Mon.Dec 14, 2020

article thumbnail

US Orders Rare Emergency System Shut-Downs After Severe CyberSecurity Breach Hits Government And Businesses

Joseph Steinberg

The U.S. government instructed all of its civilian agencies to immediately shut off various popular network and system management products being exploited as part of an ongoing cyberattack. Russian government hackers are believed to have poisoned with malware updates of the SolarWinds Orion products used in many government agencies and in over 80% of the Fortune 500, introducing vulnerabilities that the hackers then exploited to conduct espionage and to pilfer extremely sensitive materials.

article thumbnail

Authentication Failure

Schneier on Security

This is a weird story of a building owner commissioning an artist to paint a mural on the side of his building — except that he wasn’t actually the building’s owner. The fake landlord met Hawkins in person the day after Thanksgiving, supplying the paint and half the promised fee. They met again a couple of days later for lunch, when the job was mostly done.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity experts hail new IoT law

Tech Republic Security

The bill would increase protection for the billions of connected devices "owned or controlled by the government" in homes and businesses.

IoT 218
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking (online) at Western Washington University on January 20, 2021. Details to come. I’ll be speaking at an Informa event on February 28, 2021. Details to come. The list is maintained on this page.

194
194
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

US government agencies compromised by foreign nation-state

Tech Republic Security

Stretching back for months, the breaches were pulled off by exploiting a vulnerability in network monitoring software from SolarWinds, according to security firm FireEye.

article thumbnail

Robotic Process Automation vendor UiPath discloses data breach

Security Affairs

Last week, ZDnet reported in an exclusive that the tech unicorn UiPath admitted having accidentally exposed the personal details of some users. UiPath is a leading Robotic Process Automation vendor providing a complete software platform to help organizations efficiently automate business processes. The startup started reporting the security incident to its customers that had their data accidentally exposed online, only users who registered on its platform before or on March 17, 2020, were impac

More Trending

article thumbnail

Apple addressed multiple code execution flaws in iOS and iPadOS

Security Affairs

Apple addressed this week serious code execution vulnerabilities that affect its iOS and iPadOS mobile operating systems. Apple released security updates to fix multiple severe code execution vulnerabilities in its iOS and iPadOS mobile operating systems. The IT giant released iOS 14.3 and iPadOS 14.3 version to address eleven security vulnerabilities, including code execution flaws.

Mobile 138
article thumbnail

Kaspersky: Gamers face high and ongoing risk of identity theft and bullying

Tech Republic Security

A survey of gamers worldwide found that gamers deal with bullying and theft of in-game valuables in addition to identity theft.

article thumbnail

2021 Security Budgets: Top Priorities, New Realities

Dark Reading

An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies. What's on the horizon? They share with us their spending plans for 2021.

article thumbnail

SolarWinds confirmes 18,000 customers may have been impacted

Security Affairs

18,000 SolarWinds customers may have been impacted by the attack against its supply chain, the company said in a SEC filing. SolarWinds revealed that 18,000 customers might have been impacted by the cyber attack against its supply chain. The alarming data emerged in a filing with the Securities and Exchange Commission (SEC) on Monday. “On December 13, 2020, SolarWinds delivered a communication to approximately 33,000 Orion product customers that were active maintenance customers during and

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Winding down 2020

Javvad Malik

From a creative perspective, 2020 hasn’t been a bad year for me. I ended up writing, 80 blog posts (most of which were published elsewhere ) created 54 videos, 48 podcasts, and 48 presentations and webinars. I guess lockdown gave me more time to mull on things and be more productive. Despite the fact that I am far more productive than the average person, and have been called the Hercules of information security (not my words), I think it’s good for everyone to take some downtime.

article thumbnail

US Agencies and FireEye were hacked with a supply chain attack on SolarWinds Software

Security Affairs

Hackers broke into the networks of federal agencies and FireEye by compromising SolarWinds’ Orion Network Management Products. The cyber espionage group has tampered with updates released by IT company SolarWinds, which provides its products to government agencies, military, and intelligence offices, two people familiar with the matter told the Reuters agency. .

Software 130
article thumbnail

Microsoft Office 365 Credentials Under Attack By Fax ‘Alert’ Emails

Threatpost

Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with the aim of stealing their O365 credentials.

article thumbnail

SoReL-20M Sophos & ReversingLabs release 10 million disarmed samples for malware study

Security Affairs

Sophos and ReversingLabs released SoReL-20M, a database containing 20 million Windows Portable Executable files, including 10M malware samples. Sophos and ReversingLabs announced the release of SoReL-20M , a database containing 20 million Windows Portable Executable files, including 10 million malware samples. The SoReL-20M database includes a set of curated and labeled samples and security-relevant metadata that could be used as a training dataset for a machine learning engine used in anti-malw

Malware 120
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

18,000 Organizations Possibly Compromised in Massive Supply-Chain Cyberattack

Dark Reading

Nation-state attackers used poisoned SolarWinds network management software updates to distribute malware; US government orders federal civilian agencies to immediately power down the technology.

article thumbnail

5 Essential Cybersecurity Skills for Embedded Developers

CompTIA on Cybersecurity

This article will introduce you to how embedded systems and security are connected and why embedded developers should have cybersecurity skills.

article thumbnail

Global Supply Chain Cyberattack Underway via IT Monitoring Software

SecureWorld News

It is the digital version of the Trojan horse. The software updates for your IT management tools arrive automatically and contain legitimate changes—but hidden inside the update is malware that gives hackers secret access to your network. In modern times, this is called a supply chain cyberattack. And according to the U.S. Government and prominent security researchers, this type of attack is playing out right now on a global scale.

Software 104
article thumbnail

New Windows Trojan Steals Browser Credentials, Outlook Files

Threatpost

The newly discovered Python-based malware family targets the Outlook processes, and browser credentials, of Microsoft Windows victims.

Malware 119
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How scammers target PayPal users and how you can stay safe

We Live Security

What are some common ploys targeting PayPal users? Here’s what you should watch out for when using the popular payment service. The post How scammers target PayPal users and how you can stay safe appeared first on WeLiveSecurity.

98
article thumbnail

Spotify Changes Passwords After Another Data Breach

Threatpost

This is the third breach in the past few weeks for the world’s most popular streaming service.

article thumbnail

SolarWinds Compromise: What security teams need to know

Digital Shadows

The Cybersecurity and Infrastructure Security Agency (CISA) recently released an Emergency Directive reporting on a long-running supply-chain attack actively exploiting. The post SolarWinds Compromise: What security teams need to know first appeared on Digital Shadows.

article thumbnail

No One Knows How Deep Russia's Hacking Rampage Goes

WIRED Threat Level

A supply chain attack against IT company SolarWinds has exposed as many as 18,000 companies to Cozy Bear's attacks.

Hacking 124
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Out-of-Office Replies: Are You Saying Too Much?

SecureWorld News

Out-of-office replies have become a staple for many of us. Whether we're traveling for business or pleasure, it's common practice to create an automatic out-of-office reply for incoming emails. But are we sacrificing security in the name of business continuity? When crafting an out-of-office reply, it's critical to remember that some emails that arrive in your inbox will come from people you don't know—and, in some cases, cybercriminals who wish to do you harm.

Mobile 98
article thumbnail

Overview of Recent Sunburst Targeted Attacks

Trend Micro

Various sources have recently disclosed a sophisticated attack that hit organizations via the supply chain via a compromised network monitoring program. This post discusses what the Sunburst backdoor is and what you can do now to mitigate this threat.

article thumbnail

Apple's App 'Privacy Labels' Are Here—and They're a Big Step Forward

WIRED Threat Level

It remains unclear how effective the warnings will be, but the attempt alone is a promising development.

100
100
article thumbnail

Ex-Cisco Employee Convicted for Deleting 16K Webex Accounts

Threatpost

The insider threat will go to jail for two years after compromising Cisco's cloud infrastructure.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

5 Reasons Why Web Security Is as Important as Endpoint Security

Acunetix

Would you say that your company is secure if your employees are using laptops with no anti-malware installed at all? Most businesses would say that is an irresponsible approach. Then why would many businesses have websites and web applications with no protection at all? An. Read more. The post 5 Reasons Why Web Security Is as Important as Endpoint Security appeared first on Acunetix.

Malware 74
article thumbnail

Remote Work is Here to Stay, and Other Cybersecurity Predictions for 2021

Webroot

The cybersecurity industry and end-of-year predictions go together like Fall and football or champagne and the New Year. But on the heels of an unprecedented year, where a viral outbreak changed the landscape of the global workforce practically overnight, portending what’s in store for the year ahead is even trickier than usual. One thing the cybersecurity experts at Webroot agree on is that work from home is here to stay for 2021, or at least it won’t recede to pre-pandemic levels in even the m

article thumbnail

DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report

Threatpost

The attack was mounted via SolarWinds Orion, in a manual and targeted supply-chain effort.

article thumbnail

Adaptive protection against invisible threats

SecureList

Corporate endpoint security technologies for mid-sized companies struggle to surprise us with anything brand new. They provide reliable protection against malware and, when combined with relevant policies, regular updates, and employee cyberhygiene, they can shield a business from a majority of cyber-risks. For some, it may seem like you do not need more security than this… But is that really the case?

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.