Wed.Aug 05, 2020

article thumbnail

Typosquatting – Third Certainty #24

Adam Levin

Simple spelling errors in URLs can expose you to phishing, malware, and other kinds of cyber trickery. In the latest episode of Third Certainty, Adam Levin discusses typosquatting and how it can put your data security in jeopardy. The post Typosquatting – Third Certainty #24 appeared first on Adam Levin.

Phishing 164
article thumbnail

COVID-19 highlights need for business and security leaders to work together to prevent cyberattacks

Tech Republic Security

New Tenable study says 94% of organizations experienced a business-impacting cyberattack or compromise within the past 12 months; 46% weathered five or more attacks.

168
168
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NSA Issues Cybersecurity Advisory on Protecting Location Data

Adam Levin

The NSA has issued a cybersecurity advisory about the use of location data on personal devices, social media accounts, mobile applications, as well as Internet of Things-enabled devices. The advisory, titled “Limiting Location Data Exposure,” was released August 4. While it is directed at government officials, the advice could also help the general public mitigate risks to data and privacy posed by location-tracking technologies.

article thumbnail

Hacker leaks passwords for 900+ Pulse Secure VPN enterprise servers

Security Affairs

ZDNet reported in exclusive that a list of passwords for 900+ enterprise VPN servers has been shared on a Russian-speaking hacker forum. ZDNet has reported in exclusive that a list of plaintext usernames and passwords for 900 Pulse Secure VPN enterprise servers, along with IP addresses, has been shared on a Russian-speaking hacker forum. ZDNet has obtained a copy of the list with the help of threat intelligence firm KELA and verified confirmed the authenticity of the data.

VPN 137
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

COVID-19-related scams cost Americans more than $98 million since the start of 2020

Tech Republic Security

Online shopping is the most prevalent type of scam with people losing nearly $14 million to date, according to FTC data.

Scams 151
article thumbnail

Exclusive: TIM’s Red Team Research finds 4 zero-days in WOWZA Streaming Engine product

Security Affairs

Researchers from TIM’s Red Team Research (RTR) have discovered another 4 new zero-day vulnerabilities in the WOWZA Streaming Engine product. Last month, the TIM’s Red Team Research (RTR) disclosed 2 new vulnerabilities affecting the Oracle Business Intelligence product with High severity. Today, the TIM’s Red Team Research led by Massimiliano Brolli, discovered 4 new vulnerabilities that have been addressed by the manufacturer WOWZA Streaming Engine, between the end of 2019 and

More Trending

article thumbnail

A Cyber ‘Vigilante’ is Sabotaging Emotet’s Return

Threatpost

During Black Hat USA 2020, Threatpost talks to Sherrod DeGrippo, with Proofpoint, about Emotet's recent return -and how a cyber vigilante is attempting to thwart the malware's comeback.

Malware 117
article thumbnail

Dutch Hackers Found a Simple Way to Mess With Traffic Lights

WIRED Threat Level

By reverse-engineering apps intended for cyclists, security researchers found they could cause delays in at least 10 cities from anywhere in the world.

article thumbnail

Flaw in popular NodeJS ‘express-fileupload’ module allows DoS attacks and code injection

Security Affairs

Expert found a flaw in a popular NodeJS module that can allow attackers to perform a denial-of-service (DoS) attack on a server or get arbitrary code execution. The NodeJS module “ express-fileupload ,” which has more that 7.3 million times downloads from the npm repository. The NodeJS module is affected by a ‘Prototype Pollution’ CVE-2020-7699 vulnerability that can allow attackers to perform a denial-of-service (DoS) attack on a server or inject arbitrary code. “T

article thumbnail

A Hacker Guide To Deep Learning Based Side Channel Attacks

Elie

This talk provides a step-by-step introduction on how to use deep learning to perform AES side-channel attacks.

118
118
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Why Confidential Computing Is a Game Changer

Dark Reading

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.

article thumbnail

Black Hat 2020: Open-Source AI to Spur Wave of ‘Synthetic Media’ Attacks

Threatpost

The explosion of open-source AI models are lowering the barrier of entry for bad actors to create fake video, audio and images - and Facebook, Twitter and other platforms aren't ready.

Media 90
article thumbnail

Attack of the Clone: Next-Gen Social Engineering

Dark Reading

NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.

article thumbnail

Twitter Fixes High-Severity Flaw Affecting Android Users

Threatpost

A vulnerability in Twitter for Android could have allowed attackers to access private direct messages (DMs) and other data.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

iOS 14’s Best Privacy Feature? Catching Data-Grabbing Apps

WIRED Threat Level

Apple's new operating system hasn't been released to the public yet, but its new permission notifications are already shaming developers into cleaning up their acts.

89
article thumbnail

NSA Warns Smartphones Leak Location Data

Threatpost

The agency known for its own questionable surveillance activity advised how mobile users can limit others’ ability to track where they are.

article thumbnail

Cyber Defense Magazine – August 2020 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine august 2020 Edition has arrived. We hope you enjoy this month’s edition…packed with over 147 pages of excellent content. OVER 145 PAGESALWAYS FREE – LOADED WITH EXCELLENT CONTENT Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows.

B2C 82
article thumbnail

Black Hat 2020: In a Turnaround, Voting Machine Vendor Embraces Ethical Hackers

Threatpost

Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch to security researchers with new safe harbor terms and vulnerability disclosure policies at Black Hat USA 2020.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

3 Tips for Securing Open Source Software

Dark Reading

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.

article thumbnail

Black Hat 2020: Scaling Mail-In Voting Spawns Broad Challenges

Threatpost

Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahead of November's election.

article thumbnail

OPA: A general-purpose policy engine for cloud-native

InfoWorld on Security

As your organization embraces the cloud, you may find that the dynamism and scale of the cloud-native stack requires a far more complicated security and compliance landscape. For instance, with container orchestration platforms like Kubernetes gaining traction, developers and devops teams have new responsibility over policy areas like admission control as well as more traditional areas like compute, storage and networking.

article thumbnail

Black Hat 2020: Linux Spyware Stack Ties Together 5 Chinese APTs

Threatpost

The groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.

Spyware 97
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

A Most Personal Threat: Implantable Medical Devices

Dark Reading

Alan Michaels, director of the Electronic Systems Lab at the Virginia Tech Hume Center, explains why implanted medical devices could pose a threat to secure communication facilities.

83
article thumbnail

NSA releases a guide to reduce location tracking risks

Security Affairs

The United States National Security Agency (NSA) is warning of risks posed by location services for staff who work in defence or national security. The United States National Security Agency (NSA) published a new guide to warn of the risks posed by location services for staff who work in defence or national security. The guide , titled “Limiting Location Data Exposure” warn of geolocation features implemented by smartphones, tablets, and fitness trackers. “Mobile devices store and share de

Risk 77
article thumbnail

Tales from the Trenches Show Security Issues Endemic to Healthcare

Dark Reading

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security problems.

article thumbnail

Microsoft Teams Patch Bypass Allows RCE

Threatpost

An attacker can hide amidst legitimate traffic in the application's update function.

106
106
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Pen Testers Who Got Arrested Doing Their Jobs Tell All

Dark Reading

Coalfire's Gary De Mercurio and Justin Wynn share the details of their physical penetration-testing engagement gone wrong, as well as recommendations for protecting all red teamers.

article thumbnail

Voting Machine Makers Are Finally Playing Nice With Hackers

WIRED Threat Level

After years of secrecy, one major election tech company is giving more hackers a look under the hood.

96
article thumbnail

High-Severity Android RCE Flaw Fixed in August Security Update

Threatpost

Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.

Mobile 92
article thumbnail

Developing Community for Woman Infosec Pros in India

Dark Reading

Vandana Verma tells us how women in India are finding support, education and love of cybersecurity through the growing InfosecGirls community.

InfoSec 77
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.