Fri.Sep 16, 2022

article thumbnail

Relay Attack against Teslas

Schneier on Security

Nice work : Radio relay attacks are technically complicated to execute, but conceptually easy to understand: attackers simply extend the range of your existing key using what is essentially a high-tech walkie-talkie. One thief stands near you while you’re in the grocery store, intercepting your key’s transmitted signal with a radio transceiver.

article thumbnail

How does data governance affect data security and privacy?

Tech Republic Security

While it's important to implement processes and procedures that safeguard data security and privacy, you can also focus on more strategic data governance goals. The post How does data governance affect data security and privacy? appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massive Data Breach at Uber

Schneier on Security

It’s big : The breach appeared to have compromised many of Uber’s internal systems, and a person claiming responsibility for the hack sent images of email, cloud storage and code repositories to cybersecurity researchers and The New York Times. “They pretty much have full access to Uber,” said Sam Curry, a security engineer at Yuga Labs who corresponded with the person who claimed to be responsible for the breach. “This is a total compromise, from what it looks like

article thumbnail

Report: Digital trust is critical, but many enterprises are not prioritizing it

Tech Republic Security

One breach of digital trust can cause devastating reputational, regulatory and financial repercussions, according to ISACA’s State of Digital Trust 2022 survey findings. The post Report: Digital trust is critical, but many enterprises are not prioritizing it appeared first on TechRepublic.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Uber’s hacker *irritated* his way into its network, stole internal documents

Graham Cluley

Uber has suffered a security breach which allowed a hacker to break into its network, and access the company's internal documents and systems. How did they do it? By bombarding an employee with a spate of multi-factor authentication (MFA) push notifications.

article thumbnail

High demand for breached cloud account credentials

CyberSecurity Insiders

According to State of Cloud Security Report compiled by Snyk, over 80% of organizations have suffered cloud security in the past one year and an equal proportion of them have suffered a data breach, but aren’t aware of it due to lack of coordination between teams & policy frameworks, enforcement challenges and budget allotment on time. The report that was compiled after taking the response of over 400 cloud engineers and security analysts concluded that their cloud platforms suffered a varie

More Trending

article thumbnail

Ransomware franchising: How do groups get started?

Digital Shadows

Getting started in any business is a tricky affair. While estimations may vary, it’s widely believed that around 9 in. The post Ransomware franchising: How do groups get started? first appeared on Digital Shadows.

article thumbnail

FBI warns of criminals attacking healthcare payment processors

The State of Security

Millions of dollars have been stolen from healthcare companies after fraudsters gained access to customer accounts and redirected payments. In a newly-published advisory directed at the healthcare payment industry, the FBI warns that cybercriminals are using a cocktail of publicly-available Personally Identifiable Information (PII) and social engineering techniques to impersonate victims and obtain access to […]… Read More.

article thumbnail

What is Managed Detection and Response (MDR)?

Heimadal Security

The term managed detection and response (MDR) refers to a cybersecurity service that employs advanced technologies and human expertise to carry out threat hunting, monitoring, and response, assisting in diagnosing and minimizing the severity of threats without the necessity of additional employees. A cutting-edge 24/7 security control that frequently consists of a variety of core […].

article thumbnail

Hacker sells stolen Starbucks data of 219,000 Singapore customers

Bleeping Computer

The Singapore division of Starbucks, the popular American coffeehouse chain, has admitted that it suffered a data breach incident impacting over 219,000 of its customers. [.].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

North Korea-linked APT spreads tainted versions of PuTTY via WhatsApp

Security Affairs

North Korea-linked threat actor UNC4034 is spreading tainted versions of the PuTTY SSH and Telnet client. In July 2022, Mandiant identified a novel spear phish methodology that was employed by North Korea-linked threat actor UNC4034. The attackers are spreading tainted versions of the PuTTY SSH and Telnet client. The attack chain starts with a fake job opportunity at Amazon sent to the victims via email.

Phishing 122
article thumbnail

Uber hacked, internal systems breached and vulnerability reports stolen

Bleeping Computer

Uber suffered a cyberattack Thursday afternoon with a hacker gaining access to vulnerability reports and sharing screenshots of the company's internal systems, email dashboard, and Slack server. [.].

Hacking 122
article thumbnail

UBER HAS BEEN HACKED, boasts hacker – how to stop it happening to you

Naked Security

Uber is all over the news for a widely-publicised data breach. We help you answer the question, "How do I stop this happening to me?".

article thumbnail

New VPN Service Makes Digital Privacy Protection More Convenient

Security Boulevard

In conjunction with Black Hat last month, BlackCloak announced the forthcoming rollout of our new VPN (virtual private network) service. The VPN officially rolled out to all members last week. Our VPN can now be conveniently accessed directly from the BlackCloak mobile and desktop applications. If you’ve used our previous VPN service, you’ll want to […].

VPN 108
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

US OMB releases guidance on federal agency software security requirements

CSO Magazine

Earlier this week, Chris DeRusha, federal CISO and deputy national cyber director in the White House, announced the release of Office of Management and Budget (OMB) guidance to ensure federal agencies rely only on software that has been built following standard cybersecurity practices. This software security requirement applies to all civilian federal agencies and software security vendors who do business with them.

Software 108
article thumbnail

Starbucks Singapore Customer Data Accessed Illegally in Data Leak

Heimadal Security

Starbucks Singapore notifies members of its Rewards loyalty programme that personal information, including phone numbers, addresses, and birthdays has been illegally accessed in a data leak. What Data Leaked? According to ZDNET, on September 10th, a group of hackers claimed it has gained access to Starbucks Singapore’s Rewards database, containing more than 553.000 records.

article thumbnail

Rising to the challenges of secure coding – Week in security with Tony Anscombe

We Live Security

The news seems awash this week with reports of both Microsoft and Apple scrambling to patch security flaws in their products. The post Rising to the challenges of secure coding – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

107
107
article thumbnail

What Is Privileged Identity Management (PIM)?

Heimadal Security

When we talk about Privileged Access Management (PAM), Privileged Identity Management (PIM), Identity and Access Management (IAM), and other access management terms, we think of technologies for protecting a company’s critical assets. These phrases refer to maintaining the security of both systems and sensitive information by controlling who has access and what they are permitted […].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Uber responding to “cybersecurity incident” following reports of significant data breach

CSO Magazine

Ride-hailing giant Uber has confirmed that it is responding to a cybersecurity incident as reports emerge that the firm has suffered a significant network data breach forcing it to shut down several internal communications and engineering systems. Attacker announces Uber breach through compromised Slack account. In a statement on Twitter , Uber wrote “We are currently responding to a cybersecurity incident.

article thumbnail

Bitdefender releases free decryptor for LockerGoga ransomware

Bleeping Computer

Romanian cybersecurity firm Bitdefender has released a free decryptor to help LockerGoga ransomware victims recover their files without paying a ransom. [.].

article thumbnail

Deliver Secure Digital Workspaces with Citrix Virtual Apps and Desktops on Microsoft Azure

Tech Republic Security

Where, when, and how people work has dramatically changed. Remote work trends are here to stay while fewer employees than ever before are working full-time in traditional offices. This distributed world has forced additional IT demands on your business. It is now essential that IT solutions unite the modern workplace, not hinder it. IT needs. The post Deliver Secure Digital Workspaces with Citrix Virtual Apps and Desktops on Microsoft Azure appeared first on TechRepublic.

article thumbnail

Hive Ransomware Group Hits Bell Canada Subsidiary

Heimadal Security

Ransomware-as-a-Service (RaaS) group Hive claimed to be behind a cyberattack that hit Bell Technical Solutions (BTS), an independent subsidiary of Bell Canada with 4.500 employees, that specializes in Bell services across Ontario and Québec. Hive claims that the attack took place this year on August 20th, but no official confirmation came from the Canadian telecommunications […].

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Webworm Hackers Using Modified RATs in Latest Cyber Espionage Attacks

The Hacker News

A threat actor tracked under the moniker Webworm has been linked to bespoke Windows-based remote access trojans, some of which are said to be in pre-deployment or testing phases.

article thumbnail

Business Application Compromise & the Evolving Art of Social Engineering

Dark Reading

Be wary of being pestered into making a bad decision. As digital applications proliferate, educating users against social engineering attempts is a key part of a strong defense.

article thumbnail

New malware bundle self-spreads through YouTube gaming videos

Bleeping Computer

A new malware bundle uses victims' YouTube channels to upload malicious video tutorials advertising fake cheats and cracks for popular video games to spread the malicious package further. [.].

Malware 99
article thumbnail

North Korean Hackers Spreading Trojanized Versions of PuTTY Client Application

The Hacker News

A threat with a North Korea nexus has been found leveraging a "novel spear phish methodology" that involves making use of trojanized versions of the PuTTY SSH and Telnet client. Google-owned threat intelligence firm Mandiant attributed the new campaign to an emerging threat cluster it tracks under the name UNC4034.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Friday Five 9/16

Digital Guardian

Twitter’s security scandal going from bad to worse and malware spreading through YouTube made headlines this week. Read about these stories and more in this week’s Friday Five!

Malware 98
article thumbnail

Intel Expands Bug Bounty Program – Techstrong TV

Security Boulevard

Intel is expanding its Bug Bounty program with Project Circuit Breaker, bringing together a community of elite hackers to hunt bugs in firmware, hypervisors, GPUs, chipsets and more. Charlene O’Hanlon and Katie Noble discuss the first of these efforts and how Intel plans to take this initiative further. The video is below followed by a. The post Intel Expands Bug Bounty Program – Techstrong TV appeared first on Security Boulevard.

article thumbnail

Akamai stopped new record-breaking DDoS attack in Europe

Bleeping Computer

A new distributed denial-of-service (DDoS) attack that took place on Monday, September 12, has broken the previous record that Akamai recorded recently in July. [.].

DDOS 101
article thumbnail

Uber Says It's Investigating a Potential Breach of Its Computer Systems

The Hacker News

Ride hailing giant Uber disclosed Thursday it's responding to a cybersecurity incident involving a breach of its network and that it's in touch with law enforcement authorities. The New York Times first reported the incident. The company pointed to its tweeted statement when asked for comment on the matter.

Hacking 97
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.