Thu.Jan 19, 2023

article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. We present seven different attacks against the protocol in three different threat models. As one example, we present a cross-protocol attack which breaks authentication in Threema and which exploits the lack of proper key separation between diff

article thumbnail

New T-Mobile Breach Affects 37 Million Accounts

Krebs on Security

T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile said an investigation determined that someone abused its systems to harvest subscriber data tied to approximately 37 million current customer accounts. Image: customink.com In a filing today with the U.S.

Mobile 338
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

As a cybersecurity blade, ChatGPT can cut both ways

Tech Republic Security

The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense. The post As a cybersecurity blade, ChatGPT can cut both ways appeared first on TechRepublic.

article thumbnail

Roaming Mantis implements new DNS changer in its malicious mobile app in 2022

SecureList

Roaming Mantis (a.k.a Shaoye) is well-known as a long-term cyberattack campaign that uses malicious Android package (APK) files to control infected Android devices and steal device information; it also uses phishing pages to steal user credentials, with a strong financial motivation. Kaspersky has been investigating the actor’s activity throughout 2022, and we observed a DNS changer function used for getting into Wi-Fi routers and undertaking DNS hijacking.

DNS 143
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Secure your email with this top-rated backup service

Tech Republic Security

Mail Backup X is the ultimate solution to protect your email from corruptions and crashes. The post Secure your email with this top-rated backup service appeared first on TechRepublic.

Backups 166
article thumbnail

Cybersecurity in the Metaverse Will Require New Approaches

eSecurity Planet

Despite challenges faced by Meta and others, there remains optimism for the metaverse. The PwC 2022 U.S. Business and Consumer Metaverse Survey highlights this. The survey, which included over 5,000 consumers and 1,000 U.S. business leaders, shows that half of consumers consider the metaverse to be exciting, and 66% of executives say their companies are actively engaged with it.

LifeWorks

More Trending

article thumbnail

T-Mobile hacked to steal data of 37 million accounts in API data breach

Bleeping Computer

T-Mobile disclosed a new data breach after a threat actor stole the personal information of 37 million current postpaid and prepaid customer accounts through one of its Application Programming Interfaces (APIs). [.

article thumbnail

PayPal Breach Exposed PII of Nearly 35K Accounts

Dark Reading

The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.

article thumbnail

PayPal accounts breached in large-scale credential stuffing attack

Bleeping Computer

PayPal is sending out notices of a data breach to thousands of users who had their accounts accessed by credential stuffing actors, resulting in the compromise of some personal data. [.

article thumbnail

New T-Mobile Breach Affects 37 Million Accounts

Security Boulevard

T-Mobile today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile said an investigation determined that someone abused its systems to harvest subscriber data tied to approximately 37 million current customer accounts. The post New T-Mobile Breach Affects 37 Million Accounts appeared first on Security Boulevard.

Mobile 132
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

New 'Hook' Android malware lets hackers remotely control your phone

Bleeping Computer

A new Android malware named 'Hook' is being sold by cybercriminals, boasting it can remotely take over mobile devices in real-time using VNC (virtual network computing). [.

Malware 135
article thumbnail

Attackers Crafted Custom Malware for Fortinet Zero-Day

Dark Reading

The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.

Malware 131
article thumbnail

Mailchimp slips up again, suffers security breach after falling on social engineering banana skin

Graham Cluley

For the second time in less than a year, email newsletter service Mailchimp has found itself in the embarrassing position of admitting it has suffered a data breach, putting its customers' subscribers at risk.

article thumbnail

Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware

The Hacker News

A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks targeting a European government entity and a managed service provider (MSP) located in Africa.

VPN 124
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Git Patches Two Vulnerabilities With Critical Security Level

Heimadal Security

In their latest update, Git has patched two new security flaws, both of them with a critical level of security. If left unpatched, the vulnerabilities could allow attackers to execute arbitrary code after successfully exploiting heap-based buffer overflow weaknesses. Git Update Details On January 17th, Git released versions 15.7.5, 15.6.6, and 15.5.9 for GitLab Community […] The post Git Patches Two Vulnerabilities With Critical Security Level appeared first on Heimdal Security Blog.

article thumbnail

Former Uber CISO Conviction Affirmed by Trial Court

Security Boulevard

On January 11, 2023, presiding United States District Judge William Orrick in San Francisco denied the motion of Joe Sullivan, the former CISO of Uber, for a judgment of acquittal. The conviction arose from Sullivan’s agreement to pay attackers who breached the security of the online ride-sharing service and obtained personal information about thousands of.

CISO 114
article thumbnail

Ransomware attack on Yum Brands Inc closes 300 restaurants in the UK

CyberSecurity Insiders

Yum Brands Inc, officially the owner of top food chain restaurants KFC, Taco Bell and Pizza Hut, was reportedly hit by a ransomware attack, forcing the IT staff to close about 300 eatery outlets across the United Kingdom. As the malware targeted, the core servers, orders and billing were deeply affected, resulting in temporary shut of the outlets from afternoon hours of January 18th, 2023, i.e.

article thumbnail

MailChimp Suffers Data Breach Due to Social Engineering Attack

Heimadal Security

MailChimp announced it has been victim to a social engineering attack that threat actors successfully performed on the company`s employees and contractors. Hackers managed to obtain employee credentials and gain access to an internal customer support and account administration tool. The attack affected the data of 133 customers. MailChimp detected the attack on January 11th, […] The post MailChimp Suffers Data Breach Due to Social Engineering Attack appeared first on Heimdal Security Blog.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Remote Leadership: How To Lead And Manage a Remote Team

SecureBlitz

In this post, I will talk about remote leadership and how to lead and manage a remote team. Being a good leader is hard enough in an office. But when you have to deal with remote teams, the process becomes much more complicated. That’s why when comparing good leaders vs. bad leaders, one of the […] The post Remote Leadership: How To Lead And Manage a Remote Team appeared first on SecureBlitz Cybersecurity.

article thumbnail

Ransom-what? Learning from Hacked Hackers

SecureWorld News

Did you hear the one about how the hacker got away from the FBI? He ran-some-where. That is how James McQuiggan, CISSP, Security Awareness Advocate for KnowBe4, kicked off the recent SecureWorld Remote Sessions webcast titled, "Ransomware, Ransom-war, and Ran-some-where: What We Can Learn When the Hackers Get Hacked." McQuiggan, a former cybersecurity awareness lead at Siemens Energy, used the self-professed dad joke to make a point that hackers do all they can to stay ahead of the good guys, bu

Hacking 109
article thumbnail

How To Unblock New Netflix Shows

SecureBlitz

This post will show you how to unblock new Netflix shows… Netflix has quickly become one of the most popular streaming platforms in the world. Its ease of access, cost-effective, all-in-one solution is ideal for a modern world where instant gratification thrives. Gone are the days of having to rent a video or a DVD […] The post How To Unblock New Netflix Shows appeared first on SecureBlitz Cybersecurity.

article thumbnail

EmojiDeploy Attack Chain Targets Misconfigured Azure Service

Dark Reading

Multiple misconfigurations in a service that underpins many Azure features could have allowed an attacker to remotely compromise a cloud user's system.

109
109
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Just How Critical Is Customer Onboarding?

SecureBlitz

ssSometimes many businesses fall short with the customer journey regarding customer onboarding. They feel that enough resources have been allocated to get the customer to sign the contract deal, install the product, follow the instructions, and that’s it. Money collected and time to move on. Yet these days, there’s a lot of heavy competition, especially […] The post Just How Critical Is Customer Onboarding?

article thumbnail

Cyber Attack news headlines trending on Google

CyberSecurity Insiders

The first news that is trending is associated with financial service provider PayPal. News is out that social security numbers of nearly 35,000 users were leaked in a cyber attack that could have emerged from a credential stuffing campaign launched by a state funded actor. According to the update provided by a source from PayPal, the attack took place on December 6 and was identified at the end of last month.

article thumbnail

The Role Of Proxies For SEO And SMM Professionals

SecureBlitz

Proxies play an important role for SEO and SMM professionals as they allow them to perform tasks that would otherwise be difficult or impossible. This article will explore the various ways in which proxies can be used by SEO and SMM professionals, including tasks such as keyword research, link building, social media management, and more. […] The post The Role Of Proxies For SEO And SMM Professionals appeared first on SecureBlitz Cybersecurity.

Media 109
article thumbnail

Bitzlato cryptocurrency exchange shut down by authorities, accused of cybercriminal links

Graham Cluley

The Bitzlato cryptocurrency exchange has had its website seized by the authorities, after its Russian founder was charged with processing more than US $700m worth of "dirty money" on behalf of criminals.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ransomware profits drop 40% in 2022 as victims refuse to pay

Bleeping Computer

Ransomware gangs extorted from victims about $456.8 million throughout 2022, a drop of roughly 40% from the record-breaking $765 million recorded in the previous two years. [.

article thumbnail

Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest

CyberSecurity Insiders

In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. In this blog, we’ll tackle encrypting AWS in transit and at rest. Sometimes, despite all efforts to the contrary, data can be compromised. This can occur due to data leakage through faulty apps or systems, by laptops or portable storage devices being lost, by malicious actors breaking through security defenses, by social engineering attacks, or by data being int

article thumbnail

S3 Ep118: Guess your password? No need if it’s stolen already! [Audio + Text]

Naked Security

As always: entertaining, informative and educational. and not bogged down with jargon! Listen (or read) now.

Passwords 102
article thumbnail

A Sneaky Ad Scam Tore Through 11 Million Phones

WIRED Threat Level

Some 1,700 spoofed apps, 120 targeted publishers, 12 billion false ad requests per day—Vastflux is one of the biggest ad frauds ever discovered.

Scams 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!