Mon.Aug 15, 2022

article thumbnail

$23 Million YouTube Royalties Scam

Schneier on Security

Scammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught. No one knows how common this scam is, and how much money total is being stolen in this way. Presumably this is not an uncommon fraud. While the size of the heist and the breadth of the scheme may be very unique, it’s certainly a situation that many YouTube content creators have faced before.

Scams 243
article thumbnail

Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace

The Last Watchdog

The top ransomware gangs have become so relentless that it’s not unusual for two or more of them to attack the same company within a few days – or even a few hours. Related: How ‘IABs’ foster ransomware. And if an enterprise is under an active ransomware attack, or a series of attacks, that’s a pretty good indication several other gangs of hacking specialists came through earlier and paved the way.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In security, there is no average behavior

Tech Republic Security

Doron Hendler, CEO and co-founder of RevealSecurity, explains the right way and the wrong way to detect malicious behavior. The post In security, there is no average behavior appeared first on TechRepublic.

167
167
article thumbnail

CI/CD Pipeline is Major Software Supply Chain Risk: Black Hat Researchers

eSecurity Planet

Continuous integration and development (CI/CD) pipelines are the most dangerous potential attack surface of the software supply chain , according to NCC researchers. The presentation at last week’s Black Hat security conference by NCC’s Iain Smart and Viktor Gazdag, titled “RCE-as-a-Service: Lessons Learned from 5 Years of Real-World CI/CD Pipeline Compromise,” builds on previous work NCC researchers have done on compromised CI/CD pipelines.

Software 145
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to use Dropbox Transfer to securely share files with other people

Tech Republic Security

Dropbox Transfers encrypts the files you share to protect them from unwanted access. The post How to use Dropbox Transfer to securely share files with other people appeared first on TechRepublic.

article thumbnail

IT threat evolution in Q2 2022. Mobile statistics

SecureList

IT threat evolution in Q2 2022. IT threat evolution in Q2 2022. Non-mobile statistics. IT threat evolution in Q2 2022. Mobile statistics. These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Quarterly figures. According to Kaspersky Security Network, in Q2 2022: 5,520,908 mobile malware, adware and riskware attacks were blocked.

Mobile 140

LifeWorks

More Trending

article thumbnail

WikiLeaks Founder Julian Assange sues CIA for data theft

CyberSecurity Insiders

Julian Assange, founder of WikiLeaks, has asked his lawyers to sue CIA and the ex-director Mike Pompeo for siphoning data from the phones and computers of him and his employees. Assange, who is seeking asylum in London, is facing an extradition case from the government of the United States and was asked to appear before a court in 2019. But he escaped the extradition hearing because of some loopholes in the law.

article thumbnail

Gmail Lets Candidates Spam You — FEC FAIL

Security Boulevard

Politicians convinced the Federal Election Commission (FEC) that Google must give them a free pass through Gmail’s spam filters. The post Gmail Lets Candidates Spam You — FEC FAIL appeared first on Security Boulevard.

article thumbnail

Best SIEM Tools & Software for 2022

eSecurity Planet

Security Information and Event Management (SIEM) is a crucial enterprise technology that ties the stack of cybersecurity systems together to assess threats and manage risks. This guide evaluates the leading SIEM software solutions in the marketplace, followed by a dive into what SIEM is, how it works, and how to choose a solution. Best SIEM Tools & Software. 1.

Software 113
article thumbnail

3 ways China's access to TikTok data is a security risk

CSO Magazine

The short-video platform TikTok has come under fire in recent months. Both lawmakers and citizens in the U.S. have questioned its data collection practices and potential ties to the Chinese state. The concerns have deepened after Buzzfeed published a report saying that data of some American users had been repeatedly accessed from China. TikTok's parent company, Beijing-based ByteDance, denied that it shared information with the Chinese government and announced that it had migrated its U.S. user

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Play Ransomware attack news and Extortion Attempt on Water utility

CyberSecurity Insiders

A ransomware named Play hit an entire judiciary system, therefore forcing the officials to shut down the IT systems since August 13th 2022. Argentina Judiciary of Cordoba is a government-based service that was hit by the malware last week, forcing the officials to use pen and paper for submitting official documents and to purview other administrative tasks.

article thumbnail

Black Hat – Windows isn’t the only mass casualty platform anymore

We Live Security

Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars. The post Black Hat – Windows isn’t the only mass casualty platform anymore appeared first on WeLiveSecurity.

article thumbnail

Top 5 security risks of Open RAN

CSO Magazine

When a cell phone or other mobile device connects to the nearest cell tower, the communication takes place over something called a RAN -- a radio access network. From the cell tower, the signal is then routed to a fiber or wireless backhaul connection to the core network. RANs RANs are proprietary to each equipment manufacturer. Open RAN, on the other hand, allows for interoperability that allows service providers to use non-proprietary subcomponents from a choice of vendors.

Risk 106
article thumbnail

DEF CON 30: Hackers Come Home to Vibrant Community

Dark Reading

After 30 years and a brief pandemic hiatus, DEF CON returns with "Hacker Homecoming," an event that put the humans behind cybersecurity first.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware

The Hacker News

Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what's suspected to be an espionage operation. Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa.

Malware 99
article thumbnail

Most Q2 Attacks Targeted Old Microsoft Vulnerabilities

Dark Reading

The most heavily targeted flaw last quarter was a remote code execution vulnerability in Microsoft Office that was disclosed and patched four years ago.

99
article thumbnail

Windows KB5012170 Secure Boot DBX update may fail with 0x800f0922 error

Bleeping Computer

Users may see a 0x800f0922 error when trying to install security update KB5012170 on the currently supported Windows operating system for consumers and the enterprise-class Server version. [.].

99
article thumbnail

Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack

The Hacker News

Popular end-to-end encrypted messaging service Signal on Monday disclosed the cyberattack aimed at Twilio earlier this month may have exposed the phone numbers of roughly 1,900 users. "For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal," the company said.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

SOVA Android malware now also encrypts victims’ files

Security Affairs

Security researchers from Cleafy reported that the SOVA Android banking malware is back and is rapidly evolving. The SOVA Android banking trojan was improved, it has a new ransomware feature that encrypts files on Android devices, Cleafy researchers report. The malware has been active since 2021 and evolves over time. The latest version of the SOVA Trojan, 5.0, targets over 200 banking and cryptocurrency exchange apps.

article thumbnail

SOVA Android Banking Trojan Returns With New Capabilities and Targets

The Hacker News

The SOVA Android banking trojan is continuing to be actively developed with upgraded capabilities to target no less than 200 mobile applications, including banking apps and crypto exchanges and wallets, up from 90 apps when it started out.

Banking 98
article thumbnail

VNC instances exposed to Internet pose critical infrastructures at risk

Security Affairs

Researchers from threat intelligence firm Cyble reported a surge in attacks targeting virtual network computing (VNC). Virtual Network Computing (VNC) is a graphical desktop-sharing system that leverages the Remote Frame Buffer (RFB) protocol to control another machine remotely. It transmits the keyboard and mouse input from one computer to another, relaying the graphical-screen updates, over a network.

article thumbnail

IT threat evolution Q2 2022

SecureList

IT threat evolution in Q2 2022. IT threat evolution in Q2 2022. Non-mobile statistics. IT threat evolution in Q2 2022. Mobile statistics. Targeted attacks. New technique for installing fileless malware. Earlier this year, we discovered a malicious campaign that employed a new technique for installing fileless malware on target machines by injecting a shellcode directly into Windows event logs.

Mobile 98
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Black Hat USA 2022: Burnout, a significant issue

We Live Security

The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022. The post Black Hat USA 2022: Burnout, a significant issue appeared first on WeLiveSecurity.

article thumbnail

UPDATE DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

The Security Ledger

A researcher presented the results of a year-long effort to reverse engineer John Deere hardware to run a version of the DOOM first person shooter. He also discovered a number of security flaws along the way. The post UPDATE DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition appeared first on The Security Ledger with. Read the whole entry. » Related Stories Feel Good Ukraine Tractor Story Highlights Ag Cyber Risk DEF CON: Security Holes in Deere, Case IH Shine Sp

article thumbnail

Phone numbers of 1,900 Signal users exposed as a result of Twilio security breach

Security Affairs

For about 1,900 users, Twilio hackers could have attempted to re-register their number to another device or learned that their number was registered to Signal. Communication company Twilio provides Signal with phone number verification services, and recent security breach it has suffered had also impacted some users of the popular instant-messaging app.

article thumbnail

DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition

The Security Ledger

A researcher presented the results of a year-long effort to reverse engineer John Deere hardware to run a version of the DOOM first person shooter. He also discovered a number of security flaws along the way. The post DEF CON DOOM Patrol: Deere Jailbreak Raises Questions on Security, Competition appeared first on The Security Ledger with Paul F. Read the whole entry. » Related Stories Feel Good Ukraine Tractor Story Highlights Ag Cyber Risk DEF CON: Security Holes in Deere, Case IH Shine Sp

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Credential Theft Is (Still) A Top Attack Method

The Hacker News

Credential theft is clearly still a problem. Even after years of warnings, changing password requirements, and multiple forms of authentication, password stealing remains a top attack method used by cyber criminals. The latest report from the Ponemon Institute shares that 54% of security incidents were caused by credential theft, followed by ransomware and DDoS attacks.

DDOS 98
article thumbnail

A new PyPI Package was found delivering fileless Linux Malware

Security Affairs

Security Researchers discovered a new PyPI Package designed to drop fileless cryptominer to Linux systems. Sonatype researchers have discovered a new PyPI package named ‘ secretslib ‘ that drops fileless cryptominer to the memory of Linux machine systems. The package describes itself as “secrets matching and verification made easy,” it has a total of 93 downloads since August 6, 2020. “ Sonatype has identified a ‘secretslib’ PyPI package that describes i

Malware 98
article thumbnail

Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace

Security Boulevard

The top ransomware gangs have become so relentless that it’s not unusual for two or more of them to attack the same company within a few days – or even a few hours. Related: How ‘IABs’ foster ransomware. And if … (more…). The post Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace appeared first on Security Boulevard.

article thumbnail

Over 9,000 Exposed VNCs Threaten Critical Infrastructure

SecureWorld News

New research shows there are more than 9,000 exposed Virtual Network Computing (VNC) servers that are being used without authentication, some of which belong to organizations in critical infrastructure. VNC is a graphical desktop-sharing system that uses the Remote Frame Buffer (RFB) protocol to remotely control another machine. It relays graphical screen changes while transmitting mouse and keyboard inputs from one machine to another via a network.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!