Thu.Sep 24, 2020

article thumbnail

Iranian Government Hacking Android

Schneier on Security

The New York Times wrote about a still-unreleased report from Chckpoint and the Miaan Group: The reports, which were reviewed by The New York Times in advance of their release, say that the hackers have successfully infiltrated what were thought to be secure mobile phones and computers belonging to the targets, overcoming obstacles created by encrypted applications such as Telegram and, according to Miaan, even gaining access to information on WhatsApp.

article thumbnail

Microsoft: Attackers Exploiting ‘ZeroLogon’ Windows Flaw

Krebs on Security

Microsoft warned on Wednesday that malicious hackers are exploiting a particularly dangerous flaw in Windows Server systems that could be used to give attackers the keys to the kingdom inside a vulnerable corporate network. Microsoft’s warning comes just days after the U.S. Department of Homeland Security issued an emergency directive instructing all federal agencies to patch the vulnerability by Sept. 21 at the latest.

Antivirus 238
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synack: Federal agencies and banks have made the most cybersecurity improvements

Tech Republic Security

The overall Attacker Resistance Score for the IT sector dropped this year due in part to digital transformation work, according to the 2020 Trust Report.

article thumbnail

Alien Android Banking Trojan Sidesteps 2FA

Threatpost

A new 'fork' of the Cerberus banking trojan, called Alien, targets victims' credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook.

Banking 127
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A PCI Threat Model

Adam Shostack

The reason I hate compliance programs is because they’re lists of things we need to do, and many times, those things don’t seem to make a great deal of sense. In threat modeling, I talk about the interplay between threats, controls, and requirements, and I joke that “a requirement to have a control absent any threat” is why we hate compliance programs (not joking).

100
100
article thumbnail

Hackers are using Zerologon exploits in attacks in the wild

Security Affairs

Microsoft is warning of threat actors that are actively using the Windows Server Zerologon exploits in attacks in the wild. Microsoft has published a series of Tweets to warn of attackers that are actively exploiting the Windows Server Zerologon in attacks in the wild. The IT giant is urging Windows administrators to install the released security updates as soon as possible.

More Trending

article thumbnail

Microsoft, Italy and the Netherlands agencies warn of EMOTET campaigns

Security Affairs

Experts worldwide warn about a surge in the Emotet activity, this time the alerts are from Microsoft, Italy and the Netherlands agencies. Two weeks ago, cybersecurity agencies across Asia and Europe warned of Emotet spam campaigns targeting businesses in France, Japan, and New Zealand. The French national cyber-security agency published an alert to warn of a significant increase of Emotet attacks targeting the private sector and public administration entities in France.

Malware 117
article thumbnail

A Tip From a Kid Helped Uncover a Slew of Scam Apps

WIRED Threat Level

After a girl reported a suspicious TikTok profile, researchers detected aggressive adware in apps that had been downloaded 2.4 million times.

Adware 103
article thumbnail

Instagram RCE gave hackers remote access to your device

Security Affairs

Facebook has addressed a critical vulnerability in Instagram that could lead to remote code execution and turn the smartphone into a spying device. Facebook has fixed a critical remote code execution vulnerability in Instagram that could lead to the hijack of smartphone cameras, microphones, and more. . The vulnerability, tracked as CVE-2020-1895 , was discovered by Check Point, it is a heap overflow issue that resides in Instagram’s image processing and received a CVSS score of 7.8. R

article thumbnail

Critical Instagram Flaw Could Let Attackers Spy on Victims

Dark Reading

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.

107
107
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Why Are Cybersecurity Professionals Suddenly So Popular?

SecureWorld News

In a world full of Penguins, Jokers, and Riddlers, there is one name above the rest: Batman. That's the way it is in Gotham City. If you carry that story line over into the real world, you could write it like this: On a planet full of hackers, cybercriminals, and ransomware operators, there is one profession above the rest: cybersecurity. New research reveals cybersecurity professionals are riding a wave of popularity from those outside of the security community.

article thumbnail

How Twitter Survived Its Biggest Hack—and Plans to Stop the Next One

WIRED Threat Level

On July 15, Twitter melted down. On Election Day, that's not an option.

Hacking 126
article thumbnail

Malware Attacks Declined But Became More Evasive in Q2

Dark Reading

Most of the malware used in attacks last quarter were designed to evade signature-based detection tools, WatchGuard says.

Malware 104
article thumbnail

Facebook Busts Russian Disinfo Networks as US Election Looms

WIRED Threat Level

The campaigns primarily targeted countries outside the US. But the same mechanisms could be used in “hack and leak” operations like those that roiled the 2016 campaign.

Hacking 80
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Solving the Problem With Security Standards

Dark Reading

More explicit threat models can make security better and open the door to real and needed innovation.

107
107
article thumbnail

Alien Android banking Trojan, the powerful successor of the Cerberus malware

Security Affairs

Security researchers spotted a new strain of Android malware, dubbed Alien, that implements multiple features allowing it to steal credentials from 226 apps. Researchers from ThreatFabric have discovered and analyzed a new strain of Android malware, tracked as Alien, that implements multiple features allowing it to steal credentials from 226 applications.

Banking 80
article thumbnail

Feds Hit with Successful Cyberattack, Data Stolen

Threatpost

The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.

VPN 109
article thumbnail

Top Zero Trust Security Solutions

eSecurity Planet

With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products.

89
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Bluetooth Security Weaknesses Pile Up, While Patching Remains Problematic

Dark Reading

Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard.

article thumbnail

How to install the Graylog system log manager on Ubuntu Server 20.04

Tech Republic Security

Combing through logs on numerous servers can be a chore. Learn how to simplify that with the Graylog monitoring server.

81
article thumbnail

Free Apple iPhone 12? Chatbot Scam Spreads Via Texts

Threatpost

Convincing SMS messages tell victims that they've been selected for a pre-release trial for the soon-to-be-launched device.

Scams 87
article thumbnail

Microsoft Warns of Attackers Now Exploiting 'Zerologon' Flaw

Dark Reading

The Security Intelligence team at Microsoft is tracking newly waged exploits in the wild.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Watch Here: Using Analytics to Measure AppSec ROI

Veracode Security

Maximizing the value of your application security (AppSec) analytics not only provides a window into whether or not you???re meeting security requirements but also it helps you prove your ROI. That can be a challenge for a lot of organizations ??? when stakeholders are not close to the data, they may miss milestones like hitting goals for reducing security debt or even how much AppSec program has matured by data.

52
article thumbnail

Since Remote Work Isn't Going Away, Security Should Be the Focus

Dark Reading

These three steps will help organizations reduce long-term work-from-home security risks.

Risk 90
article thumbnail

Cisco Patch-Palooza Tackles 29 High-Severity Bugs

Threatpost

Patches and workaround fixes address flaws on networking hardware running Cisco IOS XE software.

article thumbnail

CrowdStrike Agrees to Acquire Preemptive Security for $96M

Dark Reading

CrowdStrike plans to use Preemptive Security's conditional access technology to strengthen its Falcon platform.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Architect Security

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (And how long can it stick around?). By: Lauren Kirchner. On the evening of May 29, New Yorkers went out by the thousands for the first big day of protests following the murder of George Floyd. If they were checking Twitter as they headed out the door, they may have seen a surprising warning issued by Terri Rosenblatt, supervising attorney of the DNA Unit at The Legal Aid Society in New York City: Then, when

article thumbnail

CrowdStrike Agrees to Acquire Preempt Security for $96M

Dark Reading

CrowdStrike plans to use Preempt Security's conditional access technology to strengthen its Falcon platform.

article thumbnail

Dark Overlord Hacker Guilty Plea, Motivations

SecureWorld News

A key member of The Dark Overlord hacking group will spend five years in jail. And its possible no one is more surprised than the hacker, himself. Security researcher Vinny Troia loves to communicate with criminal hackers on the dark web. He uses several aliases to do so. The Dark Overlord: 'too smart to get caught'. And at a recent SecureWorld conference, he revealed that he's spent hours messaging and even speaking with The Dark Overlord hacking group.

Hacking 68
article thumbnail

What Are My Photos Revealing About Me? You may be accidentally sharing personal information in your photos (an important Guest Post)

Architect Security

What Are My Photos Revealing About Me? You may be accidentally sharing personal information in your photos. By: Jon Keegan. For years, tech savvy people have known that photos shot on your phone contain lots of information that you may not want revealed. The specific model of phone you use and the precise time and location of where the photo was shot are all saved in the photo’s metadata.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.