Tue.Aug 24, 2021

article thumbnail

Risk officers and board members don't agree on use of tech and data in business

Tech Republic Security

Survey by EY finds that board members are interested in spending more money on technology and data analytics for risk management.

Risk 188
article thumbnail

New zero-click iPhone exploit used to deploy NSO spyware

Bleeping Computer

Digital threat researchers at Citizen Lab have uncovered a new zero-click iMessage exploit used to deploy NSO Group's Pegasus spyware on devices belonging to Bahraini activists. [.].

Spyware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Power Apps misconfiguration exposes data from 38 million records

Tech Republic Security

The leaked data included personal information for COVID-19 contact tracing and vaccination appointments, social security numbers for job applicants, employee IDs, names and email addresses.

147
147
article thumbnail

More and More Companies Are Getting Hit with Ransomware

Heimadal Security

The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world, threat actors take advantage of security vulnerabilities and encrypt data belonging to all sorts of organizations: from private businesses to healthcare facilities and governments. What motivates the ransomware actors to become even more […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

4 most dangerous emerging ransomware threat groups to watch

CSO Magazine

New research from Palo Alto Networks’ Unit 42 has identified four emerging ransomware groups that have the potential to become bigger problems in the future. These are AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0. [ Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters.

article thumbnail

The Top 10 Highest Paying Jobs in Information Security – Part 2

The State of Security

Information security is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. In an effort to map out the industry as a possible career choice, we recently conducted research into the top 10 infosec jobs based on overall pay grade. We now continue with the second part of our two-part series. #5: […]… Read More.

More Trending

article thumbnail

Banking’s Digital Future Raises Security Concerns

Security Boulevard

As the global financial services industry undergoes a seismic shift, disruption is prompting the industry to replace traditional practices, with emphasis on the inevitable digital future banks will have to embrace. In a report from Deloitte, nearly three-quarters (73%) of respondents said they fear their organizations would lose competitive advantage if they fail to adopt.

article thumbnail

Intellectual property protection: 10 tips to keep IP safe

CSO Magazine

Intellectual property (IP) is the lifeblood of every organization. It didn’t used to be. As a result, now more than ever, it’s a target, placed squarely in the cross-hairs by various forms of cyber attack. Witness the long list of hacks on Hollywood and the entertainment industry’s IP including “ Pirates of the Caribbean ” and more recently HBO’s “Game of Thrones.

article thumbnail

Triada Trojan in WhatsApp MOD

SecureList

WhatsApp users sometimes feel the official app is lacking a useful feature of one sort or another, be it animated themes, self-destructing messages which automatically delete themselves, the option of hiding certain conversations from the main list, automatic translation of messages, or the option of viewing messages that have been deleted by the sender.

Malware 141
article thumbnail

What CISOs need to know about Wi-Fi 6E

CSO Magazine

Wi-Fi 6E is a technical extension of the Wi-Fi 6 standard to deliver improved Wi-Fi capacity, less interference, and higher throughput. Introduced in January 2021 by the Wi-Fi Alliance, Wi-Fi 6E allows for an increased frequency band of 6 GHz, providing up to 1,200 MHz of additional spectrum compared to Wi-Fi 6. In April 2020, the FCC voted to open 6 GHz for unlicensed use , meaning that electrical consumer products such as phones, tablets, laptops, and routers could benefit from the enhanced Wi

CISO 141
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Don't get rugged: DeFi scams go from zero to $129 million in a year to become top financial hack

Tech Republic Security

Atlas VPN's analysis finds that theft within decentralized finance networks is taking in more money than phishing and ransomware attacks.

VPN 147
article thumbnail

Windows 10 KB5005932 fixes devices that can't install new updates

Bleeping Computer

Microsoft has released the Windows 10 KB5005932 setup update to fix '"PSFX_E_MATCHING_BINARY_MISSING" errors when attempting to install the latest cumulative updates. [.].

139
139
article thumbnail

Five Steps to Get a Cybersecurity Job

CyberSecurity Insiders

Finding your first job in any field is often a challenge. But your first job in cybersecurity? With no previous experience? That may seem impossible, but it’s not. According to the (ISC)² Cybersecurity Workforce Study 2020 , the cybersecurity workforce needs to grow by 89% to effectively defend organizations’ critical assets; however, that doesn’t mean jobs are easy to find for all eager applicants.

article thumbnail

CISA’s Joint Cyber Defense Collaborative: Why it just might work

CSO Magazine

The Cybersecurity and Infrastructure Security Agency (CISA) within the Department of Homeland Security (DHS) has a new director, Jen Easterly. The Senate confirmed Easterly in July, with swearing taking place on August 09, 2021. It should come as no surprise to CISOs to see Easterly dig in and immediately leverage the newly minted Joint Cyber Defense Collaborative (JCDC), which was authorized in the National Defense Authorization Act of 2021.

CISO 136
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

SteelSeries bug gives Windows 10 admin rights by plugging in a device

Bleeping Computer

The official app for installing SteelSeries devices on Windows 10 can be exploited to obtain administrator rights, a security researcher has found. [.].

143
143
article thumbnail

Building A Secure Cloud: Strong Data Protection

Security Boulevard

Data breaches in the cloud consistently make news headlines. Yet, the data breach stories are often vague explanations — a […]. The post Building A Secure Cloud: Strong Data Protection appeared first on Sonrai Security. The post Building A Secure Cloud: Strong Data Protection appeared first on Security Boulevard.

article thumbnail

Ransomware gang's script shows exactly the files they're after

Bleeping Computer

A PowerShell script used by the Pysa ransomware operation gives us a sneak peek at the types of data they attempt to steal during a cyberattack. [.].

article thumbnail

Back-to-Basics: Properly Configured Firewalls

PCI perspectives

As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses.

Firewall 128
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

The SideWalk may be as dangerous as the CROSSWALK

We Live Security

Meet SparklingGoblin, a member of the Winnti family. The post The SideWalk may be as dangerous as the CROSSWALK appeared first on WeLiveSecurity.

Malware 141
article thumbnail

Microsoft offers tips to secure Windows 365 Cloud PCs

CyberSecurity Insiders

Microsoft has issued some tips to protect those who are using Windows 365 Cloud PCs and here are some details-. 1.) First, Microsoft is asking its Windows 365 Enterprise Customers to follow standard Win 10 practices that include admin privileges only to those eligible. 2.) It is also urging its 365 customers to download and install Microsoft Endpoint Manager and leverage Microsoft Defender to secure endpoints, including those PCs using cloud services. 3.

article thumbnail

Samsung can remotely disable their TVs worldwide using TV Block

Bleeping Computer

Samsung says that it can disable any of its Samsung TV sets remotely using TV Block, a feature built into all television products sold worldwide. [.].

133
133
article thumbnail

Microsoft, Google partner on eBPF

InfoWorld on Security

Companies including Microsoft, Google, and Facebook are backing an initiative to promote the extended Berkley Packet Filter ( eBPF ), technology that enables developers to safely embed programs in any piece of software including operating system kernels. Hosted by the Linux Foundation, the new eBPF Foundation , which was unveiled August 12, plans to expand eBPF and extend it beyond Linux.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

FBI flash alert warns on OnePercent Group Ransomware attacks

Security Affairs

The FBI shared info about OnePercent Group that has been actively targeting US organizations in ransomware attacks since at least November 2020. The Federal Bureau of Investigation (FBI) has published a flash alert about a threat actor known as OnePercent Group that has been actively targeting US organizations in ransomware attacks since at least November 2020.

article thumbnail

Firmware: Beyond Securing the Software Stack

Security Boulevard

Picture a house equipped with state-of-the-art alarm systems, sensors, locks and cameras. From the outside, the house might seem reasonably protected against potential intruders. However, if a savvy thief managed to infiltrate the residence through its crawl space, the very foundation of the house might be putting the overall security of the home at risk.

Firmware 118
article thumbnail

Realtek SDK flaws exploited to deliver Mirai bot variant

Security Affairs

Researchers warn that threat actors are actively exploiting Realtek SDK vulnerabilities since their technical details were publicly disclosed. Researchers from SAM Seamless Network warn that threat actors are actively exploiting Realtek SDK vulnerabilities since their technical details were publicly disclosed. Realtek published a security advisory on August 15 to warn customers about security updates to address vulnerabilities in its software developers kits (SDK) which is used by at least 65 se

IoT 115
article thumbnail

Rain Washes Away Arizona Border Wall… AGAIN

Security Boulevard

Let me start this crazy story by saying in 2007 there was a huge debate in Arizona about water washing away the border wall. Yes, you read that right. Nearly 15 years ago — FIFTEEN — federal officials were sternly warned their wall designs would fail catastrophically due to basic water runoff. In October 2007, … Continue reading Rain Washes Away Arizona Border Wall… AGAIN ?.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Survey: Boards want to invest more in technology, data analytics

Tech Republic Security

Risk officers would rather stay in their compliance roles than add data usage to their duties, EY survey says.

article thumbnail

Consumer Confidence in Data Security Plummets

Security Boulevard

Organizations’ increasing use of contractors, freelancers and other third-party workers is weakening consumers’ trust in their data security, according to a study by SecZetta. The survey of more than 2,000 U.S. adults revealed 83% of respondents agree that those data systems have become more vulnerable to cyberattacks and nearly nine in 10 survey respondents said.

CISO 115
article thumbnail

Ransomware news headlines trending on Google

CyberSecurity Insiders

FBI has issued a fresh alert against the activities being carried out by a newly detected ransomware group dubbed OnePercent. The law enforcement agency says that the threat actors have been targeting companies since Nov’2020 by using the emulation software of Cobalt Strike. In the latest discovery made by FBI, security analysts found that the OnePercent Ransomware group was compromised victims via phishing emails that were laced with malicious attachments such as Banking Trojans.

article thumbnail

Microsoft Power Apps misconfiguration exposes millions of records

We Live Security

The caches of data that were publicly accessible included names, email addresses and social security numbers. The post Microsoft Power Apps misconfiguration exposes millions of records appeared first on WeLiveSecurity.

109
109
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.