Fri.Nov 11, 2022

article thumbnail

NSA Over-surveillance

Schneier on Security

Here in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of Americans. Given all we learned from Edward Snowden, this feels like a minor coda. There’s nothing really interesting in the IG document, which is heavily redacted.

article thumbnail

Uyghurs Targeted With Spyware, Courtesy of PRC

Dark Reading

Chinese government employs spyware to detect so-called "pre-crimes" including using a VPN, religious apps, or WhatsApp, new analysis reveals.

Spyware 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Book: A Hacker’s Mind

Schneier on Security

I have a new book coming out in February. It’s about hacking. A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about hacking computer systems; it’s about hacking more general economic, political, and social systems. It generalizes the term hack as a means of subverting a system’s rules in unintended ways.

Hacking 193
article thumbnail

NSA’s Plea: Stop Using C and C++ (Because You’re Idiots)

Security Boulevard

The C and C++ languages are unsafe. Instead, the NSA would like devs to use memory-safe languages—such as Rust. The post NSA’s Plea: Stop Using C and C++ (Because You’re Idiots) appeared first on Security Boulevard.

CISO 124
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Oil and Gas Companies Are Vulnerable Due to High-Severity Flaw

Heimadal Security

A new vulnerability was found by cybersecurity researchers, in systems used across oil and gas organizations. If it were to fall in the wrong hands, this vulnerability could be exploited to inject and execute arbitrary code. The high-severity issue, tracked as CVE-2022-0902, has received a CVSS score of 8.1 and is a path traversal flaw, first […].

article thumbnail

Cybersecurity startups to watch for in 2023

CSO Magazine

The problems cybersecurity startups attempt to solve are often a bit ahead of the mainstream. They can move faster than most established companies to fill gaps or emerging needs. Startups can often innovative faster because they are unfettered by an installed base. The downside, of course, is that startups often lack resources and maturity. It’s a risk for a company to commit to a startup’s product or platform, and it requires a different kind of customer/vendor relationship.

LifeWorks

More Trending

article thumbnail

QBOT – A HTML Smuggling technique to target victims

Quick Heal Antivirus

QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007. The post QBOT – A HTML Smuggling technique to target victims appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Banking 111
article thumbnail

Why Do Phishing Emails Have Such Obvious Typos?

Security Boulevard

Have you received an email from a Nigerian prince asking for your help? Were you recently notified you won a lottery that you never participated in? If so, you’re in good company. Virtually everyone with an email address knows about phishing scams. If you’ve not received a phishing email, you might not know what they. The post Why Do Phishing Emails Have Such Obvious Typos?

Phishing 111
article thumbnail

GitHub Adds New Security Features for Open Source Community

eSecurity Planet

GitHub has announced new features that could improve both developers’ experience and supply chain security. The “private vulnerability” reports announced at GitHub Universe 2022 will allow open-source maintainers to receive private issues from the community. Maintainers will be able to receive reports and collaborate with security professionals and all other issuers to patch vulnerabilities.

Software 109
article thumbnail

Dangerous SIM-swap lockscreen bypass – update Android now!

Naked Security

A bit like leaving the front door keys under the doormat.

Hacking 108
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Future of Women in Cybersecurity

Heimadal Security

The topic of women in cybersecurity has received more media attention in recent years than ever before, so, naturally, we wanted to take a look at the current situation in the field. Lately, the press has tended to emphasize the negative aspects of this subject, such as lack of representation, gender pay gap, and challenges […]. The post Future of Women in Cybersecurity appeared first on Heimdal Security Blog.

article thumbnail

Canadian food retail giant Sobeys hit by Black Basta ransomware

Bleeping Computer

Grocery stores and pharmacies belonging to Canadian food retail giant Sobeys have been experiencing IT systems issues since last weekend. [.].

Retail 103
article thumbnail

Worok Threat Group Uses Malicious PNG Images to Spread Malware

Heimadal Security

Worok threat group is hiding information-stealing malware in PNG images. Using this technique, the hackers manage to infect devices without being detected. The group was first spotted in September 2022 targeting high-profile victims from the Middle East, Southeast Asia, and South Africa. How the Malware Works Based on the evidence gathered about the Worok threat […].

Malware 105
article thumbnail

Use Cloud Securely? What Does This Even Mean?!

Anton on Security

An influential Gartner paper stated many years ago that “Clouds Are Secure: Are You Using Them Securely?” So began the legend of cloud security vs secure clouds. When I was an analyst, we sometimes had to discuss with clients whether various providers of public cloud services are “secure.” Over time, these discussions dwindled to a small trickle as clients ultimately saw enough evidence that cloud infrastructure is indeed radically more secure than most data centers.

Risk 100
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Phishing Attacks Abuse Microsoft Dynamics 365 Customers

Heimadal Security

First off, what are consumer satisfaction surveys? Consumer satisfaction surveys, also known as CSAT surveys, are questionnaires that businesses use to learn how satisfied their clients are with their branding, goods, services, or customer support. They are frequently used by businesses to track customer feedback and compile data to develop practical solutions.

Phishing 105
article thumbnail

‘Dark Ships’ Emerge From the Shadows of the Nord Stream Mystery

WIRED Threat Level

Satellite monitors discovered two vessels with their trackers turned off in the area of the pipeline prior to the suspected sabotage in September.

99
article thumbnail

IceXLoader Malware Is Affecting Thousands of Home and Corporate Devices

Heimadal Security

A new phishing campaign responsible for dropping a new version of the IceXLoader malware has been found. The ongoing campaign is affecting thousands of home and corporate users. Version 3.3.3 of IceXLoader, a malware loader that was first discovered in the open last summer, has been released by the tool’s creators, who have also added […].

Malware 105
article thumbnail

FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons

We Live Security

When in doubt, kick it out, plus other tips for hardening your cyber-defenses against World Cup-themed phishing and other scams. The post FIFA World Cup 2022 scams: Beware of fake lotteries, ticket fraud and other cons appeared first on WeLiveSecurity.

Scams 98
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

What Is Phishing-as-a-Service (PhaaS)?

Heimadal Security

We all know that cybercriminals are finding every day newer and more efficient ways to obtain money from their criminal activities. So, keeping the money-making goal in mind, it was only logical that cyberattacks evolve into an even more lucrative business model. This includes also the Phishing-as-a-Service or PhaaS platforms that are on the rise […].

Phishing 104
article thumbnail

Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware

Security Affairs

Lookout researchers discovered two long-running surveillance campaigns targeting the ethnic minority Uyghurs. Researchers from mobile security firm Lookout uncovered two long-running surveillance campaigns targeting the Uyghurs minority. The threat actors behind the campaigns used two Android spyware to spy on the victims and steal sensitive information.

article thumbnail

Multiple High-Severity Flaw Affect Widely Used OpenLiteSpeed Web Server Software

The Hacker News

Multiple high-severity flaws have been uncovered in the open source OpenLiteSpeed Web Server as well as its enterprise variant that could be weaponized to achieve remote code execution. "By chaining and exploiting the vulnerabilities, adversaries could compromise the web server and gain fully privileged remote code execution," Palo Alto Networks Unit 42 said in a Thursday report.

article thumbnail

An initial access broker claims to have hacked Deutsche Bank

Security Affairs

An initial access broker claims to have hacked Deutsche Bank and is offering access to its systems for sale on Telegram. A threat actor ( 0x_dump ) claims to have hacked the multinational investment bank Deutsche Bank and is offering access to its network for sale online. The security researcher Dominic Alvieri was one of the first experts to report the announcement published by the initial access broker on Telegram.

Banking 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The top three differences between an open source audit and an open source scan

Security Boulevard

Understanding the differences between an open source audit and an open source scan will help you determine which approach is best for your organization. The post The top three differences between an open source audit and an open source scan appeared first on Application Security Blog. The post The top three differences between an open source audit and an open source scan appeared first on Security Boulevard.

article thumbnail

Researcher received a $70k award for a Google Pixel lock screen bypass

Security Affairs

Google fixed a high-severity security bug affecting all Pixel smartphones that can allow attackers to unlock the devices. Google has addressed a high-severity security bug, tracked as CVE-2022-20465, affecting all Pixel smartphones that could be exploited to unlock the devices. The Google Pixel Lock Screen Bypass was reported by security researcher David Schütz that was awarded $70,000 for this flaw. “The issue allowed an attacker with physical access to bypass the lock screen protections

Mobile 98
article thumbnail

Perception Versus Reality: a Data-Driven Look at Open Source Risk Management

Security Boulevard

On October 18th, 2022, Sonatype published the 8th Annual State of the Software Supply Chain. The report is our ongoing contribution to a growing body of knowledge and software development using third-party open source software. One of the report’s primary authors and VP of Product Innovation Dr. Stephen Magill presented a talk summarizing the report with additional context, background, and data.

Risk 98
article thumbnail

Man charged for role in LockBit ransomware operation

Security Affairs

The U.S. DoJ charged a Russian-Canadian national for his alleged role in LockBit ransomware attacks against organizations worldwide. The U.S. Department of Justice (DoJ) charged Mikhail Vasiliev, a dual Russian and Canadian national, for his alleged participation in the LockBit ransomware operation. According to the press release published by DoJ, the man is currently in custody in Canada and is awaiting extradition to the United States.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ukraine Deputy Cyber Leader on Lessons From Russia-Ukraine Cyberwar

Security Boulevard

As the conflict with Russia intensified into war earlier this year, the cyberattacks on Ukrainian interests didn’t come as a surprise to Victor Zhora, who recently spoke via video link with BlackBerry CEO John Chen at BlackBerry’s recent Summit 2022. Zhora, Ukraine’s deputy cyber leader, explained that the Ukrainian government expected attacks on government agencies, The post Ukraine Deputy Cyber Leader on Lessons From Russia-Ukraine Cyberwar appeared first on Security Boulevard.

article thumbnail

Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine

Security Affairs

Microsoft linked Prestige ransomware attacks against organizations in Ukraine and Poland to Russia-linked threat actors. In Mid-October, Microsoft Threat Intelligence Center (MSTIC) researchers uncovered previously undetected ransomware, tracked as Prestige ransomware , employed in attacks targeting organizations in the transportation and related logistics industries in Ukraine and Poland.

article thumbnail

Malicious Google Play Store App Spotted Distributing Xenomorph Banking Trojan

The Hacker News

Google has removed two new malicious dropper apps that have been detected on the Play Store for Android, one of which posed as a lifestyle app and was caught distributing the Xenomorph banking malware. "Xenomorph is a trojan that steals credentials from banking applications on users' devices," Zscaler ThreatLabz researchers Himanshu Sharma and Viral Gandhi said in an analysis published Thursday.

Banking 98
article thumbnail

Microsoft Defender network protection generally available on iOS, Android

Bleeping Computer

Microsoft announced that the Mobile Network Protection feature is generally available to help organizations detect network weaknesses affecting Android and iOS devices running Microsoft's Defender for Endpoint (MDE) enterprise endpoint security platform. [.].

Mobile 98
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!