Wed.Aug 26, 2020

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

At the height of his cybercriminal career, the hacker known as “ Hieupc ” was earning $125,000 a month running a bustling identity theft service that siphoned consumer dossiers from some of the world’s top data brokers. That is, until his greed and ambition played straight into an elaborate snare set by the U.S. Secret Service. Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer sk

article thumbnail

What to Do If and When Zoom Goes Down Again

Adam Levin

Zoom’s service outage on August 24 caused a ripple effect felt in schools and companies across the world. Students were unable to attend classes via remote learning, meetings were cancelled and for roughly three hours users were wondered if the now-ubiquitous platform had been brought down by hackers. Although the company later released an announcement attributing the outage to an “application-level bug,” it made clear that most of us are not prepared for an interruption to a service we’ve grown

Education 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI arrested a Russian national for recruiting employee of US firm to plant malware

Security Affairs

FBI authorities arrested a Russian national in the U.S. after attempting to recruit an employee at a targeted company to plant a malware. US authorities arrested the Russian national Egor Igorevich Kriuchkov (27) after attempting to recruit an employee at a targeted company to plant a piece of malware. The man was arrested on August 22 and appeared in court on August 24.

Malware 135
article thumbnail

Podcast with Sidney Dekker

Adam Shostack

This is a really interesting podcast interview with Sidney Dekker, who’s one of the most important thinkers in safety. The Jay Allen Show on Safety. (Fast forward through the first 3 minutes, the content is quite interesting.). Particularly interesting is his discussion of some ‘best practices’ which come out of a poorly supported chain of work by an insurance analyst. “It turns out, the deeper you dig, he made it up.

Insurance 100
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to install Malware Information Sharing Platform on Ubuntu Server 18.04

Tech Republic Security

If you're looking for a platform to help with the collection and sharing of cybersecurity events, you need not look any further than MISP. Jack Wallen shows you how to install this tool.

Malware 108
article thumbnail

Medical Data Leaked on GitHub Due to Developer Errors

Threatpost

Up to 200,000 patient records from Office 365 and Google G Suite exposed by hardcoded credentials and other improper access controls.

More Trending

article thumbnail

Auditing the IRS: Asset Management Problems Causing Cybersecurity Risks

SecureWorld News

The IRS has audited plenty of taxpayers and organizations. But this time, it is the Treasury Inspector General for Tax Administration auditing the IRS, the agency's legacy IT environment and its cybersecurity. The Audit's conclusion? These numbers don't add up. How do you define a legacy system? We all know asset management is hard for organizations.

Risk 94
article thumbnail

Deep Fake: Setting the Stage for Next-Gen Social Engineering

Dark Reading

Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs.

article thumbnail

Hackers for hire group target organizations via 3ds Max exploit

Security Affairs

Experts discovered a new hacker hacker-for-hire group that is targeting organizations worldwide with malware hidden inside malicious 3Ds Max plugins. Security researchers from Bitdefender discovered a new hacker group that is currently targeting companies across the world with malware hidden inside malicious 3Ds Max plugins. Autodesk 3ds Max , formerly 3D Studio and 3D Studio Max, is a professional 3D computer graphics program for making 3D animations, models, games and images.

article thumbnail

Disinformation Spurs a Thriving Industry as U.S. Election Looms

Threatpost

Threat actors are becoming increasingly sophisticated in launching disinformation campaigns - and staying under the radar to avoid detection from Facebook, Twitter and other platforms.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The 'Shared Responsibility' Misnomer: Why the Cloud Continues to Confound

Dark Reading

Under the "shared responsibility model," the security management of cloud offerings is split equally between the vendor and the customer. Easy enough, right?

89
article thumbnail

Hackers Exploit Autodesk Flaw in Recent Cyberespionage Attack

Threatpost

The popular Autodesk software was exploited in a recent cyberespionage campaign against an international architectural company.

article thumbnail

With More Use of Cloud, Passwords Become Even Weaker Link

Dark Reading

Slow patching provides vulnerabilities to exploit. A lack of network segmentation allows unrestricted lateral movement. Yet a report surveying a year of penetration tests finds that passwords still top the list of what attackers use to compromise systems.

article thumbnail

How to Write a Cybersecurity Playbook During a Pandemic

Threatpost

IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 drags on.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

'Transparent Tribe' APT Group Deploys New Android Spyware for Cyber Espionage

Dark Reading

The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India.

Spyware 102
article thumbnail

Cisco Patches ‘High-Severity’ Bugs Impacting Switches, Fibre Storage

Threatpost

Nine bugs were patched, eight of which are rated ‘high’ severity.

VPN 110
article thumbnail

Higher Education CISOs Share COVID-19 Response Stories

Dark Reading

Security leaders from Stanford, Ohio State, and the University of Chicago share challenges and response tactics from the COVID-19 pandemic.

article thumbnail

One Veracoder’s Tips for Setting Up a Successful Security Champions Program

Veracode Security

My name is Seb and I???m an application security (AppSec) engineer, part of the Application Security Consultant (ASC) team here at Veracode. My role is to help remediate flaws at scale and at pace, and to help you get the most out of the Veracode toolset. With a background as an engineering lead, I???ve run AppSec initiatives for government and global retailers.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

US Warns of Ongoing BeagleBoyz Bank-Theft Operations

Dark Reading

The North Korean operatives have attempted to steal more than $2 billion since 2015 in a series of ongoing campaigns.

Banking 94
article thumbnail

NBlog Aug 27 - creative teamwork post-lockdown

Notice Bored

A couple of days ago I blogged about MURAL , just one of many creative tools supporting collaborative working. If you missed it, please catch up and contemplate about how you might use tools such as that right now for teamworking during the COVID19 lockdowns. Today I've been thinking about 'the new normal' as the world emerges from the pandemic, inspired by the intersection of two threads.

article thumbnail

6 Signs Your Supply Chain Risk Just Shot Up

Dark Reading

Risk levels are not steady states. Here are six indications that the danger posed by your supply chain is headed in the wrong direction.

Risk 79
article thumbnail

Understand and Manage Pesky Persistent Threats

McAfee

Ransomware Evolution to Most Promising Victim (MPV) Attacks. Ransomware cost businesses over $11.5 B with a 500% increase in attacks in 2019 according to Forrester Research. It’s your persistent threat. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it and their data until a ransom is paid to unlock it.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Russian National Arrested for Conspiracy to Hack Nevada Company

Dark Reading

The defendant allegedly planned to pay an employee $1 million to infect the company network with malware.

Hacking 89
article thumbnail

Amazon Supplier Fraud

Schneier on Security

Interesting story of an Amazon supplier fraud: According to the indictment, the brothers swapped ASINs for items Amazon ordered to send large quantities of different goods instead. In one instance, Amazon ordered 12 canisters of disinfectant spray costing $94.03. The defendants allegedly shipped 7,000 toothbrushes costing $94.03 each, using the code for the disinfectant spray, and later billed Amazon for over $650,000.

article thumbnail

DeathStalker cyber-mercenary group targets the financial sector

Security Affairs

A hack-for-hire group, tracked as DeathStalker, has been targeting organizations in the financial sector since 2012 Kaspersky researchers say. DeathStalker is a hack-for-hire group discovered by Kaspersky, it has been targeting organizations worldwide, mainly law firms and financial entities, since 2012. Victim organizations are small and medium-sized businesses located in Argentina, China, Cyprus, India, Israel, Lebanon, Switzerland, Russia, Taiwan, Turkey, the United Kingdom and the United Ara

Malware 69