Thu.Jun 15, 2023

article thumbnail

CISA Order Highlights Persistent Risk at Network Edge

Krebs on Security

The U.S. government agency in charge of improving the nation’s cybersecurity posture is ordering all federal agencies to take new measures to restrict access to Internet-exposed networking equipment. The directive comes amid a surge in attacks targeting previously unknown vulnerabilities in widely used security and networking appliances. Under a new order from the Cybersecurity and Infrastructure Security Agency (CISA), federal agencies will have 14 days to respond to any reports from CISA

Risk 275
article thumbnail

Have I Been Pwned Domain Searches: The Big 5 Announcements!

Troy Hunt

There are presently 201k people monitoring domains in Have I Been Pwned (HIBP). That's massive! That's 201k people that have searched for a domain, left their email address for future notifications when the domain appears in a new breach and successfully verified that they control the domain. But that's only a subset of all the domains searched, which totals 231k.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020

Tech Republic Security

FBI, CISA and international organizations released an advisory detailing breadth and depth of LockBit, and how to defend against the most prevalent ransomware of 2022 and (so far) 2023. The post CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020 appeared first on TechRepublic.

article thumbnail

How Shady Chinese Encryption Chips Got Into the Navy, NATO, and NASA

WIRED Threat Level

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Third-Party Security Risk: How to Protect and Respond

Duo's Security Blog

Third party security risk is an issue that frequently comes up in my discussions with clients. The topic is usually raised through questions like these: “I have a contractor starting on Monday. How do I give them the access they need to get the work done while still keeping our environment secure?” “How do I enable secure access for a third party if I want them to maintain a particular asset?

Risk 145
article thumbnail

Understanding Malware-as-a-Service

SecureList

Money is the root of all evil, including cybercrime. Thus, it was inevitable that malware creators would one day begin not only to distribute malicious programs themselves, but also to sell them to less technically proficient attackers, thereby lowering the threshold for entering the cybercriminal community. The Malware-as-a-Service (MaaS) business model emerged as a result of this, allowing malware developers to share the spoils of affiliate attacks and lowering the bar even further.

Malware 143

LifeWorks

More Trending

article thumbnail

LockBit Affiliate Arrested, as Extortion Totals Reach $91M Since 2020

Dark Reading

A third perp has been fingered, but CISA warns that LockBit variants continue to be a major threat on a global scale.

134
134
article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

A Guide to Key Management as a Service madhav Thu, 06/15/2023 - 11:29 As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure data security is through encryption and proper key management. Key Management as a Service (KMaaS) allows companies to manage encryption keys more effectively through a cloud-based solution instead of running the service on physical, on-premises

article thumbnail

ChatGPT Spreads Malicious Packages in AI Package Hallucination Attack

Security Boulevard

A newly discovered ChatGPT-based attack technique, dubbed AI package hallucination, lets attackers publish their own malicious packages in place of an unpublished package. In this way, attackers can execute supply chain attacks through the deployment of malicious libraries to known repositories. The technique plays off of the fact that generative AI platforms like ChatGPT use.

Software 126
article thumbnail

Android GravityRAT malware now steals your WhatsApp backups

Bleeping Computer

A new Android malware campaign spreading the latest version of GravityRAT has been underway since August 2022, infecting mobile devices with a trojanized chat app named 'BingeChat,' which attempts to steal data from victims' devices. [.

Backups 124
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

5 best practices to ensure the security of third-party APIs

CSO Magazine

When organizations consider application programming interface (API) security, they typically focus on securing APIs that are written in-house. However, not all the APIs that companies use are developed internally, rather some are designed and developed by other organizations. The problem is that many companies don't realize that using third-party APIs can expose their applications to security issues, such as malware, data breaches, and unauthorized access.

article thumbnail

S3 Ep139: Are password rules like running through rain?

Naked Security

Latest episode – listen now! (Full transcript inside.

Passwords 115
article thumbnail

Security culture improving in businesses despite factors holding teams back

CSO Magazine

The vast majority of CISOs have observed positive security culture gains in their organizations in the last year despite a perceived dip in the quality of overall security posture, according to the 10 th annual Information Security Maturity Report published by ClubCISO and Telstra Purple. The research surveyed 182 members of ClubCISO, a global community of information security leaders working in public and private sector companies.

CISO 120
article thumbnail

Trend Micro Brings Generative AI to XDR Platform

Security Boulevard

Trend Micro Inc. today launched a revamped extended detection and response (XDR) platform that leverages Microsoft’s generative artificial intelligence (AI) capabilities to make it simpler for cybersecurity analysts to use a Companion conversational interface to launch queries. Lori Smith, director of product marketing for Trend Micro, said the Trend Vision One platform will be infused.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Rhysida ransomware leaks documents stolen from Chilean Army

Bleeping Computer

Threat actors behind a recently surfaced ransomware operation known as Rhysida have leaked online what they claim to be documents stolen from the network of the Chilean Army (Ejército de Chile). [.

article thumbnail

Valence Security Taps Generative AI to Secure SaaS Apps

Security Boulevard

Valence Security added a generative artificial intelligence (AI) capability to its security posture management platform for software-as-a-service (SaaS) applications via an alliance with Microsoft. The Valence platform enables cybersecurity teams to assess the cybersecurity risks attached to a wide range of SaaS platforms that many business units routinely use without any awareness of their potential.

article thumbnail

Russian hackers use PowerShell USB malware to drop backdoors

Bleeping Computer

The Russian state-sponsored hacking group Gamaredon (aka Armageddon, or Shuckworm) continues to target critical organizations in Ukraine's military and security intelligence sectors, employing a refreshed toolset and new infection tactics. [.

Malware 112
article thumbnail

Passkeys Can Make Passwords a Thing of the Past

Security Boulevard

We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our most sensitive data. The number of data breaches increases almost daily–and in recent weeks, a leading password manager vendor, an internet hosting provider. The post Passkeys Can Make Passwords a Thing of the Past appeared first on Security Boulevard.

Passwords 111
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Clop ransomware gang starts extorting MOVEit data-theft victims

Bleeping Computer

The Clop ransomware gang has started extorting companies impacted by the MOVEit data theft attacks by listing them on a data leak site, a common extortion tactic used as a precursor for the public leaking of stolen data. [.

article thumbnail

CISOs Expect Stable IT Security Budgets in 2023

Security Boulevard

Cybersecurity budgets are on the rise despite continued economic uncertainty as CISOs and IT decision-makers (ITDMs) report increased confidence in their cybersecurity systems, especially as it relates to end-user compliance. These were among the findings of a Nupsire survey of 200 CISOs and ITDMs, which also revealed respondents are increasingly concerned with software applications and.

CISO 111
article thumbnail

MOVEit Transfer customers warned of new flaw as PoC info surfaces

Bleeping Computer

Progress warned MOVEit Transfer customers to restrict all HTTP access to their environments after info on a new SQL injection (SQLi) vulnerability was shared online today. [.

109
109
article thumbnail

New Supply Chain Attack Exploits Abandoned S3 Buckets to Distribute Malicious Binaries

The Hacker News

In what's a new kind of software supply chain attack aimed at open source projects, it has emerged that threat actors could seize control of expired Amazon S3 buckets to serve rogue binaries without altering the modules themselves.

Passwords 106
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

New Russian APT Group Responsible for Wiper Attacks in Ukraine Exposed

Heimadal Security

Security researchers have made a public disclosure about the identification of a new Advanced Persistent Threat (APT) group associated with Russia’s General Staff Main Intelligence Directorate (GRU). The experts have issued a warning, revealing that this threat actor has been involved in destructive wiper malware attacks on various organizations in Ukraine.

Malware 105
article thumbnail

Android App Penetration Testing Checklist with 129+ Test cases [Free Excel File]

Security Boulevard

Discover the key steps to evaluate the security of your Android applications with our detailed Android penetration testing checklist. The post Android App Penetration Testing Checklist with 129+ Test cases [Free Excel File] appeared first on Indusface. The post Android App Penetration Testing Checklist with 129+ Test cases [Free Excel File] appeared first on Security Boulevard.

article thumbnail

Private Data Compromised in Healthcare Breach

Heimadal Security

In a recent announcement, the Commonwealth Health System revealed that threat actors have successfully breached the computer network of a Scranton cardiology group, potentially compromising the private data of 181,764 patients. This incident marks the latest in a series of breaches targeting medical providers in Northeast Pennsylvania, including previous attacks on Commonwealth Health hospitals.

article thumbnail

5 Stages of the Vulnerability Management Lifecycle

eSecurity Planet

Vulnerability management is the process of identifying, classifying, remediating, and mitigating vulnerabilities. It is a critical part of an organization’s cybersecurity program. There are many different vulnerability management frameworks, but the vulnerability management lifecycle of most organizations today typically includes five phases. We’ll examine those and then look at vulnerability management lifecycle best practices.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Web3 Security: Safeguarding Assets and Data Privacy

Security Boulevard

Introduction Technological advancements reshape daily life and redefine digital interactions. Among these technological swifts, Web3 Security has stood out as a game-changer. It is promising a decentralized future and revolutionizing how we create and use online platforms and apps. Web3, enabled by blockchain and decentralization, presents exciting opportunities for a user-centric, secure, and open internet. […] The post Web3 Security: Safeguarding Assets and Data Privacy appeared first on Krat

article thumbnail

Warning: GravityRAT Android Trojan Steals WhatsApp Backups and Deletes Files

The Hacker News

An updated version of an Android remote access trojan dubbed GravityRAT has been found masquerading as messaging apps BingeChat and Chatico as part of a narrowly targeted campaign since June 2022. "Notable in the newly discovered campaign, GravityRAT can exfiltrate WhatsApp backups and receive commands to delete files," ESET researcher Lukáš Štefanko said in a new report published today.

Backups 105
article thumbnail

Critical Barracuda ESG Zero-Day Linked to Novel Chinese APT

Dark Reading

A PRC-aligned actor used a trio of custom malware to take advantage of inherent weaknesses in edge appliances.

Malware 104
article thumbnail

Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack

The Hacker News

Progress Software on Thursday disclosed a third vulnerability impacting its MOVEit Transfer application, as the Cl0p cybercrime gang deployed extortion tactics against affected companies. The new flaw, which is yet to be assigned a CVE identifier, also concerns an SQL injection vulnerability that "could lead to escalated privileges and potential unauthorized access to the environment.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!