Thu.Oct 05, 2023

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.

article thumbnail

NSA and CISA reveal top 10 cybersecurity misconfigurations

Bleeping Computer

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. [.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Massachusetts pumps $1.1 million into state college cybersecurity training programs

The Last Watchdog

Worcester, Mass., Oct. 5, 2023 – Today, the Healey-Driscoll Administration kicked off Cybersecurity Month in Massachusetts with the announcement of $1,136,911 in funding to develop a new cybersecurity training center at MassBay Community College and support the existing center at Bridgewater State University. The grants are part of the state’s SOC/Range Initiative, a program managed by MassTech’s MassCyberCenter that aims to help build a diverse generation of cybersecurity professionals thro

article thumbnail

NATO is investigating a new cyber attack claimed by the SiegedSec group

Security Affairs

NATO is investigating claims that a group called SiegedSec has breached its systems and leaked a cache of unclassified documents online. NATO announced it is investigating claims that a politically motivated threat actor called SiegedSec has breached its systems and leaked unclassified documents online. “NATO cyber experts are actively addressing incidents affecting some unclassified NATO websites,” reads a statement issued by s NATO official to media outlets.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft Redesigns OneDrive for Business Layout

Tech Republic Security

Microsoft OneDrive is adding new SharePoint features and will let the Copilot AI summarize and interpret files.

article thumbnail

Operation Jacana: Foundling hobbits in Guyana

We Live Security

ESET researchers uncover a cyberespionage campaign that they called Operation Jacana and that targeted a governmental entity in Guyana.

145
145

More Trending

article thumbnail

Unkillable? Qakbot Infections Fly On Even After Its High-Profile Raid

Dark Reading

A literal seven-nation (cyber) army wasn't enough to hold back the famous initial access broker (IAB) for long — it's been chugging along, spreading ransomware, despite a massive takedown in August.

article thumbnail

Belgian intelligence service VSSE accused Alibaba of ‘possible espionage’ at European hub in Liege

Security Affairs

Belgian intelligence agency State Security Service (VSSE) fears that Chinese giant Alibaba is spying on logistics to gather financial intelligence. The Belgian intelligence service VSSE revealed that is investigating potential cyber espionage activities carried out by Chinese firms, including the Alibaba Group Holding, at a cargo airport in Liege. According to the Financial Times , Alibaba has located its main European logistics centre at Liege Airport and the VSSE was working to “detect a

article thumbnail

Exploits released for Linux flaw giving root on major distros

Bleeping Computer

Proof-of-concept exploits have already surfaced online for a high-severity flaw in GNU C Library's dynamic loader, allowing local attackers to gain root privileges on major Linux distributions. [.

121
121
article thumbnail

GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries

The Hacker News

A new Android banking trojan named GoldDigger has been found targeting several financial applications with an aim to siphon victims' funds and backdoor infected devices. "The malware targets more than 50 Vietnamese banking, e-wallet and crypto wallet applications," Group-IB said.

Banking 122
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CISA adds JetBrains TeamCity and Windows flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

The U.S. CISA added JetBrains TeamCity and Windows vulnerabilities to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the JetBrains TeamCity flaw CVE-2023-42793 (CVSS score: 9.8) and Windows bug CVE-2023-28229 (CVSS score: 7.0) to its Known Exploited Vulnerabilities Catalog. Below are the descriptions of the two vulnerabilities: CVE-2023-42793 JetBrains TeamCity Authentication Bypass Vulnerability.

article thumbnail

CISA Warns of Active Exploitation of JetBrains and Windows Vulnerabilities

The Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation, while removing five bugs from the list due to lack of adequate evidence. The vulnerabilities newly added are below - CVE-2023-42793 (CVSS score: 9.

article thumbnail

Critical Zero-Day Bug in Atlassian Confluence Under Active Exploit

Dark Reading

Patch now: The Atlassian security vulnerability appears to be a remotely exploitable privilege-escalation bug that cyberattackers could use to crack collaboration environments wide open.

107
107
article thumbnail

Cisco Releases Urgent Patch to Fix Critical Flaw in Emergency Responder Systems

The Hacker News

Cisco has released updates to address a critical security flaw impacting Emergency Responder that allows unauthenticated, remote attackers to sign into susceptible systems using hard-coded credentials. The vulnerability, tracked as CVE-2023-20101 (CVSS score: 9.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Legions of Critical Infrastructure Devices Subject to Cyber Targeting

Dark Reading

Nearly 100,000 ICS devices have been found open to the public Internet, potentially threatening physical safety globally. Here's how to quantify the risk.

Internet 114
article thumbnail

Who is Watching You and Why?

Approachable Cyber Threats

Category Awareness, Cybersecurity Fundamentals, Guides, Privacy Risk Level In the musical words of Rockwell, ? “I always feel like somebody’s watching me - and I have no privacy.” ?Who might be watching you through your webcam, and what can you do to stop it? The global pandemic and the increase of remote workers has led to a surge in online video conferencing using tools such as Zoom and Google Meet - Zoom alone has tripled its user base since 2019.

Passwords 106
article thumbnail

Arm, Qualcomm Patch Multiple Zero-Days Reported by Google

SecureWorld News

In a recent revelation, both Arm and Qualcomm, two leading semiconductor manufacturers, have fallen victim to a series of highly sophisticated and targeted Zero-Day attacks. These attacks have not only exposed a significant breach of security but also pose a grave threat to the data and privacy of millions of users worldwide. Zero-Day vulnerabilities refer to previously unknown security flaws that are exploited by attackers before the affected company has a chance to develop and release a softwa

article thumbnail

China-linked cyberspies backdoor semiconductor firms with Cobalt Strike

Bleeping Computer

Hackers engaging in cyber espionage have targeted Chinese-speaking semiconductor companies with TSMC-themed lures that infect them with Cobalt Strike beacons. [.

107
107
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Supermicro's BMC Firmware Found Vulnerable to Multiple Critical Vulnerabilities

The Hacker News

Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware for Supermicro baseboard management controllers (BMCs) that could result in privilege escalation and execution of malicious code on affected systems.

Firmware 105
article thumbnail

Microsoft officially removes Cortana for Windows 11 Insiders

Bleeping Computer

Microsoft finally removed the Cortana standalone app from Windows 11 in the latest preview build for Insiders in the Canary Channel. [.

119
119
article thumbnail

Apple Releases Emergency Update to Patch iOS Zero-Days

SecureWorld News

In today's digital age, where smartphones have become an indispensable part of our lives, it is no surprise that they have also become prime targets for malicious attackers. Among all the mobile platforms, Apple's iOS stands out as a significant focus for these hackers. Apple recently issued an emergency security update in response to actively exploited iOS Zero-Day vulnerabilities (CVE-2023-42824 and CVE-2023-5217).

Spyware 101
article thumbnail

'Operation Jacana' Reveals DinodasRAT Custom Backdoor

Dark Reading

The previously undocumented data exfiltration malware was part of a successful cyber-espionage campaign against the Guyanese government, likely by the Chinese.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

Having helped build out many SecureWorld conferences, I have come to realize—likely to no one's surprise—that the best cybersecurity leaders indeed have some technical prowess, but it is their soft skills that make them exceptional leaders. The CISOs, BISOs, VPs of security architecture, CSOs, directors of information security, directors of governance, risk and compliance, deputy CISOs, and chief risk officers who provide thought leadership on SecureWorld agendas all have a few things in common:

CISO 98
article thumbnail

QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks

The Hacker News

Despite the disruption to its infrastructure, the threat actors behind the QakBot malware have been linked to an ongoing phishing campaign since early August 2023 that led to the delivery of Ransom Knight (aka Cyclops) ransomware and Remcos RAT.

article thumbnail

Microsoft releases new, faster Teams app for Windows and Mac PCs

Bleeping Computer

A new Microsoft Teams application, faster and completely redesigned, is generally available for all Windows and macOS users starting today. [.

107
107
article thumbnail

Smashing Security podcast #342: Royal family attacked, keyless car theft, and a deepfake Tom Hanks

Graham Cluley

Is a deepfake Tom Hanks better than the real thing? Who has been attacking the British Royal Family’s website, and why? And how can you protect your vehicle from the spate of keyless car thefts? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.

CISO 95
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack

The Hacker News

A governmental entity in Guyana has been targeted as part of a cyber espionage campaign dubbed Operation Jacana. The activity, which was detected by ESET in February 2023, entailed a spear-phishing attack that led to the deployment of a hitherto undocumented implant written in C++ called DinodasRAT.

article thumbnail

Could Cybersecurity Breaches Become Harmless in the Future?

Dark Reading

With these five steps, organizations can develop stronger security practices and make the inevitable breaches inconsequential.

article thumbnail

Lyca Mobile investigates customer data leak after cyberattack

Bleeping Computer

Lyca Mobile has released a statement about an unexpected disruption on its network caused by a cyberattack that may have also compromised customer data. [.

Mobile 92
article thumbnail

Stealthy, Thieving Python Packages Slither Onto Windows Systems

Dark Reading

A campaign that's been active since April has already racked up nearly 75,000 downloads, stealing data and cryptocurrency in the process.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.