Tue.Nov 23, 2021

article thumbnail

NIST workshop provides clues to upcoming software supply chain security guidelines

CSO Magazine

President Biden’s wide-ranging cybersecurity executive order (EO) issued in May aims to improve software security through a series of guidelines. As the EO directed, the National Institute of Standards and Technology (NIST) has produced a definition of what constitutes “critical software,” published guidance on security measures for EO-critical software use, and released guidelines on vendors’ source-code testing.

Software 125
article thumbnail

If you're serious about privacy, it's time to use DuckDuckGo as your default Android browser

Tech Republic Security

Third-party app trackers have become a real problem on Android, and DuckDuckGo is doing something about it. Find out why Jack Wallen believes this is the browser you need to use.

218
218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Underinvestment in Multi-Cloud Security a Pressing Concern

Security Boulevard

Although the vast majority of businesses are making multi-cloud a strategic priority in 2022 and keeping security top-of-mind, many feel they lack the tools and skills needed to execute on these plans. In fact, additional security complexities have prevented IT leaders from moving to multiple cloud platforms, even though the majority of organizations know that.

article thumbnail

US government warns of increased ransomware threats during Thanksgiving

Tech Republic Security

Though the feds haven't identified any specific known threats, criminals are prone to strike when key employees are traveling or spending time with family and friends.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Millions of GoDaddy customer data compromised in breach

Malwarebytes

Domain name registrar giant and hosting provider GoDaddy yesterday disclosed to the Securities and Exchange Commission (SEC) that it had suffered a security breach. In the notice, it explained it had been compromised via an “unauthorized third-party access to our Managed WordPress hosting environment.” The unknown culprit behind the attack stole up to 1.2 million active and inactive customer data, including email addresses, original WordPress admin passwords, Secure File Transfer Pro

Passwords 145
article thumbnail

Can't remember ordering that package? Don't click on unfamiliar links sent via text

Tech Republic Security

Proofpoint finds that bad actors are using SMS messages about package deliveries as the bait in new scams.

Scams 216

More Trending

article thumbnail

How to identify social media misinformation and protect your business

Tech Republic Security

Social media has become an integral part of modern communications, providing valuable information to businesses and individuals. Unfortunately, some of that information is just plain wrong or misleading.

Media 160
article thumbnail

Over nine million Android devices infected by info-stealing trojan

Bleeping Computer

A large-scale malware campaign on Huawei's AppGallery has led to approximately 9,300,000 installs of Android trojans masquerading as over 190 different apps [.].

Malware 145
article thumbnail

Study: Storage systems are weakest link in IT infrastructure security

CSO Magazine

Storage systems have a significantly weaker security posture than the other two layers of IT infrastructure — compute and network equipment — according to a report from cybersecurity company Continuity Software. By analyzing data from more than 400 enterprise storage devices, the research revealed 6,300 discrete security issues related to 15 vulnerabilities that, on average, every enterprise security device is exposed to.

Software 133
article thumbnail

Threat actors find and compromise exposed services in 24 hours

Bleeping Computer

Researchers set up 320 honeypots to see how quickly threat actors would target exposed cloud services and report that 80% of them were compromised in under 24 hours. [.].

140
140
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

What CISOs can learn from the US Navy insider who stole nuclear secrets

CSO Magazine

The legal entanglement of the entrepreneurial U.S. Navy engineer, Jonathan Toebbe, who hoped to parley sensitive nuclear submarine secrets into a cool $5 million is now in hiatus as he sits in a West Virginia jail cell awaiting his December trial. We can only imagine the discussions within the Navy’s information security teams upon learning some of the most sensitive of secrets were hand carried out of classified environments, back to the residence of the employee, and then passed on to an unaut

CISO 131
article thumbnail

Malware now trying to exploit new Windows Installer zero-day

Bleeping Computer

Malware creators have already started testing a proof-of-concept exploit targeting a new Microsoft Windows Installer zero-day publicly disclosed by security researcher Abdelhamid Naceri over the weekend. [.].

Malware 135
article thumbnail

What Avengers Movies Can Teach Us About Cybersecurity

The Hacker News

Marvel has been entertaining us for the last 20 years. We have seen gods, super-soldiers, magicians, and other irradiated heroes fight baddies at galactic scales. The eternal fight of good versus evil. A little bit like in cybersecurity, goods guys fighting cybercriminals.If we choose to go with this fun analogy, is there anything useful we can learn from those movies?

article thumbnail

FBI, CISA urge organizations to be on guard for attacks during holidays

We Live Security

Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends. The post FBI, CISA urge organizations to be on guard for attacks during holidays appeared first on WeLiveSecurity.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Over 9 Million Android Phones Running Malware Apps from Huawei's AppGallery

The Hacker News

At least 9.3 million Android devices have been infected by a new class of malware that disguises itself as dozens of arcade, shooter, and strategy games on Huawei's AppGallery marketplace to steal device information and victims' mobile phone numbers. The mobile campaign was disclosed by researchers from Doctor Web, who classified the trojan as "Android.Cynos.7.

Malware 129
article thumbnail

‘Tis the season for protecting your devices with Webroot antivirus

Webroot

As the holiday season draws near, shoppers are eagerly searching for gifts online. Unfortunately, this time of year brings as much cybercrime as it does holiday cheer. Especially during the holidays, cybercriminals are eager to exploit and compromise your personal data. Even businesses large and small are not immune to the dark forces at work. Whether you purchase a new device or receive one as a gift, now is the time to consider the importance of protecting it with an antivirus program.

Antivirus 126
article thumbnail

Sensors Data Management, IoT Mining and Analytics

Security Boulevard

Definition of Internet of Things (IoT ) The Internet of Things stands for IoT. Things refer to the items we use in our daily lives (e.g., domestic appliances and electronics). These items, termed the Internet of Things, are accessible or connected through the Internet. A network of physical items incorporated in the software, electrical devices and [.].

IoT 124
article thumbnail

Cybersec’s Messy Messaging

Javvad Malik

I saw an article on The Register today entitled, Crypto for cryptographers! Infosec types revolt against use of ancient abbreviation by Bitcoin and NFT devotees. TL;DR the argument is whether or not crypto should mean cryptography or cryptocurrency. Now, I get it, it can be an emotional topic for some – but really? The majority of the population don’t even understand what cryptography actually is.

InfoSec 100
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to Fix Cybersecurity Recruiting

Security Boulevard

Since my career began about fifteen years ago, the challenges faced by businesses to recruit the best cybersecurity talent remain—how to find the right talent, and the realization of just how valuable and rare real cybersecurity skills are. Companies are still struggling to close the cybersecurity skills gap of over three million vacancies, and recruiters.

article thumbnail

Immense ransomware cyber threat during Thanksgiving and Black Friday weekends

CyberSecurity Insiders

As most of the IT employees have either applied or planning to take a long leave for this weekend. Those spreading ransomware felt that this is the best time to enter a corporate network and compromise it with ransomware as most of the employees will be less vigilant as they will be busy shopping for the best deals during this Thanksgiving 2021(November 25th,2021) and Black Friday 2021(November 26th,2021).

article thumbnail

Tracking the ‘Noblox.js’ npm Malware Campaign

Security Boulevard

A new malicious package, noblox.js-rpc was spotted on the npm registry this month that leverages the same techniques we saw before to steal all sorts of sensitive data like credentials, files, and even the windows registration key and finally install ransomware. The package is being tracked under the identifier, sonatype-2021-1526 in Sonatype’s security data. .

Malware 122
article thumbnail

Tardigrade hackers target big pharma vaccine makers with stealthy malware

Bleeping Computer

?An advanced hacking group known as 'Tardigrade' is targeting biomanufacturing facilities and research centers working on vaccines and critical medicines. [.].

Malware 126
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Which Data Do Ransomware Attackers Target for Double Extortion?

Security Boulevard

Double extortion is one of the most prevalent ransomware tactics today. The attackers first exfiltrate sensitive information from their target before launching the ransomware encryption routine. The threat actor then demands a ransom payment in order to regain access to the encrypted assets along with an additional threat to publicly expose or otherwise release the data if the ransom demand is not met promptly.

article thumbnail

Android.Cynos.7.origin trojan infected +9 million Android devices

Security Affairs

Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on Huawei’s AppGallery catalog (i.e. simulators, platformers, arcades, strategies, and shooters) that were containing the Android.Cynos.7.origin trojan. They estimated that the malicious apps were installed on at least 9.300.00 Android devices.

Mobile 119
article thumbnail

Benchmarking Your Company’s Privacy Program

TrustArc

With a growing number of disparate privacy regulations worldwide, more companies are turning to privacy management software solutions built for this purpose. Currently, those that have done so have been most effective in managing privacy, as evidenced by their scores on TrustArc’s Global Privacy Index. With capabilities to manage the many elements of privacy required, […].

Software 119
article thumbnail

The dangers of “connected” healthcare: predictions for 2022

SecureList

For a second consecutive year, the time for Kaspersky to make its predictions for the healthcare sector comes amid the global COVID-19 pandemic. Unfortunately, the virus still dominates most aspects of our lives, and, of course, the pandemic remained the biggest and most-discussed topic in medicine. Part of our predictions last year were based on the assumption that in 2021, the pandemic will continue for at least a few months and, because this assumption turned out to be accurate, so did many o

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Is Ransomware a Technology Pandemic in the Making?

Security Boulevard

Ten years ago, ransomware attacks were inconvenient. But today, they present an apocalyptic national security threat capable of crippling infrastructure that the population depends on. “No one country, no one group, can solve this problem,” National Security Advisor Jake Sullivan told reporters ahead of the White House’s 30-nation virtual conference on ransomware in October 2021.

article thumbnail

Please don’t buy this! 3 gift card scams to watch out for this Black Friday

Malwarebytes

With the holiday season around the corner, and Black Friday at the end of the week, we thought it was a good time to look at the dangers that come with gift cards. Gift cards can be a an easy win in cases where you don’t know the receiver well enough to decide on a fitting gift, or when their wishes are out of your price range. But there are a few things to consider before you hand over your cash. 1.

Scams 116
article thumbnail

Four Insider Threats Putting Every Company At Risk

IT Security Central

Few concerns keep business leaders up at night like the threat of a cybersecurity incident. With the average cost of a data breach exceeding $4 million for the first time and public sentiment, regulatory requirements and practical functionality firmly against companies that can’t protect their digital landscape, many leaders are reprioritizing cybersecurity in response to this increasingly […].

Risk 116
article thumbnail

Apple sues spyware-maker NSO Group, notifies iOS exploit targets

Bleeping Computer

Apple has filed a lawsuit against Pegasus spyware-maker NSO Group and its parent company for the targeting and spying of Apple users with surveillance tech. [.].

Spyware 120
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.