Sat.Oct 21, 2023

article thumbnail

A threat actor is selling access to Facebook and Instagram’s Police Portal

Security Affairs

A threat actor is selling access to Facebook and Instagram’s Police Portal used by law enforcement agencies to request data relating to users under investigation. Cyber security researcher Alon Gal, co-founder & CTO of Hudson Rock, first reported that a threat actor is selling access to Facebook and Instagram’s Police Portal. The portal allows law enforcement agencies to request data relating to users (IP, phones, DMs, device info) or request the removal of posts and the ban of a

article thumbnail

American Family Insurance confirms cyberattack is behind IT outages

Bleeping Computer

Insurance giant American Family Insurance has confirmed it suffered a cyberattack and shut down portions of its IT systems after customers reported website outages all week. [.

Insurance 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors breached Okta support system and stole customers’ data

Security Affairs

Okta revealed that threat actors breached its support case management system and stole sensitive data that can be used in future attacks. Okta says that threat actors broke into its support case management system and stole authentication data, including cookies and session tokens, that can be abused in future attacks to impersonate valide users. Okta asks customers to upload an HTTP Archive (HAR) file in order to support them in solving their problems and replicating browser activity.

article thumbnail

Europol Dismantles Ragnar Locker Ransomware Infrastructure, Nabs Key Developer

The Hacker News

Europol on Friday announced the takedown of the infrastructure associated with Ragnar Locker ransomware, alongside the arrest of a "key target" in France. "In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain, and Latvia," the agency said.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

US DoJ seized domains used by North Korean IT workers to defraud businesses worldwide

Security Affairs

The U.S. government seized 17 website domains used by North Korean IT workers in a fraudulent scheme to defraud businesses worldwide. The U.S. government announced the seizure of 17 website domains used by North Korean information technology (IT) workers as part of a fraudulent scheme illicit scheme to defraud businesses worldwide. The illicit funds defraud U.S. and foreign businesses, evade sanctions and fund the development of the DPRK government’s weapons program.

article thumbnail

Okta's Support System Breach Exposes Customer Data to Unidentified Threat Actors

The Hacker News

Identity services provider Okta on Friday disclosed a new security incident that allowed unidentified threat actors to leverage stolen credentials to access its support case management system. "The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases," David Bradbury, Okta's chief security officer, said.

109
109

More Trending

article thumbnail

International Criminal Court systems breached for cyber espionage

Bleeping Computer

The International Criminal Court provided additional information about the cyberattack five weeks ago, saying that it was a targeted operation for espionage purposes. [.

91
article thumbnail

Enhancing Public Safety: The Role of Drones in Emergency Response

SecureBlitz

Here, I will talk about the role of drones in emergency response. In the rapidly evolving world, technology plays an ever-expanding role in ensuring public safety. One remarkable advancement in this regard is the utilization of drones in emergency response operations. Drones have proven to be invaluable tools for various purposes, from search and rescue […] The post Enhancing Public Safety: The Role of Drones in Emergency Response appeared first on SecureBlitz Cybersecurity.

article thumbnail

The Week in Ransomware - October 20th 2023 - Fighting Back

Bleeping Computer

This was a bad week for ransomware, with the Trigona ransomware suffering a data breach and law enforcement disrupting the RagnarLocker ransomware operation. [.

article thumbnail

DEF CON 31 – Corynne McSherry’s, India McKinney’s, Daly Barnett’s, Kate Bertash’s ‘Reproductive Justice In The Age of Digital Surveillance’

Security Boulevard

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel. Permalink The post DEF CON 31 – Corynne McSherry’s, India McKinney’s, Daly Barnett’s, Kate Bertash’s ‘Reproductive Justice In The Age of Digital Surveillance’ appeared first on Security Boulevard.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The Dangerous Mystery of Hamas’ Missing ‘Suicide Drones’

WIRED Threat Level

Hamas has long touted its military drones, but little is known about the true scale of the threat. The answer may have consequences for people on both sides of the Israel-Gaza border.

88