Thu.Nov 18, 2021

article thumbnail

How midsize companies are vulnerable to data breaches and other cyberattacks

Tech Republic Security

Midsize companies often lack the staff, expertise and expensive tools needed to defend themselves against attack, says security provider Coro.

article thumbnail

Hackers deploy Linux malware, web skimmer on e-commerce servers

Bleeping Computer

Security researchers discovered that attackers are also deploying a Linux backdoor on compromised e-commerce servers after injecting a credit card skimmer into online shops' websites. [.].

Malware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Consumers like the benefits of online shopping despite the security risks

Tech Republic Security

Only 25% of consumers surveyed by NTT Application Security said they'd take their online business elsewhere following a data breach.

article thumbnail

Cyberwar's global players—it's not always Russia or China

CSO Magazine

Over the past year, a string of high-profile cyberattacks coming from Russia and China has galvanized the United States and its western allies into taking swift action to counter the escalating incidents. Consequently, the SolarWinds spyware infiltration , the Microsoft Exchange hack , and ransomware attacks launched by criminal gangs harbored by the Kremlin dominate headlines and drive nation-state cybersecurity responses.

Spyware 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Windows 11 SE: Why it's both more and less locked down than Windows 10 S

Tech Republic Security

Managing computers for education is complicated, but Microsoft thinks it has a solution.

Education 196
article thumbnail

Winamp prepares a relaunch, new beta version almost ready

Bleeping Computer

Winamp is getting closer to release with a redesigned website, logo, and a new beta signup allowing users to soon test the upcoming version of the media player. [.].

Media 145

More Trending

article thumbnail

Android malware BrazKing returns as a stealthier banking trojan

Bleeping Computer

?The BrazKing Android banking trojan has returned with dynamic banking overlays and a new implementation trick that enables it to operate without requesting risky permissions. [.].

Banking 136
article thumbnail

Memento Ransomware exhibits new traits, says Sophos

CyberSecurity Insiders

Sophos, the multinational data security firm, has found a new variant of ransomware dubbed Memento that is exhibiting new traits rather than just locking down the files after stealing a portion of data. Researchers have found that Memento Ransomware does the usual encryption process after stealing a portion of data. However, if the content cannot be encrypted, it just locks down the files with a password and stores them in an archival folder until a ransom of $1 million in Bitcoins is paid.

article thumbnail

The UK pushes for better supply chain cyber security

Graham Cluley

If the UK Government gets its way, IT service vendors and other cloud-based service providers may soon be required to adopt new measures to strengthen their cybersecurity, amid rising concerns about supply chain risks. Read more in my article on the Tripwire State of Security blog.

article thumbnail

US indicts Iranian hackers for Proud Boys voter intimidation emails

Bleeping Computer

The U.S. Department of State is offering a $10 million reward for information about the activities of two Iranian nationals charged for cyber activity intended to "intimidate and influence" American voters during the 2020 U.S. presidential campaign. [.].

130
130
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

‘My bank account was in a shambles’: The ordeal of an identity theft victim

We Live Security

A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order. The post ‘My bank account was in a shambles’: The ordeal of an identity theft victim appeared first on WeLiveSecurity.

article thumbnail

A quick guide to modern cryptography

InfoWorld on Security

Cryptography grows ever more prominent in our lives. Every time you log into an app or send an email, you are relying on an ingenious cryptographic infrastructure that is descended largely from breakthroughs in the 1970s. Beyond just specialist software developers, beyond just coders, even the non-programming general public can benefit from understanding how cryptography works, especially in an age of crypto currency and crypto investment.

Software 130
article thumbnail

Meet the FluBot malware that is targeting Smart Phones worldwide

CyberSecurity Insiders

FluBot, a newly discovered malware that spread from Europe since April this year, has now spread its wings worldwide. The malware steals data from the infected devices, highlighting the need to secure every smart phone operating across the globe with a comprehensive security solution. According to the researchers from NortonLifeLock- formerly known as Symantec Corporation, FluBot spreading hackers first target a phone with an SMS filled with a malicious link that tries its best to convince a use

Malware 129
article thumbnail

How to Build a Security Awareness Training Program that Yields Measurable Results

The Hacker News

Organizations have been worrying about cyber security since the advent of the technological age. Today, digital transformation coupled with the rise of remote work has made the need for security awareness all the more critical.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

US Government declassifies data to foster would?be defenders

We Live Security

US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them. The post US Government declassifies data to foster would‑be defenders appeared first on WeLiveSecurity.

article thumbnail

RedCurl corporate espionage hackers resume attacks with updated tools

Bleeping Computer

A crew of highly-skilled hackers specialized in corporate espionage has resumed activity, one of their victims this year being a large wholesale company in Russia. [.].

124
124
article thumbnail

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

eSecurity Planet

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized identity, seem well suited for new threats that have exploded onto the scene in the last year. Gartner analyst Ruggero Contu noted that security risks are becoming external: the software supply chain , the public cloud , the trading of breached data, and IoT and operational technology (OT) are all th

article thumbnail

Champion Spotlight: Damian Sniezek

Veracode Security

This interview was cross-posted from the Veracode Community. With his third consecutive championship in the Secure Coding Challenge – the monthly coding competition in the Veracode Community – Damian is the latest member of our community to be named a Secure Code Champion. After his win, we spoke with Damian about his experience in the competition and his career growth from a software developer into a Security engineer.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How Hackers Use Payloads to Take Over Your Machine

eSecurity Planet

A payload is a piece of code that executes when hackers exploit a vulnerability. In other words, it’s an exploit module. It’s usually composed of a few commands that will run on the targeted operating system (e.g., key-loggers) to steal data and other malicious acts. Most operations use payloads, but there are a few payload-less attacks, such as phishing campaigns that do not include malicious links or malware , but rely on more sophisticated deception such as spoofing to trick their targets.

article thumbnail

NDR unveiled as essential when complying with the Executive Order

Cisco Security

On May 12, 2021, the president of the United States released an executive order on cyber security. The order contained prescriptive actions for compliance as the executive branch responded to the “persistent and increasingly sophisticated malicious cyber campaigns” and their resulting impact on business and public life. But much of the document is more declarative and focused on desired outcomes tied to the overall directive to modernize and improve the nation’s cybersecurity

article thumbnail

BrandPost: New Threats Based on ProxyShell Vulnerability Require Immediate Action

CSO Magazine

Conti ransomware affiliates are using Microsoft Exchange servers to hack into corporate networks using recently disclosed ProxyShell vulnerability exploits. Sophos made the discovery in a customer engagement in which the ransomware gang used Exchange to encrypt a customer’s data. While the Conti crew is not the first to take advantage of ProxyShell, in the attacks Sophos uncovered, they unfolded at lightning speed, according to Sophos Senior Threat Researcher Sean Gallagher.

article thumbnail

North Korean cyberspies target govt officials with custom malware

Bleeping Computer

A state-sponsored North Korean threat actor tracked as TA406 was recently observed deploying custom info-stealing malware in espionage campaigns. [.].

Malware 124
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Are Ransomware Payments Covered by Cyberinsurance?

Security Boulevard

There seems to be a pattern in data breach and other cyberattack cases: After a breach, a company turns to its insurer for coverage. Sometimes they have specialized cyberinsurance, sometimes not. But often, even if they have paid for what they believe to be comprehensive cybersecurity risk insurance, the insurer refuses to pay the claim. The post Are Ransomware Payments Covered by Cyberinsurance?

Insurance 113
article thumbnail

Patch now! FatPipe VPN zero-day actively exploited

Malwarebytes

According to its marketing team, a FatPipe MPVPN can make your VPN “900% more secure.” Well, I don’t know about that, but I do know a way to make your MPVPN admin console 100% more secure, and that you should do so right away, by installing the latest version of its software. Why? Because older versions of the device software used by FatPipe’s MPVPN, WARP, and IPVPN products, are all vunerable to a serious zero-day exploit that has been actively exploited in the wild for

VPN 112
article thumbnail

Addressing the Low-Code Security Elephant in the Room

Dark Reading

The danger of anyone being able to spin up new applications is that few are thinking about security. Here's why everyone is responsible for the security of low-code/no-code applications.

111
111
article thumbnail

Critical Root RCE Bug Affects Multiple Netgear SOHO Router Models

The Hacker News

Networking equipment company Netgear has released yet another round of patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system. Tracked as CVE-2021-34991 (CVSS score: 8.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

The UK pushes for better supply chain cybersecurity

Security Boulevard

If the UK Government gets its way, IT service vendors and other cloud-based service providers may soon be required to adopt new measures to strengthen their cybersecurity, amid rising concerns about supply chain risks. The Department for Digital, Culture, Media and Sport (DCMS) has floated plans to make mandatory compliance with the National Cyber Security […]… Read More.

article thumbnail

Phishers target TikTok influencers with verification promises and copyright threats

Malwarebytes

Influencers on TikTok are feeling the pinch of scams and phishing thanks to targeted campaigns hungry for fresh logins. The phishing campaigns make use of much older tactics seen across multiple platforms down the years. It’s a one-two combo of “Do this quickly, or else something bad will happen”, combined with the the lure of increased social status for someone’s social media accounts.

Scams 107
article thumbnail

Arkose Labs Named to Fast Company’s First-Ever List of the Next Big Things in Tech

Security Boulevard

The inaugural list by Fast Company recognizes technological breakthroughs that bear the potential to define the future of their industries Fast Company has acknowledged Arkose Labs’ innovative approach to fighting fraud in its first-ever Next Big Things in Tech list. We are thrilled to be recognized For foiling both human fraudsters and bots and be […].

article thumbnail

New Memento ransomware switches to WinRar after failing at encryption

Bleeping Computer

A new ransomware group called Memento takes the unusual approach of locking files inside password-protected archives after their encryption method kept being detected by security software. [.].

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.