Fri.Sep 30, 2022

article thumbnail

Differences in App Security/Privacy Based on Country

Schneier on Security

Depending on where you are when you download your Android apps, it might collect more or less data about you. The apps we downloaded from Google Play also showed differences based on country in their security and privacy capabilities. One hundred twenty-seven apps varied in what the apps were allowed to access on users’ mobile phones, 49 of which had additional permissions deemed “dangerous” by Google.

Mobile 300
article thumbnail

Fake CISO Profiles on LinkedIn Target Fortune 500s

Krebs on Security

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. But the fabricated LinkedIn identities are confusing search engine results for CISO roles at major companies, and they are being indexed as gospel by various downstream data-scraping sources.

CISO 295
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Chaos malware spreads over multiple architectures

Tech Republic Security

A new malware named Chaos raises concerns as it spreads on multiple architectures and operating systems. The post New Chaos malware spreads over multiple architectures appeared first on TechRepublic.

article thumbnail

Amazon?themed campaigns of Lazarus in the Netherlands and Belgium

We Live Security

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers. The post Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium appeared first on WeLiveSecurity.

140
140
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Report finds women are declining CISO/CSO roles

Tech Republic Security

Professional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture. The post Report finds women are declining CISO/CSO roles appeared first on TechRepublic.

CSO 156
article thumbnail

New Microsoft Exchange zero-days actively exploited in attacks

Bleeping Computer

Threat actors are exploiting yet-to-be-disclosed Microsoft Exchange zero-day bugs allowing for remote code execution, according to claims made by security researchers at Vietnamese cybersecurity outfit GTSC, who first spotted and reported the attacks. [.].

More Trending

article thumbnail

Microsoft: Lazarus hackers are weaponizing open-source software

Bleeping Computer

Microsoft says the North Korean-sponsored Lazarus threat group is trojanizing legitimate open-source software and using it to backdoor organizations in many industry sectors, such as technology, defense, and media entertainment. [.].

Software 132
article thumbnail

ProxyNotShell— the story of the claimed zero day in Microsoft Exchange

DoublePulsar

Yesterday, cybersecurity vendor GTSC Cyber Security dropped a blog saying they had detected exploitation of a new Microsoft Exchange zero… Continue reading on DoublePulsar ».

article thumbnail

Brave browser to start blocking annoying cookie consent banners

Bleeping Computer

The Brave browser will soon allows users to block annoying and potentially privacy-harming cookie consent banners on all websites they visit. [.].

Software 145
article thumbnail

Most hackers need 5 hours or less to break into enterprise environments

CSO Magazine

Around 40% of ethical hackers recently surveyed by the SANS Institute said they can break into most environments they test, if not all. Nearly 60% said they need five hours or less to break into a corporate environment once they identify a weakness. The SANS ethical hacking survey , done in partnership with security firm Bishop Fox, is the first of its kind and collected responses from over 300 ethical hackers working in different roles inside organizations, with different levels of experience a

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Hacking group hides backdoor malware inside Windows logo image

Bleeping Computer

Security researchers have discovered a malicious campaign by the 'Witchetty' hacking group, which uses steganography to hide a backdoor malware in a Windows logo. [.].

Hacking 133
article thumbnail

Malware builder uses fresh tactics to hit victims with Agent Tesla RAT

CSO Magazine

A recently discovered malware builder sold on the dark web , Quantum Builder, is being used in a new campaign featuring fresh tactics to deliver the Agent Tesla.NET-based keylogger and remote access trojan (RAT), according to an alert issued by the ThreatLabz research unit of cybersecurity company Zscaler.

Malware 125
article thumbnail

Experts uncovered novel Malware persistence within VMware ESXi Hypervisors

Security Affairs

Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used by malware authors to achieve administrative access within VMware ESXi Hypervisors and take over vCenter servers and virtual machines for Windows and Linux to perform the following actions: Send commands to the hypervisor that will be routed to the guest VM for execution Transfer files between the ESXi hypervisor and guest machines running benea

Malware 125
article thumbnail

Microsoft confirms new Exchange zero-days are used in attacks

Bleeping Computer

Microsoft has confirmed that two recently reported zero-day vulnerabilities in Microsoft Exchange Server 2013, 2016, and 2019 are being exploited in the wild. [.].

129
129
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Six Ways to Combat Password Fatigue

Security Boulevard

,Password fatigue is the feeling of frustration people develop towards having to use, remember or reset passwords to access their accounts. Unfortunately, the necessity for account security means that passwords are a pervasive element of modern life, with one study finding that the average user has over 100 passwords. In addition, over 40% of users keep professional passwords in their memory , leading to extensive strain and frustration when we can’t recall them.

Passwords 117
article thumbnail

Fired admin cripples former employer's network using old credentials

Bleeping Computer

An IT system administrator of a prominent financial company based in Hawaii, U.S., used a pair of credentials that hadn't been invalidated after he was laid off to wreak havoc on his employer. [.].

article thumbnail

Half of US Consumer’s Personal Data was stolen in 2021

CyberSecurity Insiders

It might sound weird! But according to a survey, half of the US Consumer’s Personal Data was stolen or compromised last year. This was revealed in a 2022 Consumer Impact report released by Identity Theft Resource Center (ITRC) on Tuesday this week. As per the response given by 1371 consumers who were questioned about their experience, it is estimated that half of the population have or might have experienced data theft that was stolen, or compromised in a data breach or misused last year.

article thumbnail

Why developers hold the key to cloud security

InfoWorld on Security

In the days of the on-premises data center and early cloud adoption, the roles of application developers, infrastructure operations, and security were largely siloed. In the cloud, this division of labor increases the time-to-market for innovation, reduces productivity, and invites unnecessary risk. In a data center environment, developers build software applications, IT teams build the infrastructure needed to run those applications, and security teams are responsible for ensuring that applicat

Marketing 116
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware

The Hacker News

A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to steal money by means of fraudulent transactions. "The Prilex group has shown a high level of knowledge about credit and debit card transactions, and how software used for payment processing works," Kaspersky researchers said.

Malware 114
article thumbnail

Patch Management vs Vulnerability Management: A Comparison

Heimadal Security

Patch management is nowadays a necessity for every company that wants to stay safe from cyberattacks, and to ensure that their business is running efficiently, according to the latest software standards. However, what some businesses may not figure out is that patch management is only a string in the net that keeps threat actors at […]. The post Patch Management vs Vulnerability Management: A Comparison appeared first on Heimdal Security Blog.

Software 110
article thumbnail

Unpatched Microsoft Exchange Zero-Day actively exploited in the wild

Security Affairs

Security researchers are warning of a new Microsoft Exchange zero-day that are being exploited by malicious actors in the wild. Cybersecurity firm GTSC discovered two Microsoft Exchange zero-day vulnerabilities that are under active exploitation in attacks in the wild. Both flaws were discovered by the researchers as part of an incident response activity in August 2022, they are remote code execution issues.

Hacking 109
article thumbnail

Zero Trust Is (also) About Protecting Machine Identities

Security Boulevard

Zero Trust Is (also) About Protecting Machine Identities. brooke.crothers. Thu, 09/29/2022 - 09:42. 4 views. Move towards an identity-based Zero Trust cybersecurity approach. The importance of identities is reflected in the recent strategy for a Zero Trust cybersecurity , published by the Office of Management and Budget (OMB). In accordance with the memorandum, the strategy “places significant emphasis on stronger enterprise identity and access controls.”.

IoT 109
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

New malware backdoors VMware ESXi servers to hijack virtual machines

Bleeping Computer

Hackers have found a new method to establish persistence on VMware ESXi hypervisors to control vCenter servers and virtual machines for Windows and Linux while avoiding detection. [.].

Malware 108
article thumbnail

WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation

The Hacker News

Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems. That's according to Vietnamese cybersecurity company GTSC, which discovered the shortcomings as part of its security monitoring and incident response efforts in August 2022.

article thumbnail

New Royal Ransomware emerges in multi-million dollar attacks

Bleeping Computer

A new ransomware operation named Royal is quickly ramping up, targeting corporations with ransom demands ranging from $250,000 to over $2 million. [.].

article thumbnail

54 Best Cybersecurity Podcasts For Technology Adepts!

SecureBlitz

Want the best cybersecurity podcasts? Read on! Every cybersecurity expert needs to stay updated on the latest happenings, tips, and information in the cybersecurity field. However, not everyone loves to read newspapers or paper magazines which are fast becoming old-fashioned. Technology has made cybersecurity information more accessible with the advent of podcasts, a more flexible […].

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

SECURITY ALERT: Heimdal® Responds to CEO Fraud Attempt Launched by Unknown Perpetrator

Heimadal Security

On Wednesday, at around 11:00 AM, Heimdal® representatives received a suggestive email regarding an urgent money transfer. Ensuing an internal investigation, it was discovered that the email which, purportedly, was sent by Morten Kjaersgaard, the company’s CEO, was in fact a fraud attempt. Forensics were inconclusive in this regard; the email itself appeared to be […].

100
100
article thumbnail

Matrix: Install security update to fix end-to-end encryption flaws

Bleeping Computer

Matrix decentralized communication platform has published a security warning about two critical-severity vulnerabilities that affect the end-to-end encryption in the software development kit (SDK). [.].

article thumbnail

Personal App Use on the Rise – And So Are Cloud Security Risks

Security Boulevard

Shadow IT and BYOD are not new problems, but the pandemic highlighted just how much workers rely on cloud applications to increase their productivity. The use of personal apps on the corporate network has become more accepted now than even just a few years ago. But what this has created is more data sprawl, which. The post Personal App Use on the Rise – And So Are Cloud Security Risks appeared first on Security Boulevard.

Risk 98
article thumbnail

Microsoft finally adds a Task Manager link to the Windows 11 taskbar

Bleeping Computer

Microsoft has finally re-added a link to the Task Manager to the taskbar's contextual menu in the latest Windows 11 Insider preview build. [.].

109
109
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.