Mon.Sep 25, 2023

article thumbnail

GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

The Last Watchdog

If you’re a small business looking for the secret sauce to cybersecurity, the secret is out: start with a cybersecurity policy and make the commitment to security a business-wide priority. Related: SMBs too often pay ransom Small businesses, including nonprofit organizations, are not immune to cyberattacks. The average cost of a cybersecurity breach was $4.45 million in 2023, according to IBM’s Cost of a Data Breach Report, and over 700,000 small businesses were targeted in cybersecurity attacks

article thumbnail

How to Compare the Contents of Local & Remote Files With the Help of SSH

Tech Republic Security

This is a step-by-step guide on how to compare the contents of local and remote files with the help of SSH. Watch the companion video tutorial by Jack Wallen.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware group claims it's "compromised all of Sony systems"

Malwarebytes

Newcomer ransomware group RansomedVC claims to have successfully compromised the computer systems of entertainment giant Sony. As ransomware gangs do, it made the announcement on its dark web website, where it sells data that it's stolen from victims' computer networks. The announcement says Sony's data is for sale: Sony Group Corporation, formerly Tokyo Telecommunications Engineering Corporation, and Sony Corporation, is a Japanese multinational conglomerate corporation headquartered in Minato,

article thumbnail

iOS 17 update secretly changed your privacy settings; here’s how to set them back

Graham Cluley

Many iPhone users who upgraded their iPhones to the recently-released iOS 17 will be alarmed to hear that they may have actually downgraded their security and privacy. Read more in my article on the Hot for Security blog.

131
131
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Credit card thieves target Booking.com customers

Malwarebytes

Staff in the hospitality industry are trained to accommodate their guests, and when they have a few years of experience under their belt you can be sure they'll have received some extraordinary requests. Which is something that clever cybercriminals are taking advantage of. Researchers at Perception Point recently documented a sophisticated phishing campaign targeting hotels and travel agencies.

article thumbnail

More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator

Security Boulevard

Apple Scrambled to Fix 3 More CVEs: Egyptian opposition presidential candidate Ahmed Eltantawy targeted “by the government. The post More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator appeared first on Security Boulevard.

Spyware 125

More Trending

article thumbnail

Are You Willing to Pay the High Cost of Compromised Credentials?

The Hacker News

Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83% of compromised passwords would satisfy the password complexity and length requirements of compliance standards.

Passwords 121
article thumbnail

How to Create and Copy SSH Keys with 2 Simple Commands (+Video Tutorial)

Tech Republic Security

SSH keys provide a secure and convenient way to authenticate remote servers. In this step-by-step tutorial, Jack Wallen explains how to easily create and copy SSH keys.

article thumbnail

Google is retiring its Gmail Basic HTML view in January 2024

Bleeping Computer

Google is notifying Gmail users that the webmail's Basic HTML view will be deprecated in January 2024, and users will require modern browsers to continue using the service. [.

122
122
article thumbnail

Alert! Patch your TeamCity instance to avoid server hack

Security Affairs

Experts warn of a critical vulnerability in the TeamCity CI/CD server that can be exploited to take over a vulnerable server. JetBrains TeamCity is a popular and highly extensible Continuous Integration (CI) and Continuous Delivery (CD) server developed by JetBrains, a software development company known for its developer tools. TeamCity is designed to automate various aspects of the software development process, including building, testing, and deploying applications, while providing a wide rang

Hacking 124
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Xenomorph Android malware now targets U.S. banks and crypto wallets

Bleeping Computer

Security researchers discovered a new campaign that distributes a new version of the Xenomorph malware to Android users in the United States, Canada, Spain, Italy, Portugal, and Belgium. [.

Malware 120
article thumbnail

How to Compare the Contents of Local & Remote Files with the Help of SSH

Tech Republic Security

This is a step-by-step guide on how to compare the contents of local and remote files with the help of SSH. Watch our video tutorial to help you learn.

article thumbnail

Your Boss’s Spyware Could Train AI to Replace You

WIRED Threat Level

Corporations are using software to monitor employees on a large scale. Some experts fear the data these tools collect could be used to automate people out of their jobs.

Spyware 121
article thumbnail

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

The Hacker News

Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin.

Phishing 112
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. One way is to increase awareness about the importance of cybersecurity and its increasing demand.

CISO 117
article thumbnail

Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers

The Hacker News

A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous deployment (CI/CD) software could be exploited by unauthenticated attackers to achieve remote code execution on affected systems. The flaw, tracked as CVE-2023-42793, carries a CVSS score of 9.8 and has been addressed in TeamCity version 2023.05.

Software 113
article thumbnail

TikTok flooded with fake celebrity nude photo Temu referrals

Malwarebytes

Sites and apps frequently gamify their products and experiences to grow their user base. It’s a relatively easy way to have their customers become more involved thanks to whatever incentives may be on offer. A game here, a rewards program there, and everyone is happy. Well, almost everyone. If scammers insert themselves into the process then it may not all be plain sailing.

Scams 112
article thumbnail

BORN Ontario child registry data breach affects 3.4 million people

Bleeping Computer

The Better Outcomes Registry & Network (BORN), a healthcare organization funded by the government of Ontario, has announced that it is among the victims of Clop ransomware's MOVEit hacking spree. [.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

MOVEit Flaw Leads to 900 University Data Breaches

Dark Reading

National Student Clearinghouse, a nonprofit serving thousands of universities with enrollment services, exposes more than 900 schools within its MOVEit environment.

article thumbnail

Crooks stole $200 million worth of assets from Mixin Network

Security Affairs

Crooks stole $200 million from Mixin Network, a free, lightning fast and decentralized network for transferring digital assets. Mixin Network, the Hong Kong-based crypto firm behind a free, lightning fast and decentralized network for transferring digital assets announced it has suffered a $200 million cyber heist. The company suspended deposits and withdrawals immediately after the discovery of the security breach that took place early in the morning of September 23, 2023.

Hacking 113
article thumbnail

Mixin Network suspends operations following $200 million hack

Bleeping Computer

Mixin Network, an open-source, peer-to-peer transactional network for digital assets, has announced today on Twitter that deposits and withdrawals are suspended effective immediately due to a $200 million hack the platform suffered on Saturday. [.

Hacking 107
article thumbnail

From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese

The Hacker News

Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a threat actor codenamed EvilBamboo to gather sensitive information.

Spyware 104
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Is Gelsemium APT behind a targeted attack in Southeast Asian Government?

Security Affairs

A stealthy APT group tracked as Gelsemium was observed targeting a Southeast Asian government between 2022 and 2023. Palo Alto Unit42 researchers an APT group tracked as Gelsemium targeting a Southeast Asian government. The experts tracked the cluster as CL-STA-0046, the malicious activity spanned over six months between 2022-2023. The activity was characterized by the use of a combination of rare tools and techniques to gain access to the target network and collect intelligence from sensitive I

article thumbnail

Axiad and Okta Partner to Revolutionize Authentication with Phishing Resistant MFA

Security Boulevard

Passwords present several pain points, both from a security and usability standpoint. Malicious actors can. The post Axiad and Okta Partner to Revolutionize Authentication with Phishing Resistant MFA appeared first on Axiad. The post Axiad and Okta Partner to Revolutionize Authentication with Phishing Resistant MFA appeared first on Security Boulevard.

article thumbnail

Latest ARC Update Streamlines Workflows and Incident Response Time

Digital Guardian

New updates to Digital Guardian's Analytics and Reporting Cloud platform are designed to help threat hunters and incident responders identify, analyze, and remediate threats more effectively.

105
105
article thumbnail

Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks

Dark Reading

Back to basics is a good start, but too often security teams don't handle their deployment correctly. Here's how to avoid the common pitfalls.

109
109
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

A phishing campaign targets Ukrainian military entities with drone manual lures

Security Affairs

A phishing campaign targets Ukrainian military entities using drone manuals as lures to deliver the post-exploitation toolkit Merlin. Securonix researchers recently uncovered a phishing campaign using a Pilot-in-Command (PIC) Drone manual document as a lure to deliver a toolkit dubbed Merlin. The campaign, codenamed STARK#VORTEX by Securonix, targets Ukrainian military entities and CERT-UA attributed it to a threat actor tracked as UAC-0154.

Phishing 101
article thumbnail

UAE-Linked 'Stealth Falcon' APT Mimics Microsoft in Homoglyph Attack

Dark Reading

The cyberattackers are using the "Deadglyph" custom spyware, whose full capabilities have not yet been uncovered.

Spyware 117
article thumbnail

Child health data stolen in registry breach

Malwarebytes

Canadian healthcare organization Better Outcomes Registry & Network (BORN) has disclosed a data breach affecting client data. BORN—an Ontario perinatal and child registry that collects, interprets, shares, and protects critical data about pregnancy, birth, and childhood—says it was attacked on May 31, 2023. A subsequent investigation has shown that during the breach, unauthorized copies of files containing personal health information were taken from BORN’s systems.

article thumbnail

The Hot Seat: CISO Accountability in a New Era of SEC Regulation

Dark Reading

Updated cybersecurity regulations herald a new era of transparency and accountability in the face of escalating industry vulnerabilities.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.