Sat.Aug 06, 2022

article thumbnail

New GwisinLocker ransomware encrypts Windows and Linux ESXi servers

Bleeping Computer

A new ransomware family called 'GwisinLocker' targets South Korean healthcare, industrial, and pharmaceutical companies with Windows and Linux encryptors, including support for encrypting VMware ESXi servers and virtual machines. [.].

article thumbnail

New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack

The Hacker News

A new IoT botnet malware dubbed RapperBot has been observed rapidly evolving its capabilities since it was first discovered in mid-June 2022.

IoT 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Windows 10 22H2 is coming, here's everything we know

Bleeping Computer

Microsoft has confirmed the next version of Windows 10 is called "version 22H2". The company will rolling out the next version of Windows 10 later his year and the update is already available for those who manually check for updates using the Settings app in the Release Preview Channel. [.].

116
116
article thumbnail

Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports

Security Affairs

Greek intelligence admitted it had spied on a journalist, while citizens ask the government to reveal the use of surveillance malware. The head of the Greek intelligence told a parliamentary committee that they had spied on a journalist with surveillance malware , Reuters reported citing two sources present. The revelation comes while media and journalists are making pressure on the government to reveal the use of surveillance software.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Microsoft Edge gets better security defaults on less popular sites

Bleeping Computer

Microsoft is rolling out a new update to the Microsoft Edge Stable Channel over the coming days to improve the web browser's security defaults when visiting less popular websites. [.].

98
article thumbnail

Slack Resets Passwords After a Bug Exposed Hashed Passwords for Some Users

The Hacker News

Slack said it took the step of resetting passwords for about 0.5% of its users after a flaw exposed salted password hashes when creating or revoking shared invitation links for workspaces.

More Trending

article thumbnail

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

The Hacker News

Twitter on Friday revealed that a now-patched zero-day bug was used to link phone numbers and emails to user accounts on the social media platform.

article thumbnail

Patch now! Cisco VPN routers are vulnerable to remote control

Malwarebytes

Cisco has released a security advisory about several vulnerabilities in the Cisco Small Business RV series routers, covering the RV160, RV260, RV340, and RV345. There are no workarounds available that address these vulnerabilities, so you need to patch. Vulnerabilities. The vulnerabilities are dependent on one another—exploitation of one of the vulnerabilities may be required to exploit another vulnerability.

VPN 71
article thumbnail

An ISP Settled Piracy Lawsuits. Could Users Take the Hit?

WIRED Threat Level

Now that Charter has reached settlements with major record labels, it’s unclear whether the cable provider will pull the plug on users who pirate music.

64
article thumbnail

Daniel Stori’s ‘What Processes Do When They’re Idle’

Security Boulevard

via the inimitable Daniel Stori , crafting superb comics at turnoff.us ! Permalink. The post Daniel Stori’s ‘What Processes Do When They’re Idle’ appeared first on Security Boulevard.

57
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The US Emergency Alert System Has Dangerous Flaws

WIRED Threat Level

Plus: A crypto-heist extravaganza, a peek at an NSO spyware dashboard, and more.

Spyware 82
article thumbnail

Aspen Security Forum 2022 – Anja Manuel’s ‘Day 3 Opening Remarks’

Security Boulevard

Anja Manuel, Executive Director, Aspen Strategy Group and Aspen Security Forum. Our sincere thanks to Security BSides San Francisco for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post Aspen Security Forum 2022 – Anja Manuel’s ‘Day 3 Opening Remarks’ appeared first on Security Boulevard.

article thumbnail

Aspen Security Forum 2022 – ‘The New Russian Empire?’

Security Boulevard

The New Russian Empire? Representative Ruben Gallego, Chairman, Subcommittee on Intelligence and Special Operations, House Armed Services Committee. Fiona Hill, Senior Fellow, Center on the United States and Europe, Brookings Institution. Mikk Marran, Director-General, Foreign Intelligence Service of Estonia. Moderator: Susan Glasser, Staff Writer, The New Yorker.