Mon.Dec 28, 2020

article thumbnail

Top 5 ways to protect MFA codes

Tech Republic Security

Using SMS for multi-factor authentication is helpful, but not always secure or reliable. What if you lose your phone? Tom Merrittlists five additional ways to receive MFA codes, without SMS.

article thumbnail

Vaccines

Adam Shostack

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines. First, the FDA has authorized two vaccines for emergency use. The review memoranda ( Pfizer , Moderna ) are all sorts of fascinating. As the kids say, TL;DR: both vaccines are safe and no meaningful side effects were seen in testing approximately 44,000 and 30,400 test subjects.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nefilim ransomware operators leak data stolen from Whirlpool

Security Affairs

The American multinational manufacturer and marketer of home appliances Whirlpool was hit by the Nefilim ransomware gang. The American multinational manufacturer and marketer of home appliances Whirlpool suffered a ransomware attack, Nefilim ransomware operators claim to have stolen data from the company and threaten to release the full dump if the company will not pay the ransom.

article thumbnail

How to create a good privacy policy for your website: Tips from the Better Business Bureau

Tech Republic Security

The BBB provides recommendations on what to include in your business website's privacy policy.

164
164
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Finland confirms that hackers breached MPs’ emails accounts

Security Affairs

The Parliament of Finland confirmed that threat actors had access to email accounts of multiple members of parliament (MPs). . “Parliament of Finland has been subjected to a cyberattack in the fall of 2020. The attack was discovered by parliament technical surveillance. Some parliament e-mail accounts may have been compromised as a result of the attack, among them e-mail accounts that belong to MPs.” Parliament officials said. “The cyberattack is being investigated by the Nati

article thumbnail

Role of Context in Threat Detection

Anton on Security

I got into a very insightful debate with somebody who will remain nameless in the beginning of this post, but will perhaps be revealed later. The debate focused on the role of context in threat detection. Specifically, it is about the role of local context (environment knowledge, organization context, site details, etc) in threat detection. Can threat detection work well without such local context?

More Trending

article thumbnail

Ransomware in 2020: A Banner Year for Extortion

Threatpost

From attacks on the UVM Health Network that delayed chemotherapy appointments, to ones on public schools that delayed students going back to the classroom, ransomware gangs disrupted organizations to inordinate levels in 2020.

article thumbnail

E-commerce app 21 Buttons exposes millions of users’ data

Security Affairs

Researchers discovered that the popular e-commerce app 21 Buttons was exposing private data for 100s of influencers across Europe. Researchers from cybersecurity firm vpnMentor discovered that the e-commerce app 21 Buttons was exposing private data for 100s of influencers across Europe. 21 Buttons allows users to shares photos of their outfits with links to the brands they’re wearing, then their followers can purchase their favorite clothes directly from the relevant brands using the app.

article thumbnail

How Your Digital Trails Wind Up in the Police’s Hands

WIRED Threat Level

Phone calls. Web searches. Location tracks. Smart speaker requests. They’ve become crucial tools for law enforcement, while users often are unaware.

Software 122
article thumbnail

Homomorphic Encryption: The 'Golden Age' of Cryptography

Dark Reading

The ability to perform complex calculations on encrypted data promises a new level of privacy and data security for companies in the public and private sectors. So when can they get started?

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Here’s How the Recent SolarWinds Cyberattack on U.S. Agencies and Companies Affects You

Identity IQ

Cybersecurity experts are still trying to determine the scale of damage wrought by a recent cyberattack using SolarWinds software on the U.S. government and Fortune 500 companies. The attack aimed at the U.S. Treasury and Commerce departments as well as international companies continued for months until it was discovered by FireEye, a cybersecurity company that also fell victim to the hacking campaign.

article thumbnail

ACT Top 10 Countdown of 2020

Approachable Cyber Threats

As 2020 draws to a close, we're highlighting our Top 10 ACT Posts of 2020 to recap the year in cybersecurity! Stay tuned here to find out what they were. #10. The Top Cybersecurity Blogs We're Reading in 2020. We love what we do, and we read about it constantly. Here’s a collection of our favorite cybersecurity blogs and websites from the industry's foremost thought leaders and reporters. #9.

article thumbnail

Remote Desktop Bugs: Patches That Took Priority in a Pandemic Year

Dark Reading

Remote Desktop flaws were a patching priority this year as Microsoft distributed fixes and businesses scrambled to protect remote employees.

140
140
article thumbnail

Hackers Amp Up COVID-19 IP Theft Attacks

Threatpost

In-depth report looks at how COVID-19 research has become as a juicy new target for organized cybercrime.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

10 Benefits of Running Cybersecurity Exercises

Dark Reading

There may be no better way to ascertain your organization's strengths and weaknesses than by running regular security drills.

article thumbnail

Multi-platform card skimmer targets Shopify, BigCommerce, Zencart, and Woocommerce stores

Security Affairs

Experts warn of a multi-platform credit card skimmer that can target online stores running on Shopify, BigCommerce, Zencart, and Woocommerce. Security experts have discovered a multi-platform credit card skimmer that can allow threat actors to harvest payment info on compromised stores powered by Shopify, BigCommerce, Zencart, and Woocommerce. Researchers from security firm Sansec discovered that the new software skimmer is able to interact with the checkout process on shops running on top of mu

article thumbnail

Cloud Bucket Vulnerability Management in 2021

eSecurity Planet

The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage services — or “buckets” — offer added application security , they have also consistently proven vulnerable. A bucket is a virtual storage unit provided and partly maintained by a cloud services provider.

article thumbnail

Defending the COVID-19 Vaccine Supply Chain

Dark Reading

We must treat this supply chain like a piece of our nation's critical infrastructure, just like the electrical grid or air traffic control system.

123
123
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Attack Surface Management: You Can't Secure What You Can't See

SecurityTrails

Find out why you should care about attack surface management and what to look for in a perfect ASM solution.

98
article thumbnail

Combating the Insider Threat Among Us

Security Through Education

Security can be a difficult topic to talk about. This is especially true for organizations combating insider threats. Can social deduction games break the ice? Recently a game called “Among Us” garnered mass popularity across the internet. It’s especially popular among streamers and on video platforms like Twitch and YouTube. The description from the developers tells us to “Join your crewmates in a multiplayer game of teamwork and betrayal!

article thumbnail

The Biggest Threat to Cloud Security in 2021

SecureWorld News

There is no question, really, that the year 2020 was the biggest year ever for the cloud. And it is forecast to continue growing in 2021. You can make the argument then, that cloud security is more crucial than its ever been. This is why I reached out to Mark Nunnikhoven, Vice President of Cloud Research at Trend Micro, to discuss this topic. During our podcast interview he revealed what he believes is the #1 threat to cloud security as we look ahead.

article thumbnail

G Suite Backup Options Explained

Spinone

Having a secure backup is a great way to protect your data from being lost, overwritten, hacked, or compromised in any other way. Besides, IT compliance regulations and standards often require a backup. As an award-winning backup solutions provider, we’d like to overview various G Suite backup options you can use. In this article, we’ll take a look at various tools to back up your G Suite data.

Backups 52
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Top Three SearchLight Updates in 2020

Digital Shadows

For threat intelligence to really work for organizations, it must… Be easy to use Be easy to integrate Have dependable. The post Top Three SearchLight Updates in 2020 first appeared on Digital Shadows.

52
article thumbnail

Update: Neopets Is Still A Thing And Its Exposing Sensitive Data

The Security Ledger

Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Update: Neopets Is Still A Thing And Its Exposing Sensitive Data appeared first on The Security Ledger. Related Stories Amid Security Concerns: to Zoom or not to Zoom?

IoT 52
article thumbnail

2020 – The Year in Review

Acunetix

The year 2020 won’t go down in history as one of the best, for sure. However, it has actually led to some positive developments. Let us take a look at 2020 in the world of web application security, share our own experiences, and point out. Read more. The post 2020 – The Year in Review appeared first on Acunetix.

48
article thumbnail

Neopets Is Still A Thing And Its Exposing Sensitive Data

The Security Ledger

Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Neopets Is Still A Thing And Its Exposing Sensitive Data appeared first on The Security Ledger. Related Stories Amid Security Concerns: to Zoom or not to Zoom? Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Sho

IoT 52
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Kali Linux + Mr. Robot ARG Society

Kali Linux

Many of you may have known about the show Mr Robot and its unique connection to Kali Linux. But there is a little bit more that we have not talked about due to NDAs. But it appears the mystery is over, the red tape has been removed, and we now wanted to take a moment to share it with everyone. We had a relationship with Mr Robot, which started during the filming of the 2nd season.

Hacking 52
article thumbnail

Russia’s SolarWinds Attack

Schneier on Security

Recent news articles have all been talking about the massive Russian cyberattack against the United States, but that’s wrong on two accounts. It wasn’t a cyberattack in international relations terms, it was espionage. And the victim wasn’t just the US, it was the entire world. But it was massive, and it is dangerous. Espionage is internationally allowed in peacetime.

Hacking 353
article thumbnail

MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males

The Last Watchdog

How did we get to this level of disinformation? How did we, the citizens of the United States of America, become so intensely divided? It’s tempting to place the lion’s share of the blame on feckless political leaders and facile news media outlets. However, that’s just the surface manifestation of what’s going on. Related: Let’s not call it ‘fake news’ an y more.

Mobile 223