Sun.Oct 10, 2021

article thumbnail

Data Breach Numbers, Costs and Impacts All Rise in 2021

Lohrman on Security

By almost any measure, the breadth, depth and impact of data breaches have dramatically increased during the COVID-19 pandemic. Here’s a roundup of the numbers.

article thumbnail

FontOnLake malware infects Linux systems via trojanized utilities

Bleeping Computer

A newly discovered malware family has been infecting Linux systems concealed in legitimate binaries. Dubbed FontOnLake, the threat delivers backdoor and rootkit components. [.].

Malware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 Takeaways From the Changes in OWASP’s Top 10 Vulnerability Ranking

CyberSecurity Insiders

The last update to the OWASP Top 10 Vulnerability Ranking was in late 2017. Much has changed in the cyber threat landscape since then. A fresh round of updates to reflect the kind of risks and new cyber attacks organizations are dealing with appears to be in order. In September this year, the update happened as the nonprofit Open Web Application Security Project refreshed the content of the OWASP Top 10 2021 website.

article thumbnail

Amnesty International links cybersecurity firm to spyware operation

Bleeping Computer

A report by Amnesty International links an Indian cybersecurity company to an Android spyware program used to target prominent activists. [.].

Spyware 135
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Patrol Robots in Singapore trigger privacy concerns

CyberSecurity Insiders

Government of Singapore has hired a bunch of patrolling robots to put the public on surveillance and see that they do not indulge in any undesirable social behavior such as hugging, kissing, and standing too close to each other, and such. As per the sources reporting to Cybersecurity Insiders, these robots, dubbed Xavier, will be equipped with 7 cameras and will record every activity of the citizens that come into their camera vicinity.

article thumbnail

100 terabyte home NAS

Security Boulevard

So, as a nerd, let's say you need 100 terabytes of home storage. What do you do? My solution would be a commercial NAS RAID, like from Synology , QNAP , or Asustor. I'm a nerd, and I have setup my own Linux systems with RAID, but I'd rather get a commercial product. When a disk fails, and a disk will always eventually fail, then I want something that will loudly beep at me and make it easy to replace the drive and repair the RAID.

Backups 109

More Trending

article thumbnail

Security Champions Framework, The Great Facebook Outage, Twitch Data Breach

Security Boulevard

Co-host Scott Wright presents a new framework to help people to become “security champions” in their organization, a discussion about the great Facebook outage of 2021, and details on the Twitch data breach exposing source code and creator payouts. ** Links mentioned on the show ** Scott’s Security Champions Webinar [link] What Happened to Facebook, […].

article thumbnail

Episode 227: What’s Fueling Cyber Attacks on Agriculture ?

The Security Ledger

In this episode of the podcast (#227) we speak with Allan Liska, the head of the CSIRT at the firm Recorded Future. about the spate of attacks in recent months targeting food processing plants, grain cooperatives and other agriculture sector targets. Allan and I talk about the how these attacks are playing out and why, all of a sudden, the. Read the whole entry. » Click the icon below to listen.

article thumbnail

SecTor Episode MMXXI: Return of The Hack Lab

Security Boulevard

I’m happy to announce that arrangements have now been finalized for the Tripwire team to return for the Tripwire VERT Hack Lab at the MTCC! We will be bringing some new hardware devices as well as a new virtualized hack target. This new virtual target, an ASUS DSL modem with recent firmware, can be compromised […]… Read More. The post SecTor Episode MMXXI: Return of The Hack Lab appeared first on The State of Security.

Hacking 103
article thumbnail

October is Cybersecurity Awareness Month: Here Are 4 Cybersecurity Tips to Keep Protected

Identity IQ

October is Cybersecurity Awareness Month and the theme for 2021 is “Do Your Part. #BeCyberSmart.”. There’s never been a better time than right now to review the processes you have in place to avoid the latest cybersecurity risks lurking in the corners of our everyday digital lives. The top cybersecurity concerns for consumers regarding their personal information are identity theft and stolen credit or debit card information, according to a recent survey conducted by core technology provider CSI.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Customize your Windows 11 experience with these free apps

Bleeping Computer

Windows 11 is now available for devices with supported hardware features. If you've already upgraded to Windows 11 and you're looking for some great apps for your Windows 11 device, here's a list of the interesting open-source and free apps currently available in the marketplace. [.].

article thumbnail

How Quantum Computers Can Impact Security

Trend Micro

While it might be too early to completely overhaul security protocols to prepare for quantum computing — not to mention that there is currently no post-quantum cryptographic standard existing at the moment — it would be a good idea for organizations to start planning for the future.

Risk 95
article thumbnail

Previously undetected FontOnLake Linux malware used in targeted attacks

Security Affairs

ESET researchers spotted a previously unknown, modular Linux malware, dubbed FontOnLake, that has been employed in targeted attacks. ESET researchers spotted a previously unknown, modular Linux malware, dubbed FontOnLake, that was employed in targeted attacks on organizations in Southeast Asia. According to the experts, modules of this malware family are under development and continuously improved. “ESET researchers have discovered a previously unknown malware family that utilizes custom a

Malware 86
article thumbnail

Take Back Control of Digital Commerce

CyberSecurity Insiders

Increasing the value of payment streams might be simpler than you think. By Matthew Meehan, chief operating officer at TokenEx. It’s no surprise that digital transactions are a major focal point for those within the payments space. Digital payments have long been increasing in popularity and profitability, and the pandemic’s push for contactless payments only accelerated that trend.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CommitStrip ‘The Future Of Videoconferencing’

Security Boulevard

via the textual amusements of Thomas Gx , along with the Illustration talents of Etienne Issartia and superb translation skillset of Mark Nightingale - the creators of CommitStrip ! Permalink. The post CommitStrip ‘The Future Of Videoconferencing’ appeared first on Security Boulevard.

73
article thumbnail

Expanded Cloud Misconfiguration & IaaS Security

Trend Micro

Cloud One – Conformity has expanded its support for multi-clouds and Terraform users to add even more configuration checks so cloud projects are built on a foundation of best practice security and compliance.

Risk 67
article thumbnail

Data Breach Numbers, Costs and Impacts All Rise in 2021

Security Boulevard

By almost any measure, the breadth, depth and impact of data breaches have dramatically increased during the COVID-19 pandemic. Here’s a roundup of the numbers. The post Data Breach Numbers, Costs and Impacts All Rise in 2021 appeared first on Security Boulevard.

article thumbnail

Apple’s new CarPlay tech leads to more data security concerns

CyberSecurity Insiders

Apple Inc has announced that it intends to improve the work functions of its CarPlay feature by offering sophistication to access car climate control abilities, changing radio stations, changing seat settings, speedometer and other such crucial vehicle data in near-time. The aim behind the newly developing tech is to make the life simple of iPhone users by having the ability to remotely control the functions of their car through CarPlay.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The Changing Role of the CISO

Security Boulevard

Back in the early days of networking, many companies assigned all of the responsibilities to anyone who showed any aptitude towards operating a computer. In many companies, this was an accountant or someone else who also managed sensitive financial information. The assumption was that the person managing the corporate books was the most trustworthy person in […]… Read More.

CISO 62
article thumbnail

ISO/IEC 27002's overall and topic-specific information security policies 0/11

Notice Bored

Clause 5.1 of the forthcoming new 3rd edition of ISO/IEC 27002 recommends two complementary types of information security policies. Firstly: At the highest level, organizations should define an “information security policy” which is approved by top management and which sets out the organization’s approach to managing its information security. The policy (singular) should address requirements derived from various sources, and include a bunch of general policy statements, for example laying out th

article thumbnail

DEF CON 29 ICS Village – Panel – Moderator: Jamil Jaffer, Panelists: Ernie Bio, David Etue, Jennifer DeTrani’s ‘Protecting Critical Infrastructure from Ransomware’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON 29 ICS Village videos on the organizations’ YouTube channel. Permalink. The post DEF CON 29 ICS Village – Panel – Moderator: Jamil Jaffer, Panelists: Ernie Bio, David Etue, Jennifer DeTrani’s ‘Protecting Critical Infrastructure from Ransomware’ appeared first on Security Boulevard.

article thumbnail

Honda to Start Selling Smart Car Data

Trend Micro

The auto giant is just one of many auto companies monetizing smart car data, creating a new industry set to be worth $400 billion by 2030.

IoT 52
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

100 terabyte home NAS

Errata Security

So, as a nerd, let's say you need 100 terabytes of home storage. What do you do? My solution would be a commercial NAS RAID, like from Synology , QNAP , or Asustor. I'm a nerd, and I have setup my own Linux systems with RAID, but I'd rather get a commercial product. When a disk fails, and a disk will always eventually fail, then I want something that will loudly beep at me and make it easy to replace the drive and repair the RAID.

Backups 46
article thumbnail

DEF CON 29 ICS Village – Lauren Zabierek’s ‘Collaborative Cyber Defense & Enhanced Threat Intel’

Security Boulevard

Our thanks to DEFCON for publishing their outstanding DEFCON 29 ICS Village videos on the organizations’ YouTube channel. Permalink. The post DEF CON 29 ICS Village – Lauren Zabierek’s ‘Collaborative Cyber Defense & Enhanced Threat Intel’ appeared first on Security Boulevard.

article thumbnail

Security Affairs newsletter Round 335

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the international press subscribe here. Previously undetected FontOnLake Linux malware used in targeted attacks Google addresses four high-severity flaws in Chrome Security expert published NMAP script for Apache CVE-2021-41773 vulnerability Sky.com servers exposed via misconfiguration Cox Media Group took