Wed.Jul 20, 2022

article thumbnail

Why Businesses Must Address Risks of Quantum Computing NOW Rather Than Wait Until Problems Arrive

Joseph Steinberg

There is little doubt that quantum computing will ultimately undermine the security of most of today’s encryption systems , and, thereby, render vulnerable to exposure nearly every piece of data that is presently protected through the use of encryption. What remains uncertain, however, is when the day of so-called “quantum supremacy” will arrive. As such, many organizations have hesitated to start preparing for the quantum era – after all, they reason, there are enough fires to fight now, and li

Risk 338
article thumbnail

Russia Creates Malware False-Flag App

Schneier on Security

The Russian hacking group Turla released an Android app that seems to aid Ukrainian hackers in their attacks against Russian networks. It’s actually malware, and provides information back to the Russians: The hackers pretended to be a “community of free people around the world who are fighting russia’s aggression”—much like the IT Army.

Malware 304
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI warns of phony cryptocurrency apps aiming to steal money from investors

Tech Republic Security

Cybercriminals are creating fake cryptocurrency investment apps designed to defraud US investors and exploit investment firms, cautions the FBI. The post FBI warns of phony cryptocurrency apps aiming to steal money from investors appeared first on TechRepublic.

article thumbnail

Google ads lead to major malvertising campaign

Malwarebytes

Fraudsters have long been leveraging the shady corners of the internet to place malicious adverts, leading users to various scams. However, every now and again we see a campaign that goes mainstream and targets some of the world’s top brands. Case in point, we recently uncovered a malvertising chain abusing Google’s ad network to redirect visitors to an infrastructure of tech support scams.

Scams 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Acronis Cyber Protect Home Office: The full image backup tool to meet today’s demanding needs

Tech Republic Security

Jack Wallen tests the Acronis Cyber Protect Home Office app, a disaster recovery tool anyone can use to create a full disk clone of crucial systems with ease. The post Acronis Cyber Protect Home Office: The full image backup tool to meet today’s demanding needs appeared first on TechRepublic.

Backups 148
article thumbnail

Salt Security Increases Visibility Into API Security

Security Boulevard

Salt Security today extended its security platform for application programming interfaces (APIs) to include the ability to visually depict API call sequences, create attack simulations before APIs are released into production and gain insights into attacker behaviors and patterns. Elad Koren, chief product officer for Salt Security, said the latest version of the Salt Security.

LifeWorks

More Trending

article thumbnail

HavanaCrypt Ransomware Poses as Google Update

Security Boulevard

Ransomware remains popular in large part because it works. In that sense, it’s not surprising, although it is alarming, that Trend Micro found it had detected and blocked more than 4.4 million ransomware threats stretching across email, URL and file layers during Q1 of 2022—and discovered a new family dubbed HavanaCrypt. The activity in the. The post HavanaCrypt Ransomware Poses as Google Update appeared first on Security Boulevard.

article thumbnail

Veracode Achieves Public Sector Milestone with FedRAMP Authorization

Veracode Security

The software security landscape has drastically evolved over the past few years. Think back to the start of COVID-19. The sudden shift to virtual operations expediated digital transformations. Government agencies now have to release new digital products and services in tighter timeframes, causing public sector leadership to choose between speed of deployments or verifiably secure code.

article thumbnail

The Struggle is Real

Jane Frankland

This week’s blog comes from one of The Source’s interns, Raisa Begum. Raisa is a STEM undergraduate and having started with us by reading a tonne of content, including INSecurity, I wanted her to dig a little deeper on the struggle for women in male dominated industries, like cyber, get her voice out there, and pull some things together for you.

article thumbnail

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Trend Micro

In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking.

Malware 126
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Cybersecurity Policy – time to think outside the box?

The State of Security

When we get into cybersecurity, one of the first things any organisation or company should do is write a cybersecurity policy, one that is owned by all. Easy words to put down on paper, but what do they mean? So, what is a cybersecurity policy? Well, it is defined in the Gartner IT Glossary as, “an […]… Read More. The post Cybersecurity Policy – time to think outside the box?

article thumbnail

Data Breach exposes information related to 69 million members of Neopets

CyberSecurity Insiders

Neopets that offer pet lovers the privilege to pamper a virtual pet were hit by a cyber attack resulting in data breach of over 69 million members and the source code of a few of the virtual games that can be played with digital pets. As per an update released by Bleeping Computer, the online resource to publish this info first, a threat actor named TarTarX was the one who intercepted the database to steal source code and the information stored on the database.

article thumbnail

ESET Research Podcast: Hot security topics at RSA or mostly hype?

We Live Security

Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices. The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity.

article thumbnail

Breaking down CIS's new software supply chain security guidance

CSO Magazine

Securing the software supply chain continues to be one of the most discussed topics currently among IT and cybersecurity leaders. A study by In-Q-Tel researchers shows a rapid rise in software supply chain attacks starting around 2016, going from almost none in 2015 to about 1,500 in 2020. The Cloud Native Computing Foundation’s (CNCF’s) catalog of software supply chain attacks also supports a rise in this attack vector.

Software 118
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Cisco fixes bug that lets attackers execute commands as root

Bleeping Computer

Cisco has addressed severe vulnerabilities in the Cisco Nexus Dashboard data center management solution that can let remote attackers execute commands and perform actions with root or Administrator privileges. [.].

116
116
article thumbnail

Black Basta Ransomware targets Knauf Germany

CyberSecurity Insiders

Black Basta Ransomware has now released the stolen data of one of its victims, which it targeted almost 2-3 weeks ago. As per the information available on its website accessible only through the dark web, Germany company Knauf was targeted by Black Basta on June 29th this year, locking down its database on a temporary note. Knauf that has over 30,000 employees on a global note issued a statement via its website on July 19th this year.

article thumbnail

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

SecureList

Introduction. In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back at what we covered last month, we will see that ransomware (surprise, surprise!) definitely stands out. In this blog post, we provide several excerpts from last month’s reports on new ransomware strains. Luna: brand-new ransomware written in Rust.

article thumbnail

2 Tips For Picking A Sports Betting App

SecureBlitz

Here, I will show you 2 tips for picking a sports betting app. There are an extraordinary number of options. Read more. The post 2 Tips For Picking A Sports Betting App appeared first on SecureBlitz Cybersecurity.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Last member of Gozi malware troika arrives in US for criminal trial

Naked Security

His co-conspirators went into and got out of prison years ago, while he remained free. Now the tables have turned.

Malware 104
article thumbnail

More malware-infested apps, downloaded millions of times, found in the Google Play store

The State of Security

Three million Android users may have lost money and had their devices infected by spyware, after the discovery that the official Google Play store has been distributing apps infected by a new family of malware. Read more in my article on the Tripwire State of Security blog.

Spyware 103
article thumbnail

What InfoSec Pros Can Teach the Organization About ESG

Dark Reading

Security pros' experience with transparency and evaluating third-party partners positions them to act as key environmental, social, and governance advisers.

InfoSec 102
article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

Multiple flaws in MiCODUS MV720 Global Positioning System (GPS) trackers shipped with over 1.5 million vehicles can allow hackers to remotely hack them. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn of multiple security vulnerabilities in MiCODUS MV720 Global Positioning System (GPS) trackers which are used by over 1.5 million vehicles.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Facebook gets round tracking privacy measure by encrypting links

Malwarebytes

A form of individual tracking specific to your web browser is at the heart of a currently contested privacy battle, and one which Facebook has just got the upper hand to. This type of tracking involves adding additional parameters to the URLs that you click on a daily basis. When you click one of these parameter-laden links, the organisation which added the parameter to the URL knows that you’ve clicked it.

article thumbnail

Sophos unifies threat analysis and response units into X-Ops team

CSO Magazine

UK-based cybersecurity vendor Sophos announced today that it had reorganized its SophosLabs, Sophos SecOps and Sophos AI teams into an umbrella group called Sophos X-Ops, in order to provide a more unified response to advanced threats. The company said that while its security teams routinely share information among themselves, the creation of the X-Ops team makes that process faster and more streamlined.

article thumbnail

The Best Way to Detect Threats In the Cloud?

Anton on Security

Let’s continue our fun conversation on threat detection in the cloud that we started in “Who Does What In Cloud Threat Detection?” and “How to Think about Threat Detection in the Cloud” and continued somewhat in “Detection as Code? No, Detection as COOKING!” and “Does the World Need Cloud Detection and Response (CDR)?” Many organizations, and industry at large, still have challenges with defining what good looks like in threat detection in general.

article thumbnail

New Luna ransomware encrypts Windows, Linux, and ESXi systems

Bleeping Computer

A new ransomware family dubbed Luna can be used to encrypt devices running several operating systems, including Windows, Linux, and ESXi systems. [.].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

'AIG' Threat Group Launches With Unique Business Model

Dark Reading

The rapidly growing Atlas Intelligence Group relies on cyber-mercenaries to carry out its missions.

99
article thumbnail

Neopets data breach exposes personal data of 69 million members

Bleeping Computer

Virtual pet website Neopets has suffered a data breach leading to the theft of source code and a database containing the personal information of over 69 million members. [.].

article thumbnail

New Rust-based Ransomware Family Targets Windows, Linux, and ESXi Systems

The Hacker News

Kaspersky security researchers have disclosed details of a brand-new ransomware family written in Rust, making it the third strain after BlackCat and Hive to use the programming language. Luna, as it's called, is "fairly simple" and can run on Windows, Linux, and ESXi systems, with the malware banking on a combination of Curve25519 and AES for encryption.

article thumbnail

How to Mitigate the Risk of Karakurt Data Extortion Group's Tactics, Techniques, and Procedures

Dark Reading

The group has become the new face of ransomware, taking advantage of vulnerabilities and poor encryption.

Risk 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!