Fri.Jun 24, 2022

article thumbnail

On the Dangers of Cryptocurrencies and the Uselessness of Blockchain

Schneier on Security

Earlier this month, I and others wrote a letter to Congress, basically saying that cryptocurrencies are an complete and total disaster, and urging them to regulate the space. Nothing in that letter is out of the ordinary, and is in line with what I wrote about blockchain in 2019. In response, Matthew Green has written —not really a rebuttal—but a “a general response to some of the more common spurious objections …people make to public blockchain systems.” In it, he

article thumbnail

Weekly Update 301

Troy Hunt

First up, I'm really sorry about the audio quality on this one. It's the exact same setup I used last week (and carefully tested first) but it's obviously just super sensitive to the wind. If you look at the trees in the background you can see they're barely moving, but inevitably that was enough to really mess with the audio quality.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best cybersecurity certifications in 2022

Tech Republic Security

Solidify your skills as a cybersecurity professional by becoming certified. Here is a list of some of the best cybersecurity certifications available today. The post Best cybersecurity certifications in 2022 appeared first on TechRepublic.

article thumbnail

Cybersecurity agencies: You don’t have to delete PowerShell to secure it

Malwarebytes

Microsoft’s PowerShell is a useful, flexible tool that is as popular with criminals as it is with admins. Cybercrooks like it becasue PowerShell is powerful, available almost everywhere, and doesn’t look out of place running on a company network. In most places it isn’t practical to block PowerShell completely, which raises the question: How do you stop the bad stuff without disrupting the good stuff?

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Black Basta may be an all-star ransomware gang made up of former Conti and REvil members

Tech Republic Security

The group has targeted 50 businesses from English speaking countries since April 2022. The post Black Basta may be an all-star ransomware gang made up of former Conti and REvil members appeared first on TechRepublic.

article thumbnail

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

The Hacker News

Researchers have discovered a number of malicious Python packages in the official third-party software repository that are engineered to exfiltrate AWS credentials and environment variables to a publicly exposed endpoint. The list of packages includes loglib-modules, pyg-modules, pygrata, pygrata-utils, and hkg-sol-utils, according to Sonatype security researcher Ax Sharma.

LifeWorks

More Trending

article thumbnail

Threat actors continue to exploit Log4Shell in VMware Horizon Systems

Security Affairs

The U.S. CISA and the Coast Guard Cyber Command (CGCYBER) warn of attacks exploiting the Log4Shell flaw in VMware Horizon servers. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Coast Guard Cyber Command (CGCYBER), published a joint advisory to warn of hacking attempts exploiting the Log4Shell flaw in VMware Horizon servers to compromise target networks. “CISA and the United States Coast Guard Cyber Command (CGCYBER) have released a joint Cybersecurity Adv

Malware 138
article thumbnail

Users in Italy and Kazakhstan Targeted by Spyware Provider

Heimadal Security

For many years, Google has been monitoring the activity of commercial spyware sellers and in conjunction with Google’s Project Zero, discovered the fact that RCS Labs, an Italian vendor, utilizes unusual drive-by downloads as first infection vectors to target iOS and Android mobile users. What Happened? Every campaign that TAG was made aware of began with […].

Spyware 137
article thumbnail

Google TAG argues surveillance firm RCS Labs was helped by ISPs to infect mobile users

Security Affairs

Google’s Threat Analysis Group (TAG) revealed that the Italian spyware vendor RCS Labs was supported by ISPs to spy on users. Researchers from Google’s Threat Analysis Group (TAG) revealed that the Italian surveillance firm RCS Labs was helped by some Internet service providers (ISPs) in Italy and Kazakhstan to infect Android and iOS users with their spyware.

article thumbnail

NSA Wants To Help you Lock Down MS Windows in PowerShell

Security Boulevard

A new cheatsheet from four infosec agencies tells us how to use PowerShell for good, rather than let scrotes misuse it to “live off the land.”. The post NSA Wants To Help you Lock Down MS Windows in PowerShell appeared first on Security Boulevard.

InfoSec 131
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

5 social engineering assumptions that are wrong

CSO Magazine

Social engineering is involved in the vast majority of cyberattacks, but a new report from Proofpoint has revealed five common social engineering assumptions that are not only wrong but are repeatedly subverted by malicious actors in their attacks. Commenting on the report’s findings, Sherrod DeGrippo, Proofpoint’s vice president threat research and detection, stated that the vendor has attempted to debunk faulty assumptions made by organizations and security teams so they can better protect emp

article thumbnail

Cybersecurity Agencies Release Guidance for PowerShell Security

eSecurity Planet

PowerShell is one of the most common tools used by hackers in “living off the land” attacks, when malicious actors use an organization’s own tools against itself. This week, U.S. cybersecurity agencies joined their counterparts in the UK and New Zealand to offer guidance so organizations can use PowerShell safely. PowerShell is a command line tool and associated scripting language built on the.NET framework.

article thumbnail

Italian spyware firm is hacking into iOS and Android devices, Google says

CSO Magazine

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

Spyware 125
article thumbnail

A “whole-of-state” approach to cybersecurity

Security Boulevard

There’s no question that state and local governments are getting pummeled by cyber attacks. While larger, high-profile cases like Colonial Pipeline and SolarWinds tend to dominate the news, it is important to acknowledge the impact of cyber crime on state and local governments. Ransomware attacks on state and local governments, for instance, increased in just a year by 485% in 2020.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

OpenSSL issues a bugfix for the previous bugfix

Naked Security

Fortunately, it's not a major bugfix, which means it's easy to patch and can teach us all some useful lessons.

120
120
article thumbnail

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

The Hacker News

A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational and tactical objectives behind its campaigns.

article thumbnail

Vulnerabilities in the Jacuzzi SmartTub app could allow to access users’ data

Security Affairs

Researchers discovered multiple vulnerabilities in Jacuzzi SmartTub app web interface that can expose private data. Multiple vulnerabilities in Jacuzzi SmartTub app web interface could have disclosed private data to attackers, security researcher Eaton Zveare warns. The experts attempted to notify the company without success, meantime the flaws have been addressed.

article thumbnail

Only 3% of Open Source Software Bugs Are Actually Attackable, Researchers Say

Dark Reading

A new study says 97% of open source vulnerabilities linked to software supply chain risks are not attackable — but is "attackability" the best method for prioritizing bugs?

Software 116
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Privacy Access Token

Security Boulevard

Various browser vendors (Apple, Google, Mozilla) recently announced support for the private access token (PAT), a new standard being drafted by the IETF. The privacy pass is designed to bring more privacy to web users, and reduce data collection or the need to interrupt the user experience with a CAPTCHA challenge commonly used by website […]. The post Privacy Access Token appeared first on Security Boulevard.

article thumbnail

Mitek launches MiVIP platform to fight identity theft

CSO Magazine

A new easy-to-deploy identity platform was announced this week to help address growing concerns about identity theft. The Mitek Verified Identity Platform (MiVIP) melds the company's mobile technologies with those of its recent acquisitions to give its customers flexible control over their consumers' experiences. With MiVIP, customers have the ability to orchestrate the full range of authentication technologies offered by Mitek, including biometrics, geolocation, politically exposed persons (PEP

article thumbnail

Conti ransomware finally shuts down data leak, negotiation sites

Bleeping Computer

The Conti ransomware operation has finally shut down its last public-facing infrastructure, consisting of two Tor servers used to leak data and negotiate with victims, closing the final chapter of the notorious cybercrime brand. [.].

article thumbnail

Instagram’s new age verification tool – Week in security with Tony Anscombe

We Live Security

As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet? The post Instagram’s new age verification tool – Week in security with Tony Anscombe appeared first on WeLiveSecurity.

Internet 106
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Russia fines Google for spreading ‘unreliable’ info defaming its army

Bleeping Computer

Roskomnadzor, Russia's telecommunications watchdog, has fined Google 68 million rubles (roughly $1.2 million) for helping spread what it called "unreliable" information on the war in Ukraine and the failure to remove it from its platforms. [.].

article thumbnail

Open Source Threat Intelligence Platform – Best Alternatives for Your Company [2022]

Heimadal Security

The technology that Threat Intelligence Platforms (TIP) employ allows companies to gather, aggregate, and manage threat intelligence data from a variety of sources and formats. The information on already known malware and other security threats enables security teams to identify, investigate, and respond to risks rapidly and effectively. Automation and simplification of the entire threat […].

article thumbnail

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware

The Hacker News

A week after it emerged that a sophisticated mobile spyware dubbed Hermit was used by the government of Kazakhstan within its borders, Google said it has notified Android users of infected devices.

Spyware 105
article thumbnail

What is a Hotfix? Definition, Challenges, and Best Practices

Heimadal Security

Welcome back to the wondrous world of patch management. Today we’re going to clear the air a bit by deliberating about hotfixes (not hot flashes). So, what is a hotfix? A hotfix can be regarded as a patch, but a patch is not a hotfix – makes a whole lot of sense, doesn’t it? Not […]. The post What is a Hotfix? Definition, Challenges, and Best Practices appeared first on Heimdal Security Blog.

105
105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

The Hacker News

A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment.

article thumbnail

A Comprehensive Guide to Security Assertion Markup Language (SAML)

Heimadal Security

SAML, which stands for Security Assertion Markup Language, is an open federation standard that enables users to be authenticated by an identity provider (IdP), who may then provide an authentication token to another application, which is known as a service provider (SP). SAML makes it possible for the SP to function without having to do […]. The post A Comprehensive Guide to Security Assertion Markup Language (SAML) appeared first on Heimdal Security Blog.

article thumbnail

Without Conti On The Scene, LockBit 2.0 Leads Ransomware Attacks

Dark Reading

Analysts say an 18% drop in ransomware attacks seen in May is likely fleeting, as Conti actors regroup.

article thumbnail

How to Mitigate Ransomware?

Heimadal Security

Nowadays, the majority of chief information security officers (CISOs) are most concerned about ransomware, which has emerged as one of the biggest security threats. Ransomware attacks not only affect large organizations and critical infrastructure, but they can also have a negative impact on local communities and disrupt many people’s daily lives.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!