure like power grids and oil refineries.

Hacking 133
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

ESET takes part in global operation to disrupt Zloader botnets

We Live Security

ESET researchers provided technical analysis, statistical information, and known command and control server domain names and IP addresses. The post ESET takes part in global operation to disrupt Zloader botnets appeared first on WeLiveSecurity.

133
133
article thumbnail

Millions of Endpoints Affected by Critical HP Teradici PCoIP Vulnerabilities

Heimadal Security

American multinational information technology company HP has issued an alert regarding new critical security weaknesses in the Teradici PCoIP client and agent for Windows, Linux, and macOS, which affect 15 million endpoints. According to the personal computers (PCs), printers, and related supplies developer, Teradici is impacted by the recently reported OpenSSL certificate parsing vulnerability that […].

article thumbnail

It's time to re-evaluate your 2FA setup on Microsoft networks

CSO Magazine

From cloud to on-premises access, having two-factor authentication (2FA) can help keep attackers at bay. The goal is to get the attackers to go somewhere else and leave you alone. But what if an attacker wants to target you? Is your 2FA implementation good enough to protect you in that situation? If you have rolled out 2FA already, you probably made some of the same decisions I did when implementing it.

article thumbnail

Do I Need Antivirus App On Android Phone?

SecureBlitz

Do I need antivirus app on Android phone? Read on for the answer. Antivirus apps are known to provide extra layers of security to computer devices like Android and other operating systems. However, you might be wondering if you really need them on an Android phone. Android is one of the most popular operating systems. The post Do I Need Antivirus App On Android Phone?

Antivirus 130
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Hackers exploit critical VMware CVE-2022-22954 bug, patch now

Bleeping Computer

Security researchers have published various proof of concepts (PoCs) scripts for exploiting CVE-2022-22954 on social media and other channels, essentially enabling malicious actors to attack unpatched systems. [.].

Media 126
article thumbnail

Do I Need Antivirus App On iPhone? [Here’s The ANSWER]

SecureBlitz

Do I need Antivirus app on iPhone? Read on for the answer. To protect your files and data, it is mostly recommended to get an antivirus app on any device. If you use your iPhone to check social media or email, make bank transactions on websites or mobile apps, send texts, store contacts or take. The post Do I Need Antivirus App On iPhone? [Here’s The ANSWER] appeared first on SecureBlitz Cybersecurity.

Antivirus 128
article thumbnail

Top Data Loss Prevention (DLP) Solutions

eSecurity Planet

In an age of strong data privacy laws like GDPR and CCPA , data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that data is more sensitive than others. Sensitive data can include personally identifiable information (PII) that can impact user privacy. Sensitive data also includes payment and financial information that could lead to identity theft and fraud if the data is lost or stolen and winds up in the wrong hands

Backups 125
article thumbnail

China-linked Hafnium APT leverages Tarrask malware to gain persistence

Security Affairs

China-linked Hafnium APT group started using a new piece of new malware to gain persistence on compromised Windows systems. The China-backed Hafnium cyberespionage group is likely behind a piece of a new malware, dubbed Tarrask, that’s used to maintain persistence on compromised Windows systems, reported Microsoft Threat Intelligence Center (MSTIC) experts.

Malware 122
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

SMS group spam promises free gifts in return for bill payment

Malwarebytes

We’re seeing lots of examples of peculiar SMS messages sent to random groups of people. Most of these messages promise free gifts and/or offers after having paid bills. Nobody has asked for these texts, and they’re not being sent by providers of any services. What’s going on? The set up. Most of the messages we’ve seen, and indeed received ourselves, are identical to the below example: Free Msg: your bill is paid for March.

Mobile 120
article thumbnail

How to Prevent Web Attacks Using Input Sanitization

eSecurity Planet

Despite all the security measures you might take, a codebase can be the weakest link for any business’s cybersecurity. Sanitizing and validating inputs is usually the first layer of defense. Sanitizing consists of removing any unsafe character from user inputs, and validating will check if the data is in the expected format and type. Attackers have been using classic flaws for years with a pretty high success rate.

article thumbnail

Is ZoanCash Legit Or A Scam? [Unbiased ANSWER]

SecureBlitz

Is ZoanCash legit or a scam? Read on for the unbiased answer. Almost everyone is looking for a way to make money online and some of them rely on get-paid-to sites. These sites tell you to perform simple online tasks to get money. ZoanCash is one of these websites and their offer is mouth-watering. They. The post Is ZoanCash Legit Or A Scam? [Unbiased ANSWER] appeared first on SecureBlitz Cybersecurity.

Scams 119
article thumbnail

US cryptocurrency coder gets 5 years for North Korea sanctions busting

Naked Security

Cryptocurrency expert didn't take "No" for an answer when the US authorities said he couldn't pursue cryptocoin opps in North Korea.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Do I Need Antivirus App On iPad? [Here’s The ANSWER]

SecureBlitz

Do I need Antivirus app on iPad? Read on as I answer the question. The iPad has a lot of features that make it unique and it is perfect for just about any task, which makes it desirable to a lot of people. It can be used for a lot of tasks that involve you. The post Do I Need Antivirus App On iPad? [Here’s The ANSWER] appeared first on SecureBlitz Cybersecurity.

Antivirus 119
article thumbnail

NGINX zero-day vulnerability: Check if you’re affected

Malwarebytes

On April 9, hacking group BlueHornet tweeted about an experimental exploit for NGINX 1.18 and promised to warn companies affected by it. On April 10, BlueHornet claimed to have breached the China branch of UBS Securities using the NGINX vulnerability. All we learned on Twitter was that a new zero-day vulnerability in the NGINX web server existed and had been publicly revealed.

article thumbnail

New EnemyBot DDoS botnet recruits routers and IoTs into its army

Bleeping Computer

A new Mirai-based botnet malware named Enemybot has been observed growing its army of infected devices through vulnerabilities in modems, routers, and IoT devices, with the threat actor operating it known as Keksec. [.].

IoT 114
article thumbnail

April’s Patch Tuesday update includes fixes for two zero-day vulnerabilities

Malwarebytes

It’s that time of the month again. Time to check what needs to be updated and prioritize where necessary. The Microsoft updates include at least two zero-day vulnerabilities that deserve your attention. Microsoft. Microsoft has released security updates and non-security updates for client and server versions of its Windows operating system and other company products, including Microsoft Office and Edge.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft Exposes Evasive Chinese Tarrask Malware Attacking Windows Computers

The Hacker News

The Chinese-backed Hafnium hacking group has been linked to a piece of a new malware that's used to maintain persistence on compromised Windows environments.

Malware 113
article thumbnail

JekyllBot:5 flaws allow hacking TUG autonomous mobile robots in hospitals

Security Affairs

Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. Researchers at healthcare IoT security firm Cynerio discovered a collection of five vulnerabilities impacting TUG autonomous mobile robots, collectively named JekyllBot:5 , that could be exploited by remote attackers to hack the devices.

Mobile 111
article thumbnail

Hacking Forum RaidForums Shut Down

Heimadal Security

The RaidForums hacker site was largely used by cybercriminals to acquire and sell stolen datasets. The forum represented a database sharing and marketplace forum, that offered exclusive database breaches and leaks as well as an active marketplace. Source What Happened? As a result of Operation TOURNIQUET, a sophisticated law enforcement operation coordinated by Europol to assist […].

Hacking 111
article thumbnail

Is GramFree Legit Or A Scam? [Unbiased Answer]

SecureBlitz

Is GramFree legit or a scam? Read on for the answer. There are many “Get Paid To” websites that claim you can earn cash and other rewards by doing short online tasks and it is hard to know which one is a scam or legit. GramFree is one of these websites, since earning rewards on. The post Is GramFree Legit Or A Scam? [Unbiased Answer] appeared first on SecureBlitz Cybersecurity.

Scams 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!